Which path in PAN-OS 10.0 displays the list of port-based security policy rules?
Correct Answer:
A
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/security-policy-rule-optimization/migrate-po
Which URL profiling action does not generate a log entry when a user attempts to access that URL?
Correct Answer:
B
An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.
Which Security profile should be used?
Correct Answer:
C
You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?
Correct Answer:
D
Anti-Spyware Security Profiles block spyware on compromised hosts from trying to communicate with external command-and-control (C2) servers, thus enabling you to detect malicious traffic leaving the network from infected clients.
What allows a security administrator to preview the Security policy rules that match new application signatures?
Correct Answer:
B
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content