An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?
According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP –to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.
Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.
Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1 What changes are required on VR-1 to route traffic between two interfaces on the NGFW?
What does an administrator use to validate whether a session is matching an expected NAT policy?
What is a prerequisite before enabling an administrative account which relies on a local firewall user database?
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)
What is considered best practice with regards to committing configuration changes?
Which two security profile types can be attached to a security policy? (Choose two.)
An administrator wants to prevent access to media content websites that are risky
Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two)
Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?
Which two settings allow you to restrict access to the management interface? (Choose two )
Which object would an administrator create to block access to all high-risk applications?
Match each feature to the DoS Protection Policy or the DoS Protection Profile.
Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?
Which action would an administrator take to ensure that a service object will be available only to the selected device group?
An internal host wants to connect to servers of the internet through using source NAT.
Which policy is required to enable source NAT on the firewall?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)