1.
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?
2.
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?
3.
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
4.
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
5.
Which file is used to save the running configuration with a Palo Alto Networks firewall?
6.
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?
7.
Complete the statement. A security profile can block or allow traffic.
 
8.
address used by wireless devices to support a new compliance requirement. You must collect IP
9.
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
10.
Identify the correct order to configure the PAN-OS integrated USER-ID agent.
3. add the service account to monitor the server(s)
2. define the address of the servers to be monitored on the firewall
4. commit the configuration, and verify agent connection status
1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent