Prev Next Question 67/91 - PCNSE.v2018-11-18

If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will be detected as credential theft?

Comments (The most recent comments are at the top.)

- Mar 21, 2019

If you plan to use the domain credential filter method, which detects whether a user is submitting a valid username and password and that those credentials match the user who is logged in to the source IP address of the session, Configure Credential Detection with the Windows-basedUser-IDAgent and Map IP Addresses to Users.

so the A is correct (the link provided step 1, lst point )

- Jan 03, 2019

The answer is C

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (91q)
1 commentQuestion 1: An administrator wants multiple web servers in the DMZ to re...
Question 2: An administrator has users accessing network resources throu...
3 commentQuestion 3: A customer has an application that is being identified as un...
Question 4: An administrator wants a new Palo Alto Networks NGFW to obta...
Question 5: What is exchanged through the HA2 link?...
Question 6: A Palo Alto Networks NGFW just submitted a file to WildFire ...
Question 7: Refer to the exhibit. (Exhibit) Which will be the egress int...
Question 8: An administrator has configured a QoS policy rule and a QoS ...
Question 9: View the GlobalProtect configuration screen capture. What is...
Question 10: Which two methods can be used to verify firewall connectivit...
Question 11: Which option would an administrator choose to define the cer...
Question 12: Which method does an administrator use to integrate all non-...
2 commentQuestion 13: Which option enables a Palo Alto Networks NGFW administrator...
Question 14: If an administrator wants to decrypt SMTP traffic and posses...
Question 15: Which is the maximum number of samples that can be submitted...
Question 16: Which two subscriptions are available when configuring panor...
1 commentQuestion 17: An administrator has configured the Palo Alto Networks NGFW'...
Question 18: In High Availability, which information is transferred via t...
Question 19: Which three options are supported in HA Lite? (Choose three....
Question 20: In which two types of deployment is active/active HA configu...
Question 21: Which four NGFW multi-factor authentication factors are supp...
2 commentQuestion 22: An administrator has left a firewall to use the default port...
Question 23: Which Captive Portal mode must be configured to support MFA ...
Question 24: Which three authentication factors does PAN-OS® software sup...
1 commentQuestion 25: A client is concerned about resource exhaustion because of d...
3 commentQuestion 26: What are the differences between using a service versus usin...
Question 27: Which GlobalProtect Client connect method requires the distr...
Question 28: An administrator is using Panorama and multiple Palo Alto Ne...
Question 29: The firewall determines if a packet is the first packet of a...
2 commentQuestion 30: An administrator creates an SSL decryption rule decrypting t...
Question 31: Which logs enable a firewall administrator to determine whet...
Question 32: Where can an administrator see both the management plane and...
Question 33: A session in the Traffic log is reporting the application as...
Question 34: Which two features does PAN-OS® software use to identify app...
2 commentQuestion 35: During the packet flow process, which two processes are perf...
Question 36: Which CLI command can be used to export the tcpdump capture?...
Question 37: An administrator logs in to the Palo Alto Networks NGFW and ...
Question 38: Which Panorama administrator types require the configuration...
Question 39: When configuring the firewall for packet capture, what are t...
1 commentQuestion 40: What are two benefits of nested device groups in Panorama? (...
Question 41: A customer wants to combine multiple Ethernet interfaces int...
Question 42: A company wants to install a PA-3060 firewall between two co...
Question 43: Which two settings can be configured only locally on the fir...
3 commentQuestion 44: The firewall identifies a popular application as an unknown-...
1 commentQuestion 45: Based on the following image, what is the correct path of ro...
1 commentQuestion 46: Which three steps will reduce the CPU utilization on the man...
1 commentQuestion 47: Which three file types can be forwarded to WildFire for anal...
Question 48: A customer wants to set up a site-to-site VPN using tunnel i...
Question 49: The certificate information displayed in the following image...
Question 50: Which feature must you configure to prevent users form accid...
Question 51: Which Palo Alto Networks VM-Series firewall is valid?...
1 commentQuestion 52: Refer to the exhibit. (Exhibit) Which certificates can be us...
1 commentQuestion 53: Which data flow describes redistribution of user mappings?...
Question 54: Which event will happen if an administrator uses an Applicat...
Question 55: An administrator needs to optimize traffic to prefer busines...
Question 56: Which Security policy rule will allow an admin to block face...
1 commentQuestion 57: Which three settings are defined within the Templates object...
Question 58: Which prerequisite must be satisfied before creating an SSH ...
Question 59: Which log file can be used to identify SSL decryption failur...
1 commentQuestion 60: Which operation will impact performance of the management pl...
Question 61: Which DoS protection mechanism detects and prevents session ...
Question 62: Which CLI command enables an administrator to view details a...
Question 63: Which option is part of the content inspection process?...
Question 64: In a virtual router, which object contains all potential rou...
Question 65: How would an administrator monitor/capture traffic on the ma...
2 commentQuestion 66: An administrator wants to upgrade an NGFW from PAN-OS® 7.1.2...
2 commentQuestion 67: If the firewall is configured for credential phishing preven...
2 commentQuestion 68: Which three authentication services can administrator use to...
Question 69: If the firewall has the link monitoring configuration, what ...
Question 70: A client has a sensitive application server in their data ce...
Question 71: A speed/duplex negotiation mismatch is between the Palo Alto...
Question 72: An administrator needs to determine why users on the trust z...
Question 73: Based on the image, what caused the commit warning? (Exhibit...
1 commentQuestion 74: VPN traffic intended for an administrator's Palo Alto Networ...
Question 75: Which Zone Pair and Rule Type will allow a successful connec...
Question 76: Which feature can provide NGFWs with User-ID mapping informa...
2 commentQuestion 77: A web server is hosted in the DMZ, and the server is configu...
Question 78: For which two reasons would a firewall discard a packet as p...
Question 79: Which CLI command enables an administrator to check the CPU ...
Question 80: Which feature can be configured on VM-Series firewalls?...
Question 81: Which User-ID method maps IP addresses to usernames for user...
Question 82: An administrator creates a custom application containing Lay...
Question 83: Which tool provides an administrator the ability to see tren...
Question 84: When backing up and saving configuration files, what is achi...
1 commentQuestion 85: Which protection feature is available only in a Zone Protect...
1 commentQuestion 86: An administrator needs to implement an NGFW between their DM...
Question 87: An administrator just submitted a newly found piece of spywa...
Question 88: Which feature prevents the submission of corporate login inf...
Question 89: Which three user authentication services can be modified to ...
Question 90: Which menu item enables a firewall administrator to see deta...
1 commentQuestion 91: An administrator needs to upgrade a Palo Alto Networks NGFW ...