Which steps of the cyberattack lifecycle is used by an attacker to carefully
plan their atacks? Correct Ans - Reconissance
Which typical application use can be a gray area on whether the application
should be enabled or blocked? Correct Ans - Tolerated
What is the application database that Palo Alto Networks uses along with
App-ID to identify applications? Correct Ans - applipedia.com
Which tool provides a simple workflow to migrate your legacy or port-
based Security policy rulebase to an App-ID-based rulebase? Correct
Ans - Policy Optimizer
Which tool enables you to migrate existing rules from a legacy firewall to a
Palo Alto Networks Next-Generation Firewall? Correct Ans -
Expedition
Which phase of the migration process would you use to add application-
base rules above the corresponding port-based rules? Correct Ans -
Phase 2
Which VM-Series firewall does *NOT* currently support Device-ID?
Correct Ans - VM-50
T/F. The IoT Security app approach starts by identifying and classifying the
devices in your network? Correct Ans - True
Which Level of Device Classification classifies the device based on the
vendor and model? Correct Ans - Third level
Which Policy Configuration example did the administrator enable policies
to allow Cisco VoIP devices to access only the required applications?
Correct Ans - Allow access based on device identity
Which Level of Device Classification identifies the industry in which the
device operates? Correct Ans - First level
, Organizations that have not enabled User-ID for visibility create Security
policies based on which of the following? Correct Ans - IP address
T/F. User-ID enables security teams to define policy rules on firewalls to
safely enable applications and control access based on users or groups of
users Correct Ans - True
At which step of the User-ID roadmap would you employ a IP-to-user
mapping strategy? Correct Ans - Implement user visibility
What could a SOC analyst use to trigger selective actions on the firewall
that will be enforced immediately? Correct Ans - Dynamic user
groups
What is the maximum number of agents that you can add for data
redistribution? Correct Ans - 100
What percentage of malware campaigns are expected to use some type of
encryption? Correct Ans - 70 percent
T/F. Data Loss and Compliance checks stop the loss of sensitive data such
as personally identifiable information (PII) and intellectual property (IP).
Correct Ans - True
Which of the following identifies and prevents corporate computer and
internet usage policy violations? Correct Ans - Phishing and
Credential Attacks
Which time frame within the decryption rollout is considered the most
critical and is the time when you eliminate most problems and move to
your user base? Correct Ans - days 0-30
Which protocol offers improved security, performance, and privacy benefits
over the previous versions? Correct Ans - TLS 1.3
Which of the following are challenges enterprises face in verifying users
and enforcing identity-based security? Correct Ans - -Configuring,
maintaining, and synchronizing network security with multiple IdPs can be
time-consuming and resource-intensive.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studyhall. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.99. You're not tied to anything after your purchase.