Which type of administrator account cannot be used to authenticate user traffic flowing through the
firewall's data plane? - ✔✔SAML user
Starting with PAN-OS version 9.1 which new type of object is supported for use within the User field of a
Security policy rule? - ✔✔Dynamic user group
Which link in the web interface enables a security administrator to view the Security policy rules that
match new application signatures? - ✔✔Review Apps
Which type of firewall configuration contains in-progress configuration changes? - ✔✔Canidate
Which three configuration settings are required on a Palo Alto Network firewall management interface?
- ✔✔Netmask
Default Gateway
IP Address
What is an advantage for using application tags? - ✔✔They help content updates automate policy
updates.
You receive notification about a new malware that infects hosts. An infection results in the infected host
attempting to contact a command-and-control server. Which Security Profile detects and prevents this
threat from establishing a command-and-control connection? - ✔✔Anti-Spyware Profile applied to
outbound security policies.
Which statement is true regarding a Best Practice Assessment? - ✔✔It shows how current
configuration compares to Palo Alto Networks recommendations.