The target allows you to select a device that the policy will be pushed to
Question 5
You receive notification about new malware that is being used to attack hosts. The malware exploits a software bug in common application. Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?
A.
Data Filtering Profile applied to outbound Security policy rules
B.
Antivirus Profile applied to outbound Security policy rules
C.
Data Filtering Profile applied to inbound Security policy rules
D.
Vulnerability Protection Profile applied to inbound Security policy rules
Answer:
b
User Votes:
A 1 votes
50%
B 5 votes
50%
C
50%
D 1 votes
50%
Discussions
0/ 1000
Question 6
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control (RBAC)? (Choose two.)
Assume a custom URL Category Object of `NO-FILES` has been created to identify a specific website. How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
A.
Create a Security policy with a URL Filtering profile that references the site access setting of block to NO-FILES.
B.
Create a Security policy that references NO-FILES as a URL Category qualifier with an appropriate File Blocking profile.
C.
Create a Security policy with a URL Filtering profile that references the site access setting of continue to NO-FILES.
D.
Create a Security policy that references NO-FILES as a URL Category qualifier with an appropriate Data Filtering profile.