<< Prev Question Next Question >>

Question 2/127

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (127q)
Question 1: Which URL Filtering Profile action does not generate a log e...
Question 2: Which Security profile would you apply to identify infected ...
Question 3: What is the purpose of the automated commit recovery feature...
Question 4: Arrange the correct order that the URL classifications are p...
Question 5: Which license must an Administrator acquire prior to downloa...
Question 6: Given the image, which two options are true about the Securi...
Question 7: Which component is a building block in a Security policy rul...
Question 8: When HTTPS for management and GlobalProtect are enabled on t...
Question 9: An administrator wants to prevent users from submitting corp...
Question 10: Which license is required to use the Palo Alto Networks buil...
Question 11: Selecting the option to revert firewall changes will replace...
Question 12: The CFO found a malware infected USB drive in the parking lo...
Question 13: A network administrator is required to use a dynamic routing...
Question 14: In the example security policy shown, which two websites fck...
Question 15: What does an application filter help you to do?...
Question 16: In which section of the PAN-OS GUI does an administrator con...
Question 17: Which two configuration settings shown are not the default? ...
Question 18: Which two security profile types can be attached to a securi...
Question 19: Which Security profile must be added to Security policies to...
Question 20: Your company occupies one floor in a single building you hav...
Question 21: Why should a company have a File Blocking profile that is at...
Question 22: What can be achieved by disabling the Share Unused Address a...
Question 23: Given the network diagram, traffic should be permitted for b...
Question 24: Assume a custom URL Category Object of "NO-FILES" has been c...
Question 25: Which license must an administrator acquire prior to downloa...
Question 26: You have been tasked to configure access to a new web server...
Question 27: What are three valid information sources that can be used wh...
Question 28: Which DNS Query action is recommended for traffic that is al...
Question 29: An administrator needs to add capability to perform real-tim...
Question 30: Which Palo Alto network security operating platform componen...
Question 31: Your company is highly concerned with their Intellectual pro...
Question 32: Which URL profiling action does not generate a log entry whe...
Question 33: Which object would an administrator create to block access t...
Question 34: After making multiple changes to the candidate configuration...
Question 35: An administrator needs to allow users to use their own offic...
Question 36: Which link in the web interface enables a security administr...
Question 37: Given the screenshot, what are two correct statements about ...
Question 38: Based on the graphic which statement accurately describes th...
Question 39: Place the following steps in the packet processing order of ...
Question 40: Which two matching criteria are used when creating a Securit...
Question 41: An administrator receives a global notification for a new ma...
Question 42: Which action related to App-ID updates will enable a securit...
Question 43: An administrator would like to determine the default deny ac...
Question 44: Which firewall feature do you need to configure to query Pal...
Question 45: You need to allow users to access the office-suite applicati...
Question 46: What allows a security administrator to preview the Security...
Question 47: Based on the graphic, what is the purpose of the SSL/TLS Ser...
Question 48: An internal host wants to connect to servers of the internet...
Question 49: Within an Anti-Spyware security profile, which tab is used t...
Question 50: Which User-ID mapping method should be used for an environme...
Question 51: Which interface type is used to monitor traffic and cannot b...
Question 52: Which three statement describe the operation of Security Pol...
Question 53: Given the detailed log information above, what was the resul...
Question 54: An administrator would like to see the traffic that matches ...
Question 55: Four configuration choices are listed, and each could be use...
Question 56: Given the cyber-attack lifecycle diagram identify the stage ...
Question 57: A server-admin in the USERS-zone requires SSH-access to all ...
Question 58: What is a function of application tags?...
Question 59: What are three differences between security policies and sec...
Question 60: Which statement best describes the use of Policy Optimizer?...
Question 61: Which statement is true regarding a Best Practice Assessment...
Question 62: A network has 10 domain controllers, multiple WAN links, and...
Question 63: Which Palo Alto Networks firewall security platform provides...
Question 64: What is the maximum volume of concurrent administrative acco...
Question 65: Given the detailed log information above, what was the resul...
Question 66: An administrator would like to apply a more restrictive Secu...
Question 67: What are two differences between an implicit dependency and ...
Question 68: An administrator notices that protection is needed for traff...
Question 69: Which plane on a Palo alto networks firewall provides config...
Question 70: The PowerBall Lottery has reached an unusually high value th...
Question 71: What are the requirements for using Palo Alto Networks EDL H...
Question 72: An administrator wants to prevent access to media content we...
Question 73: How does an administrator schedule an Applications and Threa...
Question 74: Which URL Filtering profile action would you set to allow us...
Question 75: All users from the internal zone must be allowed only Telnet...
Question 76: What is an advantage for using application tags?...
Question 77: Why does a company need an Antivirus profile?...
Question 78: Recently changes were made to the firewall to optimize the p...
Question 79: Which Security profile can you apply to protect against malw...
Question 80: Which two features can be used to tag a username so that it ...
Question 81: Assume that traffic matches a Security policy rule but the a...
Question 82: Which two App-ID applications will need to be allowed to use...
Question 83: What can be used as match criteria for creating a dynamic ad...
Question 84: What is the correct process tor creating a custom URL catego...
Question 85: Which definition describes the guiding principle of the zero...
Question 86: Which data-plane processor layer of the graphic shown provid...
Question 87: Which security profile will provide the best protection agai...
Question 88: Starting with PAN_OS version 9.1 which new type of object is...
Question 89: Place the steps in the correct packet-processing order of op...
Question 90: In a security policy what is the quickest way to rest all po...
Question 91: To what must an interface be assigned before it can process ...
Question 92: The NetSec Manager asked to create a new firewall Local Admi...
Question 93: Which administrator type provides more granular options to d...
Question 94: What must be considered with regards to content updates depl...
Question 95: How frequently can wildfire updates be made available to fir...
Question 96: What are three Palo Alto Networks best practices when implem...
Question 97: Which path is used to save and load a configuration with a P...
Question 98: Where within the firewall GUI can all existing tags be viewe...
Question 99: Which type security policy rule would match traffic flowing ...
Question 100: An administrator is configuring a NAT rule At a minimum, whi...
Question 101: Which tab would an administrator click to create an address ...
Question 102: What do you configure if you want to set up a group of objec...
Question 103: An administrator is troubleshooting traffic that should matc...
Question 104: Match the Cyber-Attack Lifecycle stage to its correct descri...
Question 105: Match the cyber-attack lifecycle stage to its correct descri...
Question 106: When creating a Panorama administrator type of Device Group ...
Question 107: The PowerBall Lottery has reached a high payout amount and a...
Question 108: Which profile should be used to obtain a verdict regarding a...
Question 109: You receive notification about a new malware that infects ho...
Question 110: How do you reset the hit count on a security policy rule?...
Question 111: Which type of address object is www.paloaltonetworks.com?...
Question 112: An administrator is updating Security policy to align with b...
Question 113: You receive notification about new malware that infects host...
Question 114: Which User Credential Detection method should be applied wit...
Question 115: An administrator would like to use App-ID's deny action for ...
Question 116: Which two Palo Alto Networks security management tools provi...
Question 117: Match each feature to the DoS Protection Policy or the DoS P...
Question 118: Which type of profile must be applied to the Security policy...
Question 119: Which built-in IP address EDL would be useful for preventing...
Question 120: Which type of administrator account cannot be used to authen...
Question 121: If users from the Trusted zone need to allow traffic to an S...
Question 122: What are three valid ways to map an IP address to a username...
Question 123: How many zones can an interface be assigned with a Palo Alto...
Question 124: Which stage of the cyber-attack lifecycle makes it important...
Question 125: Which rule type is appropriate for matching traffic both wit...
Question 126: An administrator is trying to enforce policy on some (but no...
Question 127: To use Active Directory to authenticate administrators, whic...