A customer has business-critical applications that rely on the general web-browsing application. Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?
a
Reference:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjaw53CvdHyAhUPy4UKHXT5D-MQFnoECAMQAQ&url=https%
3A%2F%2Fknowledgebase.paloaltonetworks.com%2Fservlet%2FfileField%3FentityId%3Dka10g000000U0roAAC%26field%
3DAttachment_1__Body__s&usg=AOvVaw3DCBM7-FwWInkWYANLrzUt
(32)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
bce
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
abc
In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
a
Reference:
https://www.paloaltonetworks.com/cyberpedia/zero-trust-5-step-methodology
Which methods are used to check for Corporate Credential Submissions? (Choose three.)
abd
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/methods-to-check-for-corporate-credential- submissions.html#id29eff481-13de-45b9-b73c-83e2e932ba20
What component is needed if there is a large scale deployment of Next Generation Firewalls with multiple Panorama Management Servers?
c
Reference:
https://savantsolutions.net/wp-content/uploads/woocommerce_uploads/2019/05/pcnse-study-guide-v9.pdf
(27)
The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the
NGFW?
b
Reference:
https://media.paloaltonetworks.com/documents/Single_Pass_Parallel_Processing_Architecture.pdfn
(page 6)
You have a prospective customer that is looking for a way to provide secure temporary access to contractors for a designated period of time. They currently add contractors to existing user groups and create ad hoc policies to provide network access. They admit that once the contractor no longer needs access to the network, administrators are usually too busy to manually delete policies that provided access to the contractor. This has resulted in over-provisioned access that has allowed unauthorized access to their systems.
They are looking for a solution to automatically remove access for contractors once access is no longer required.
You address their concern by describing which feature in the NGFW?
a
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)
cde
Reference:
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/threat-prevention/dns-security/enable-dns-security
What is the key benefit of Palo Alto Networks single-pass architecture (SPA) design?
b