Which path in PAN-OS 10.0 displays the list of port-based security policy rules?
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?
An administrator needs to allow users to use only certain email applications.
How should the administrator configure the firewall to restrict users to specific email applications?
Given the topology, which zone type should you configure for firewall interface E1/1?
Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and risky websites?
Which administrative management services can be configured to access a management interface?
Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?
Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?
What is the purpose of the automated commit recovery feature?
Which Security policy set should be used to ensure that a policy is applied first?
An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs.
What is the correct process to enable this logging1?
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base.
On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days.
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall handle the traffic?
Which option lists the attributes that are selectable when setting up an Application filters?
Based on the network diagram provided, which two statements apply to traffic between the User and Server networks? (Choose two.)
Which three filter columns are available when setting up an Application Filter? (Choose three.)
What Policy Optimizer policy view differ from the Security policy do?
Where in Panorama Would Zone Protection profiles be configured?
Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)
Which Security policy action will message a user's browser thai their web session has been terminated?
Access to which feature requires the PAN-OS Filtering license?
Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?
Which three Ethernet interface types are configurable on the Palo Alto Networks firewall? (Choose three.)
What action will inform end users when their access to Internet content is being restricted?
Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.
What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?
Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
A)
B)
C)
D)
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the laptop.
Which security profile feature could have been used to prevent the communication with the CnC server?
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?
In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.
What object is best suited for this configuration?
Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?
An internal host wants to connect to servers of the internet through using source NAT.
Which policy is required to enable source NAT on the firewall?
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?
Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
Which two rule types allow the administrator to modify the destination zone? (Choose two )
Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?
How is the hit count reset on a rule?
Which two statements are correct about App-ID content updates? (Choose two.)
Which two settings allow you to restrict access to the management interface? (Choose two )
Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP Addresses list?
When creating a Panorama administrator type of Device Group and Template Admin, which two things must you create first? (Choose two.)
Which setting is available to edit when a tag is created on the local firewall?
Match the Cyber-Attack Lifecycle stage to its correct description.
Place the steps in the correct packet-processing order of operations.
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
What must first be created on the firewall for SAML authentication to be configured?
When is an event displayed under threat logs?
Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?
How do you reset the hit count on a security policy rule?
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?
What is an advantage for using application tags?
Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?
View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?
A)
B)
C)
D)
Which attribute can a dynamic address group use as a filtering condition to determine its membership?
An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule. What is the best way to do this?
What do you configure if you want to set up a group of objects based on their ports alone?
During the packet flow process, which two processes are performed in application identification? (Choose two.)
You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application
Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?
Which component is a building block in a Security policy rule?
What are three ways application characteristics are used? (Choose three.)
An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.
Which Security profile should be used?
Arrange the correct order that the URL classifications are processed within the system.
Which type of DNS signatures are used by the firewall to identify malicious and command-and-control domains?
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?
Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)
Which Security policy action will message a user's browser that their web session has been terminated?
An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?
You receive notification about new malware that infects hosts through malicious files transferred by FTP.
Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )
Which two configuration settings shown are not the default? (Choose two.)
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?
What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)
An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?
Which URL profiling action does not generate a log entry when a user attempts to access that URL?
What must be configured before setting up Credential Phishing Prevention?
What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?
Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?
Which three types of Source NAT are available to users inside a NGFW? (Choose three.)
Which type of address object is "10 5 1 1/0 127 248 2"?
Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.
What is the quickest way to reset the hit counter to zero in all the security policy rules?
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;
1. trust for internal networks
2. untrust to the internet
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )
In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns sessions?
An administrator wants to prevent access to media content websites that are risky
Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two)
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
How many zones can an interface be assigned with a Palo Alto Networks firewall?
How are Application Fillers or Application Groups used in firewall policy?
What can be used as match criteria for creating a dynamic address group?
The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication Sequence SYS01," and the authentication sequence SYS01 has a profile list with four authentication profiles:
• Auth Profile LDAP
• Auth Profile Radius
• Auth Profile Local
• Auth Profile TACACS
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable but has lost the "SYS01 Admin" username and password.
What is the "SYS01 Admin" login capability after the outage?
Which order of steps is the correct way to create a static route?
Which dynamic update type includes updated anti-spyware signatures?
A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.
To which two types of traffic will the rule apply? (Choose two.)
How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?
What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?
Which option is part of the content inspection process?
Which object would an administrator create to enable access to all applications in the office-programs subcategory?
Place the following steps in the packet processing order of operations from first to last.
Match each feature to the DoS Protection Policy or the DoS Protection Profile.
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP –to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.
Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.