Which option shows the attributes that are selectable when setting up application filters?
Which option shows the attributes that are selectable when setting up application filters? A. Category, Subcategory, Technology, and Characteristic B. Category, Subcategory, Technology, Risk, and Characteristic C. Name, Category, Technology, Risk, and Characteristic D. Category, Subcategory, Risk, Standard Ports, and Technology Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects-application-filters
Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability
Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall? A. Signature Matching B. Network Processing C. Security Processing D. Security Matching
Which two configuration settings shown are not the default?
Which two configuration settings shown are not the default? (Choose two.) A. Enable Security Log B. Server Log Monitor Frequency (sec) C. Enable Session D. Enable Probing Reference: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/user-identification/device-user-identification-user-mapping/enable-server-monitoring
How many zones can an interface be assigned with a Palo Alto Networks firewall?
How many zones can an interface be assigned with a Palo Alto Networks firewall? A. two B. three C. four D. one Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/network/network-zones/security-zone-overview
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based on the information, how is […]
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?
Which firewall plane provides configuration, logging, and reporting functions on a separate processor? A. control B. network processing C. data D. security processing
An administrator needs to allow users to use their own office applications. How should the administrator confi
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment? A. Create an Application Filter and name it Office Programs, the filter it on the business-systems category, office-programs subcategory B. Create an Application Group and add business-systems to […]
Which well-known port is associated with the Simple Mail Transfer Protocol?
Which well-known port is associated with the Simple Mail Transfer Protocol? A. 143 B. 25 C. 997 D. 40
Which type of security device uses a single-pass, parallel processor hardware architecture to accelerate conte
Which type of security device uses a single-pass, parallel processor hardware architecture to accelerate content inspection? A. unified threat management B. stateless firewalls C. next-generation firewall D. PoS-based firewall
Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint sys
Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems. A. It cannot identify command-and-control traffic. B. It cannot monitor all potential network ports. C. It assumes that all internal devices are untrusted. D. It assumes that every internal endpoint can be trusted.