Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?

Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?A . Review PoliciesB . Review AppsC . Pre-analyzeD . Review App MatchesView AnswerAnswer: A

March 18, 2021 No Comments READ MORE +

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall? A . Signature MatchingB . Network ProcessingC . Security ProcessingD . Security MatchingView AnswerAnswer: A

March 18, 2021 No Comments READ MORE +

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None? A . Translation TypeB . InterfaceC . Address TypeD . IP AddressView AnswerAnswer: A

March 18, 2021 No Comments READ MORE +

Which user-ID agent sufficient in your network?

Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized. Which user-ID agent sufficient in your network?A . PAN-OS integrated agent deployed on the firewallB . Windows-based agent deployed on the...

March 18, 2021 No Comments READ MORE +

Given the topology, which zone type should zone A and zone B to be configured with?

Given the topology, which zone type should zone A and zone B to be configured with? A . Layer3B . TapC . Layer2D . Virtual WireView AnswerAnswer: A

March 17, 2021 No Comments READ MORE +

How is the hit count reset on a rule?

How is the hit count reset on a rule?A . select a security policy rule, right click Hit Count > ResetB . with a dataplane rebootC . Device > Setup > Logging and Reporting Settings > Reset Hit CountD . in the CLI, type command reset hitcount <POLICY-NAME>View AnswerAnswer: A

March 17, 2021 No Comments READ MORE +

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...

March 17, 2021 No Comments READ MORE +

Which interface type can use virtual routers and routing protocols?

Which interface type can use virtual routers and routing protocols?A . TapB . Layer3C . Virtual WireD . Layer2View AnswerAnswer: B

March 16, 2021 No Comments READ MORE +

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A

March 16, 2021 No Comments READ MORE +

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal.B . It removes the 100K limit for DNS entries for the downloaded DNS updates.C . IT eliminates the need for dynamic DNS updates.D...

March 16, 2021 No Comments READ MORE +