Question: 1
What are three valid method of user mapping? (Choose three)
Question: 2
A Palo Alto Networks firewall is being targeted by an NTP Amplification attack and is being flooded with tens thousands of bogus UDP connections per second to a single destination IP address and post.
Which option when enabled with the correction threshold would mitigate this attack without dropping legitirnate traffic to other hosts insides the network?
Question: 3
Which three function are found on the dataplane of a PA-5050? (Choose three)
Question: 4
Which three options are available when creating a security profile? (Choose three)
Question: 5
Which two methods can be used to mitigate resource exhaustion of an application server? (Choose two)