Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
Correct Answer:
D
Which two security profile types can be attached to a security policy? (Choose two.)
Correct Answer:
AD
What must be configured before setting up Credential Phishing Prevention?
Correct Answer:
B
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/set-u
Match the Cyber-Attack Lifecycle stage to its correct description.
Solution:
Reconnaissance – stage where the attacker scans for network vulnerabilities and services that can be exploited. Installation – stage where the attacker will explore methods such as a root kit to establish persistence Command and Control – stage where the attacker has access to a specific server so they can communicate and
pass data to and from infected devices within a network.
Act on the Objective – stage where an attacker has motivation for attacking a network to deface web property
Does this meet the goal?
Correct Answer:
A
Which operations are allowed when working with App-ID application tags?
Correct Answer:
B