What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)
Correct Answer:
AB
What is the maximum volume of concurrent administrative account sessions?
Correct Answer:
C
Access to which feature requires the PAN-OS Filtering license?
Correct Answer:
A
Which statement is true about Panorama managed devices?
Correct Answer:
D
You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?
Correct Answer:
D
Anti-Spyware Security Profiles block spyware on compromised hosts from trying to communicate with external command-and-control (C2) servers, thus enabling you to detect malicious traffic leaving the network from infected clients.