Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
Answer : B
The Policy Optimizer is a feature in the PAN-OS GUI that allows an administrator to monitor the rule usage for a specified period of time, as well as optimize the security policies based on the traffic logs and recommendations. The Policy Optimizer can help the administrator to improve the security posture, reduce the attack surface, and simplify the policy management. The Policy Optimizer can be accessed from Policies > Policy Optimizer in the PAN-OS GUI.Reference:Policy Optimizer,View Policy Rule Usage,Updated Certifications for PAN-OS 10.1
Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose two.)
Which order of steps is the correct way to create a static route?
Answer : A
Enter the route and netmask
Enter the IP address for the specific next hop
Specify the outgoing interface for packets to use to go to the next hop
Configure a Static Route - Palo Alto Networks
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.
What object is best suited for this configuration?
Answer : A
A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.
To which two types of traffic will the rule apply? (Choose two.)
Answer : A, B
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTHCA0
Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?
Answer : B
URL filtering technology protects users from web-based threats by providing granular control over user access and interaction with content on the Internet. You can develop a URL filtering policy that limits access to sites based on URL categories, users, and groups. For example, you can block access to sites known to host malware and prevent end users from entering corporate credentials to sites in certain categories.
Which situation is recorded as a system log?
Answer : B