What two actions can be taken when implementing an exception to an External Dynamic List? (Choose two.)
URL categories can be used as match criteria on which two policy types? (Choose two.)
Which dynamic update type includes updated anti-spyware signatures?
Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?
Given the screenshot what two types of route is the administrator configuring? (Choose two )
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?
What are three valid ways to map an IP address to a username? (Choose three.)
Match the Palo Alto Networks Security Operating Platform architecture to its description.
Match the network device with the correct User-ID technology.
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?
Based on the show security policy rule would match all FTP traffic from the inside zone to the outside zone?
Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.
Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?
Which administrator type utilizes predefined roles for a local administrator account?
An administrator is reviewing the Security policy rules shown in the screenshot below.
Which statement is correct about the information displayed?
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
By default, which action is assigned to the interzone-default rule?
When creating a custom URL category object, which is a valid type?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which feature must be configured to enable a data plane interface to submit DNS queries originated from the firewall on behalf of the control plane?
Which User Credential Detection method should be applied within a URL Filtering Security profile to check for the submission of a valid corporate username and the associated password?
Which interface type requires no routing or switching but applies Security or NAT policy rules before passing allowed traffic?
Which component is a building block in a Security policy rule?
Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and risky websites?
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
Which protocol used to map username to user groups when user-ID is configured?
To what must an interface be assigned before it can process traffic?
Which solution is a viable option to capture user identification when Active Directory is not in use?
How is the hit count reset on a rule?
The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data.
Which Security profile feature could have been used to prevent the communications with the command-and-control server?
Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?
An administrator is troubleshooting traffic that should match the interzone-default rule. However, the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was never changed from its default configuration.
Why doesn't the administrator see the traffic?
Which interface type can use virtual routers and routing protocols?
Which type of profile must be applied to the Security policy rule to protect against buffer overflows illegal code execution and other attempts to exploit system flaws?
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)
Which policy set should be used to ensure that a policy is applied just before the default security rules?
Based on the screenshot what is the purpose of the group in User labelled ''it"?
When a security rule is configured as Intrazone, which field cannot be changed?
What are the two default behaviors for the intrazone-default policy? (Choose two.)
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
Place the steps in the correct packet-processing order of operations.
How are service routes used in PAN-OS?
A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
Which profile should be used to obtain a verdict regarding analyzed files?
Given the image, which two options are true about the Security policy rules. (Choose two.)
Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?
Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?
Which file is used to save the running configuration with a Palo Alto Networks firewall?
Match the Cyber-Attack Lifecycle stage to its correct description.
Why should a company have a File Blocking profile that is attached to a Security policy?
The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access the PowerBall Lottery website for just this week. However, the company does not want employees to access any other websites also listed in the URL filtering “gambling” category.
Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the “gambling” URL category?
Which action can be performed when grouping rules by group tags?
When HTTPS for management and GlobalProtect are enabled on the same data plane interface, which TCP port is used for management access?
What is a prerequisite before enabling an administrative account which relies on a local firewall user database?
Access to which feature requires PAN-OS Filtering licens?
Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?
Which situation is recorded as a system log?
Given the topology, which zone type should zone A and zone B to be configured with?
When is the content inspection performed in the packet flow process?
Which security profile should be used to classify malicious web content?
Which order of steps is the correct way to create a static route?
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?
Which prevention technique will prevent attacks based on packet count?
Which license is required to use the Palo Alto Networks built-in IP address EDLs?
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?
How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?
Selecting the option to revert firewall changes will replace what settings?
Which feature enables an administrator to review the Security policy rule base for unused rules?
An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?
What is a recommended consideration when deploying content updates to the firewall from Panorama?
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
In a File Blocking profile, which two actions should be taken to allow file types that support critical apps? (Choose two.)
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic
Which statement accurately describes how the firewall will apply an action to matching traffic?
What is the correct process tor creating a custom URL category?
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
Based on the security policy rules shown, ssh will be allowed on which port?
In a security policy what is the quickest way to rest all policy rule hit counters to zero?
Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website
How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
Which two addresses should be reserved to enable DNS sinkholing? (Choose two.)
Which statement best describes a common use of Policy Optimizer?
What do you configure if you want to set up a group of objects based on their ports alone?
An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)
Which two statements are correct about App-ID content updates? (Choose two.)
The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.
Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)
An administrator is configuring a NAT rule
At a minimum, which three forms of information are required? (Choose three.)
Which two configuration settings shown are not the default? (Choose two.)
What must be considered with regards to content updates deployed from Panorama?
What is an advantage for using application tags?
A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to
making the changes.
Which action will allow the administrator to undo the changes?
A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.
Which two types of traffic will the rule apply to? (Choose two)
Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?
You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?
Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided password?
What is a recommended consideration when deploying content updates to the firewall from Panorama?
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.
What object is best suited for this configuration?
Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)
Which two types of profiles are needed to create an authentication sequence? (Choose two.)
Which Security policy action will message a user's browser thai their web session has been terminated?
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
Files are sent to the WildFire cloud service via the WildFire Analysis Profile. How are these files used?
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)