option
Cuestiones
ayuda
daypo
buscar.php

TEST BORRADO, QUIZÁS LE INTERESE: practicando 2

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
practicando 2

Descripción:
practicas

Autor:
alex
OTROS TESTS DEL AUTOR

Fecha de Creación: 13/12/2021

Categoría: Otros

Número Preguntas: 13
COMPARTE EL TEST
COMENTARNuevo Comentario
No hay ningún comentario sobre este test.
Temario:
An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact a command- and-control (C2) server. Which two security profile components will detect and prevent this threat after the firewall's signature database has been updated? (Choose two.) vulnerability protection profile applied to outbound security policies anti-spyware profile applied to outbound security policies antivirus profile applied to outbound security policies URL filtering profile applied to outbound security policies.
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers? Active Directory monitoring Windows session monitoring Windows client probing domain controller monitoring.
Which Security Profile mitigates attacks based on packet count? zone protection profile URL filtering profile antivirus profile vulnerability profile.
App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based on the information, how is the SuperApp traffic affected after the 30 days have passed? All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer matches the SuperApp-base application No impact because the apps were automatically downloaded and installed No impact because the firewall automatically adds the rules to the App-ID interface All traffic matching the SuperApp_base, SuperApp_chat, and SuperApp_download is denied until the security administrator approves the applications.
An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server. Which security profile components will detect and prevent this threat after the firewall's signature database has been updated? antivirus profile applied to outbound security policies data filtering profile applied to inbound security policies data filtering profile applied to outbound security policies vulnerability profile applied to inbound security policies.
You receive notification about a new malware that infects hosts. An infection results in the infected host attempting to contact a command-and-control server. Which Security Profile detects and prevents this threat from establishing a command-and-control connection? Vulnerability Protection Profile applied to outbound Security policy rules. Anti-Spyware Profile applied to outbound security policies. Antivirus Profile applied to outbound Security policy rules Data Filtering Profile applied to outbound Security policy rules.
You receive notification about new malware that infects hosts through malicious files transferred by FTP. Which Security profile detects and protects your internal networks from this threat after you update your firewall's threat signature database? URL Filtering profile applied to inbound Security policy rules. Data Filtering profile applied to outbound Security policy rules. Antivirus profile applied to inbound Security policy rules. Vulnerability Protection profile applied to outbound Security policy rules.
Which two security profile types can be attached to a security policy? (Choose two.) antivirus DDoS protection threat vulnerability .
Which dynamic update type includes updated anti-spyware signatures? PAN-DB Applications and Threats GlobalProtect Data File Antivirus.
Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management plane is only slightly utilized. Which User-ID agent is sufficient in your network? Windows-based agent deployed on each domain controller PAN-OS integrated agent deployed on the firewall Citrix terminal server agent deployed on the network Windows-based agent deployed on the internal network a domain member.
Which Security profile can you apply to protect against malware such as worms and Trojans? antivirus data filtering vulnerability protection anti-spyware .
Which two palo alto networks security management tools provide a consolidated creation of policies , centralized management and centralized threat intelligence Autofocus Apertura GlobalProtect Panorama.
An administrator wants to prevent users from submitting corporate credentials in a phishing attack. Which Security profile should be applied? antivirus anti-spyware URL-filtering vulnerability protection.
Denunciar Test