Palo Alto Networks publishes updated Command and Control signatures.
How frequently should the related signatures schedule be set?
Answer : D
What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types. The customer believes that someone has clicked an email that might have contained a malicious file type. The customer already uses a firewall with User-ID enabled.
Which feature must also be enabled to prevent these attacks?
Answer : A
What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?
Answer : B
Which three application options can be selected in the security policy rule? (Choose three.)
Answer : A, B, D
What two advantages of the DNS Sinkholing feature? (Choose two)