Which Security Profile mitigates attacks based on packet count?
Answer : A
Which interface type uses virtual routers and routing protocols?
Answer : B
Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?
Answer : B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions
An internal host needs to connect through the firewall using source NAT to servers of the internet.
Which policy is required to enable source NAT on the firewall?
Answer : A
Which Security Profile can provide protection against ICMP floods, based on individual combinations of a packet's source and destination IP addresses?
Answer : A
Which path in PAN-OS 9.0 displays the list of port-based security policy rules?
Answer : C
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
Answer : BD
Reference:
http://www.firewall.cx/networking-topics/firewalls/palo-alto-firewalls/1152-palo-alto-firewall-single-pass-parallel-processing-hardware-architecture.html
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
Answer : C
DRAG DROP -
Match the network device with the correct User-ID technology.
Select and Place:
Answer :
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?
Answer : A
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/review-new-app-id-impact-on- existing-policy-rules
How do you reset the hit count on a Security policy rule?
Answer : A
Given the topology, which zone type should you configure for firewall interface E1/1?
Answer : A
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
Answer : C
Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?
Answer : B
Four configuration choices are listed, and each could be used to block access to a specific URL. If you configured each choice to block the same URL then which choice would be the last to block access to the URL?
Answer : C