A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
Correct Answer:
A
When creating a Panorama administrator type of Device Group and Template Admin, which two things must you create first? (Choose two.)
Correct Answer:
CD
What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)
Correct Answer:
BCE
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?
Correct Answer:
A
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic
________ .
Correct Answer:
B