Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)A . Enable User Credential Detection B. Enable User-ID C. Define a Secure Sockets Layer (SSL) decryption rule base D. Enable App-ID E. Define a uniform resource locator (URL) Filtering profileView AnswerAnswer: A,B,E

September 24, 2022 No Comments READ MORE +

What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?

What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?A . allow the request and all subsequent responses B. temporarily disable the DNS Security function C. block the query D. discard...

September 23, 2022 No Comments READ MORE +

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)A . grayware B. command and control (C2) C. benign D. government E. malwareView AnswerAnswer: A,C,E

September 22, 2022 No Comments READ MORE +

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?A . WildFire B. DNS Security C. Threat Prevention D. loT SecurityView AnswerAnswer: B

September 22, 2022 No Comments READ MORE +

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?A . it requires the Vulnerability Protection profile to be enabled B. DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates C. infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be...

September 22, 2022 No Comments READ MORE +

Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?

A customer requires protections and verdicts for portable executable (PE) and executable and linkable format (ELF), as well as the ability to integrate with existing security tools. Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?A . Dynamic Unpacking B. WildFire C. DNS Security...

September 21, 2022 No Comments READ MORE +

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?A . It eliminates of the necessity for dynamic analysis in the cloud B. It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity C. It...

September 21, 2022 No Comments READ MORE +

Which feature of PAN-OS will address these requirements?

A customer requires an analytics tool with the following attributes: - Uses the logs on the firewall to detect actionable events on the network - Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network - Pinpoints the area of risk...

September 21, 2022 No Comments READ MORE +

What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?

What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?A . Run a Perl script to regularly check for updates and alert when one is released B. Monitor update announcements and manually push updates to Crewall C. Store updates on an...

September 20, 2022 No Comments READ MORE +

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)A . SaaS reports B. data filtering logs C. WildFire analysis reports D. threat logs E. botnet reportsView AnswerAnswer: C,D,E

September 20, 2022 No Comments READ MORE +