Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
Correct Answer:
C
How often does WildFire release dynamic updates?
Correct Answer:
A
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?
Correct Answer:
A
Another reason to choose the Windows agent over the integrated PAN-OS agent is to save processing cycles on the firewall’s management plane.
During the packet flow process, which two processes are performed in application identification? (Choose two.)
Correct Answer:
AB
Match the cyber-attack lifecycle stage to its correct description.
Solution:
Does this meet the goal?
Correct Answer:
A