An administrator needs a PDF summary report that contains information compiled from existing reports based
on data for the top 5 in each category.
How often will the Administrator receive the report?
A.
Bi-weekly
B.
Daily
C.
Weekly
D.
Monthly
Daily
Which option is required to activate/retrieve a Device Management License on the M.100 Appliance after the
Auth Codes have been activated on the Palo Alto Networks Support Site?
A.
Generate a Tech Support File and call PANTAC
B.
Select Device > Licenses and click activate feature using authorization code
C.
Select PANORAMA > Licenses and click Activate feature using authorization code
D.
Generate a State Dump File and upload it to the Palo Alto Network support portal
Select PANORAMA > Licenses and click Activate feature using authorization code
How many recursion levels are supported for compressed files in PAN-OS 8.0?
A.
2
B.
5
C.
4
D.
3
3
An endpoint, inside an organization, is infected with known malware. The malware attempts to make a
command and control connection to a C&C server via the destination IP address.
Which mechanism prevent this connection from succeeding?
A.
DNS Sinkholing
B.
DNS Proxy
C.
Anti-Spyware Signatures
D.
Wildfire Analysis
DNS Sinkholing
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the
Threat Intelligence Cloud? (Choose three.)
A.
Vulnerability protection
B.
Anti-Spyware
C.
Anti-Virus
D.
Botnet detection
E.
App-ID protection
Vulnerability protection
Anti-Spyware
App-ID protection
Page 1 out of 12 Pages |