Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?

A.

every 5 minutes

B.

every 1 minute

C.

every 24 hours

D.

every 30 minutes

A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.

To which two types of traffic will the rule apply? (Choose two.)

A.

Within zone HR

B.

Within zone IT

C.

Between zone IT and zone HR

D.

Between zone IT and zone Finance

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data.

Which Security profile feature could have been used to prevent the communications with the command-and-control server?

A.

Create a Data Filtering Profile and enable its DNS sinkhole feature.

B.

Create an Antivirus Profile and enable its DNS sinkhole feature.

C.

Create an Anti-Spyware Profile and enable its DNS sinkhole feature.

D.

Create a URL Filtering Profile and block the DNS sinkhole URL category.

Which prevention technique will prevent attacks based on packet count?

A.

zone protection profile

B.

URL filtering profile

C.

antivirus profile

D.

vulnerability profile

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

A.

override

B.

allow

C.

block

D.

continue

Which firewall plane provides configuration, logging, and reporting functions on a separate processor?

A.

control

B.

network processing

C.

data

D.

security processing

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

A.

Data redistribution

B.

Dynamic updates

C.

SNMP setup

D.

Service route

An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?

A.

50

B.

100

C.

200

D.

1,000

Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)

A.

XML API

B.

log forwarding auto-tagging

C.

GlobalProtect agent

D.

User-ID Windows-based agent

Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)

A.

Static IP

B.

Dynamic IP / Port Fallback

C.

Dynamic IP

D.

Dynamic IP and Port (DIPP)