Which statement is true regarding a Prevention Posture Assessment?
Correct Answer:
B
Which type of profile must be applied to the Security policy rule to protect against buffer overflows illegal code execution and other attempts to exploit system flaws?
Correct Answer:
C
Which three configuration settings are required on a Palo Alto networks firewall management interface?
Correct Answer:
ABC
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )
Correct Answer:
ABD
What is considered best practice with regards to committing configuration changes?
Correct Answer:
A