What new functionality is provided in PAN-OS 5.0 by Palo Alto Networks URL Filtering Database (PAN-DB)?

What new functionality is provided in PAN-OS 5.0 by Palo Alto Networks URL Filtering Database (PAN-DB)?A . The "Log Container Page Only" option can be employed in a URL-Filtering policy to reduce the number of logging events.B . URL-Filtering can now be employed as a match condition in Security policyC...

October 16, 2019 No Comments READ MORE +

Which option, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic to other hosts inside the network?

A Palo Alto Networks firewall is being targeted by an NTP Amplification attack and is being flooded with tens of thousands of bogus UDP connections per second to a single destination IP address and port. Which option, when enabled with the correct threshold, would mitigate this attack without dropping legitimate...

October 16, 2019 No Comments READ MORE +

Which method will show the global counters associated with the traffic after configuring the appropriate packet filters?

A firewall administrator is troubleshooting problems with traffic passing through the Palo Alto Networks firewall. Which method will show the global counters associated with the traffic after configuring the appropriate packet filters?A . From the CLI, issue the show counter interface command for the egress interface.B . From the GUI,...

October 15, 2019 No Comments READ MORE +

Which three processor types are found on the data plane of a PA-5050? Choose 3 answers

Which three processor types are found on the data plane of a PA-5050? Choose 3 answersA . Multi-Core Security ProcessorB . Signature Match ProcessorC . Network ProcessorD . Protocol Decoder ProcessorE . Management ProcessorView AnswerAnswer: A,B,C Explanation: Reference: https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/white­papers/single-pass-parallel-processing-architecture.pdf page 8

October 15, 2019 No Comments READ MORE +

When a user logs in via Captive Portal, their user information can be checked against:

When a user logs in via Captive Portal, their user information can be checked against:A . Terminal Server AgentB . Security LogsC . XML APID . RadiusView AnswerAnswer: D

October 14, 2019 No Comments READ MORE +

When creating an application filter, which of the following is true?

When creating an application filter, which of the following is true?A . They are used by malwareB . Excessive bandwidth may be used as a filter match criteriaC . They are called dynamic because they automatically adapt to new IP addressesD . They are called dynamic because they will automatically...

October 13, 2019 No Comments READ MORE +

Which action will show whether the downloaded file has been blocked by a Security Profile?

A user is reporting that they cannot download a PDF file from the internet. Which action will show whether the downloaded file has been blocked by a Security Profile?A . Filter the Session Browser for all sessions from the user with the application "adobe".B . Filter the System log for...

October 12, 2019 No Comments READ MORE +

The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? Choose 2 answers

The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? Choose 2 answersA . Threat PreventionB . App-IDC . URL FilteringD . PAN-OSE . GlobalProtect Data FileView AnswerAnswer: A,E Explanation: Reference: https://www.paloaltonetworks.com/products/technologies/wildfire.html

October 11, 2019 No Comments READ MORE +

Which best describes how Palo Alto Networks firewall rules are applied to a session?

Which best describes how Palo Alto Networks firewall rules are applied to a session?A . last match appliedB . first match appliedC . all matches appliedD . most specific match appliedView AnswerAnswer: B

October 11, 2019 No Comments READ MORE +

When configuring Admin Roles for Web UI access, what are the available access levels?

When configuring Admin Roles for Web UI access, what are the available access levels?A . Enable and Disable onlyB . None, Superuser, Device AdministratorC . Allow and Deny onlyD . Enable, Read-Only and DisableView AnswerAnswer: D

October 11, 2019 No Comments READ MORE +