00:00

QUESTION 66

What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)

Correct Answer: AB

QUESTION 67

What is the maximum volume of concurrent administrative account sessions?

Correct Answer: C

QUESTION 68

Access to which feature requires the PAN-OS Filtering license?

Correct Answer: A

QUESTION 69

Which statement is true about Panorama managed devices?

Correct Answer: D

QUESTION 70

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

Correct Answer: D
Anti-Spyware Security Profiles block spyware on compromised hosts from trying to communicate with external command-and-control (C2) servers, thus enabling you to detect malicious traffic leaving the network from infected clients.