When configuring UserID on a Palo Alto Networks firewall, what is the proper procedure to limit User mappings
When configuring UserID on a Palo Alto Networks firewall, what is the proper procedure to limit User mappings to a particular DHCP scope? A. In the zone in which User Identification is enabled, create a User Identification ACL Include List using the same IP ranges as those allocated in the DHCP scope. B. Under the […]
What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for t
What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for the action setting? A. A File Blocking profile with possible actions of “Forward” or “Continue and Forward”. B. A Data Filtering profile with possible actions of “Forward” or “Continue and Forward”. C. A Vulnerability Protection profile […]
What are two sources of information for determining whether the firewall has been successful in communicating
What are two sources of information for determining whether the firewall has been successful in communicating with an external UserID Agent? A. System Logs and the indicator light under the UserID B. Agent settings in the firewall. C. Traffic Logs and Authentication Logs. D. System Logs and an indicator light on the chassis. E. System […]
When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunne
When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunneling in policies by specifying the SSHtunnel AppID? A. SSH Proxy B. SSL Forward Proxy C. SSL Inbound Inspection D. SSL Reverse Proxy
Which statement below is True?
Which statement below is True? A. PANOS uses BrightCloud as its default URL Filtering database, but also supports PANDB. B. PANOS uses PANDB for URL Filtering, replacing BrightCloud. C. PANOS uses BrightCloud for URL Filtering, replacing PANDB. D. PANOS uses PANDB as the default URL Filtering database, but also supports BrightCloud.
Which of the following CANNOT use the source user as a match criterion?
Which of the following CANNOT use the source user as a match criterion? A. Policy Based Forwarding B. Secuirty Policies C. QoS D. DoS Protection E. Antivirus Profile
As the Palo Alto Networks Administrator responsible for UserID, you need to enable mapping of network users th
As the Palo Alto Networks Administrator responsible for UserID, you need to enable mapping of network users that do not signin using LDAP. Which information source would allow for reliable UserID mapping while requiring the least effort to configure? A. Active Directory Security Logs B. WMI Query C. Captive Portal D. Exchange CAS Security logs
When you have created a Security Policy Rule that allows Facebook, what must you do to block all other webbrow
When you have created a Security Policy Rule that allows Facebook, what must you do to block all other webbrowsing traffic? A. Create an additional rule that blocks all other traffic. B. When creating the policy, ensure that webbrowsing is included in the same rule. C. Ensure that the Service column is defined as “applicationdefault” […]
Which of the following can provide information to a Palo Alto Networks firewall for the purposes of UserID?
Which of the following can provide information to a Palo Alto Networks firewall for the purposes of UserID? (Select all correct answers.) A. Domain Controller B. SSL Certificates C. RIPv2 D. Network Access Control (NAC) device
Color-coded tags can be used on all of the items listed below EXCEPT
Color-coded tags can be used on all of the items listed below EXCEPT: A. Address Objects B. Zones C. Service Groups D. Vulnerability Profiles