What new functionality is provided in PAN-OS 5.0 by Palo Alto Networks URL Filtering Database (PAN-DB)?A . The "Log Container Page Only" option can be employed in a URL-Filtering policy to reduce the number of logging events.B . URL-Filtering can now be employed as a match condition in Security policyC . IP-Based Threat Exceptions...
Which option, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic to other hosts inside the network?
A Palo Alto Networks firewall is being targeted by an NTP Amplification attack and is being flooded with tens of thousands of bogus UDP connections per second to a single destination IP address and port. Which option, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic to other hosts...
Which method will show the global counters associated with the traffic after configuring the appropriate packet filters?
A firewall administrator is troubleshooting problems with traffic passing through the Palo Alto Networks firewall. Which method will show the global counters associated with the traffic after configuring the appropriate packet filters?A . From the CLI, issue the show counter interface command for the egress interface.B . From the GUI, select "Show global counters"...
Which three processor types are found on the data plane of a PA-5050? Choose 3 answers
Which three processor types are found on the data plane of a PA-5050? Choose 3 answersA . Multi-Core Security ProcessorB . Signature Match ProcessorC . Network ProcessorD . Protocol Decoder ProcessorE . Management Processor View Answer Answer: A,B,C Explanation: Reference: https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/whitepapers/single-pass-parallel-processing-architecture.pdf page 8...
When a user logs in via Captive Portal, their user information can be checked against:
When a user logs in via Captive Portal, their user information can be checked against:A . Terminal Server AgentB . Security LogsC . XML APID . Radius View Answer Answer: D...
When creating an application filter, which of the following is true?
When creating an application filter, which of the following is true?A . They are used by malwareB . Excessive bandwidth may be used as a filter match criteriaC . They are called dynamic because they automatically adapt to new IP addressesD . They are called dynamic because they will automatically include new applications from...
Which action will show whether the downloaded file has been blocked by a Security Profile?
A user is reporting that they cannot download a PDF file from the internet. Which action will show whether the downloaded file has been blocked by a Security Profile?A . Filter the Session Browser for all sessions from the user with the application "adobe".B . Filter the System log for "Download Failed" messages.C ....
The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? Choose 2 answers
The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? Choose 2 answersA . Threat PreventionB . App-IDC . URL FilteringD . PAN-OSE . GlobalProtect Data File View Answer Answer: A,E Explanation: Reference: https://www.paloaltonetworks.com/products/technologies/wildfire.html...
Which best describes how Palo Alto Networks firewall rules are applied to a session?
Which best describes how Palo Alto Networks firewall rules are applied to a session?A . last match appliedB . first match appliedC . all matches appliedD . most specific match applied View Answer Answer: B...
When configuring Admin Roles for Web UI access, what are the available access levels?
When configuring Admin Roles for Web UI access, what are the available access levels?A . Enable and Disable onlyB . None, Superuser, Device AdministratorC . Allow and Deny onlyD . Enable, Read-Only and Disable View Answer Answer: D...