In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)
A. Antivirus
B. URL Filtering
C. Vulnerability Protection
D. Anti-spyware
Given the topology, which zone type should you configure for firewall interface E1/1?
A. Tap
B. Tunnel
C. Virtual Wire
D. Layer3
In the example security policy shown, which two websites fcked? (Choose two.)
A. LinkedIn
B. Facebook
C. YouTube
D. Amazon
Access to which feature requires the PAN-OS Filtering license?
A. PAN-DB database
B. DNS Security
C. Custom URL categories
D. URL external dynamic lists
A coworker found a USB labeled "confidential in the parking lot. They inserted the drive and it infected their corporate laptop with unknown malware The malware caused the laptop to begin infiltrating corporate data. Which Security Profile feature could have been used to detect the malware on the laptop?
A. DNS Sinkhole
B. WildFire Analysis
C. Antivirus
D. DoS Protection
An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240 addresses and found that connections from addresses that needed new translations were being dropped.
Which type of NAT was configured?
A. Dynamic IP
B. Static IP
C. Dynamic IP and Port
D. Destination NAT
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization. What object is best suited for this configuration?
A. Application Group
B. Tag
C. External Dynamic List
D. Application Filter
Given the detailed log information above, what was the result of the firewall traffic inspection?
A. It was blocked by the Anti-Virus Security profile action.
B. It was blocked by the Anti-Spyware Profile action.
C. It was blocked by the Vulnerability Protection profile action.
D. It was blocked by the Security policy action.