Which protocol used to map username to user groups when user-ID is configured?
Correct Answer:
D
You receive notification about new malware that infects hosts through malicious files transferred by FTP. Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
Correct Answer:
C
Match the Palo Alto Networks Security Operating Platform architecture to its description.
Solution:
Threat Intelligence Cloud – Gathers, analyzes, correlates, and disseminates threats to and from the network and endpoints located within the network.
Next-Generation Firewall – Identifies and inspects all traffic to block known threats
Advanced Endpoint Protection - Inspects processes and files to prevent known and unknown exploits
Does this meet the goal?
Correct Answer:
A
Which dynamic update type includes updated anti-spyware signatures?
Correct Answer:
A
Place the following steps in the packet processing order of operations from first to last.
Solution:
Does this meet the goal?
Correct Answer:
A