WhenAdvanced URL Filteringis enabled,Credential Phishing Preventioncan be activated toprotect against phishing attacksby blocking unauthorized credential submissions.
Uses Username-to-IP Mapping– Identifies usersbased on their IP and login credentials.
Prevents Credential Theft– Blocks users from submitting corporate credentials tountrusted or malicious websites.
Works Alongside Advanced URL Filtering– Detects and categorizesphishing domains in real-time, stopping credential leaks.
Can Enforce Action-Based Policies– Configures policies toalert, block, or validate credential submissions.
A. Host Information Profile (HIP)❌
Incorrect, becauseHIP checks device healthbut does notprevent credential phishing.
C. Client Probing❌
Incorrect, becauseClient Probing is used for User-ID mapping, notphishing prevention.
D. Indexed Data Matching❌
Incorrect, becauseIndexed Data Matching is used for DLP (Data Loss Prevention), not for credential protection.
Firewall Deployment– Protectsuser credentials from phishing attacks.
Security Policies– Ensuresusers do not submit credentials to malicious sites.
VPN Configurations– Protectsremote users connecting via GlobalProtectfrom credential theft.
Threat Prevention– Works withThreat Intelligenceto detect new phishing sites.
WildFire Integration– Scansunknown websites for phishing behaviors.
Panorama– Centralized enforcement ofCredential Phishing Prevention policies.
Zero Trust Architectures– Ensuresonly legitimate authentication events occur within trusted environments.
How Credential Phishing Prevention Works:Why Other Options Are Incorrect?References to Firewall Deployment and Security Features:Thus, the correct answer is:✅B. Credential phishing prevention