Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which security profile should be used to classify malicious web content?

A.

URL Filtering

B.

Antivirus

C.

Web Content

D.

Vulnerability Protection

In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)

A.

URL Filtering

B.

Vulnerability Protection

C.

Antivirus b

D.

Anti-spyware

Why should a company have a File Blocking profile that is attached to a Security policy?

A.

To block uploading and downloading of specific types of files

B.

To detonate files in a sandbox environment

C.

To analyze file types

D.

To block uploading and downloading of any type of files

Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?

A.

URL filtering

B.

Antivirus

C.

WildFire

D.

Threat Prevention

An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.

Which Security profile should be used?

A.

Antivirus

B.

URL filtering

C.

Anti-spyware

D.

Vulnerability protection

View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?

A.

SAML

B.

Multi-Factor Authentication

C.

Role-based

D.

Dynamic

The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the laptop.

Which security profile feature could have been used to prevent the communication with the CnC server?

A.

Create an anti-spyware profile and enable DNS Sinkhole

B.

Create an antivirus profile and enable DNS Sinkhole

C.

Create a URL filtering profile and block the DNS Sinkhole category

D.

Create a security policy and enable DNS Sinkhole

Which three Ethernet interface types are configurable on the Palo Alto Networks firewall? (Choose three.)

A.

Virtual Wire

B.

Tap

C.

Dynamic

D.

Layer 3

E.

Static