Which type of profile must be applied to the Security policy rule to protect against buffer overflows illegal code execution and other attempts to exploit system flaws?
Correct Answer:
C
Reference:https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-security-profiles-vulnerability-protection.html
Vulnerability Protection Security Profiles protect against threats entering the network. Forexample, Vulnerability Protection Security Profiles protect against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. The default Vulnerability Protection Security Profile protects clients and servers from all known critical-, high-, and medium-severity threats. You also can create exceptions that enable you to change the response to a specific signature.
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Correct Answer:
C
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal.html
A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
Correct Answer:
A
Which interface does not require a MAC or IP address?
Correct Answer:
A
An administrator is updating Security policy to align with best practices. Which Policy Optimizer feature is shown in the screenshot below?
Correct Answer:
C