Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
Which feature enables an administrator to review the Security policy rule base for unused rules?
Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
Which solution is a viable option to capture user identification when Active Directory is not in use?
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
Which two security profile types can be attached to a security policy? (Choose two.)
What is used to monitor Security policy applications and usage?
Which setting is available to edit when a tag is created on the local firewall?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Paloalto Networks Free Exams |
---|
![]() |