Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
Answer : D
An administrator is updating Security policy to align with best practices.
Which Policy Optimizer feature is shown in the screenshot below?
Answer : C
Which object would an administrator create to block access to all high-risk applications?
Answer : B
Explanation/Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKECA0
An administrator would like to create a URL Filtering log entry when users browse to any gambling website. What combination of Security policy and Security profile actions is correct?
Answer : C
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Answer : A
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?
Answer : A
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
A)
B)
C)
D)
Answer : C