PaloAlto Final
Select True or False. Logging on intrazone-default and interzone-default Security policy rules is enabled by default.
False
Select True or False. On the Next Generation firewall, application groups are always automatically updated when new applications are added to the App-ID database.
False
Select True or False. The running configuration consists of configuration changes in progress but not active on the firewall.
False
True or false? If OCSP and CRL are configured on a firewall, CRL is consulted first.
False
True or false? SNMP GET requests to a firewall return operational statistics, and SNMP SET requests update the firewall configuration.
False
True or false? When a malicious file or link is detected in an email, WildFire can update antivirus signatures in the PAN-DB database.
False
Select True or False. A Layer 3 interface can be configured as dual stack with both IPv4 and IPv6 addresses.
True
Select True or False. All of the interfaces on a Next Generation firewall must be the same interface type.
True
Select True or False. By default, the firewall uses the management (MGT) interface to access external services, such as DNS servers, external authentication servers, Palo Alto Networks services such as software, URL updates, licenses and AutoFocus.
True
Select True or False. In a Next Generation firewall, every interface in use must be assigned to a zone in order to process traffic.
True
Select True or False. In addition to routing to other network devices, virtual routers on the Next Generation firewall can route to other virtual routers.
True
Select True or False. On the Next Generation firewall, a commit lock blocks other administrators from committing changes until all of the locks have been released.
True
Select True or False. Security policy rules on the Next Generation firewall specify a source and a destination interface.
True
Select True or False. Server Profiles define connections that the firewall can make to external servers.
True
Select True or False. Traffic protection from external locations where the egress point is the perimeter is commonly referred to as "North-South" traffic.
True
Select True or false. Service routes can be used to configure an in-band port to access external services.
True
Select True or false. The CN-Series firewalls deliver the same capabilities as the PA-Series and VM-Series firewalls.
True
True or False. If a file type is matched in the File Blocking Profile and WildFire Analysis Profile, and if the File Blocking Profile action is set to "block," then the file is not forwarded to WildFire.
True
True or False. In the Next Generation Firewall, even if the Decryption policy rule action is "no-decrypt," the Decryption Profile attached to the rule can still be configured to block sessions with expired or untrusted certificates.
True
True or False. The User-ID feature identifies the user and IP address of the computer the user is logged into for Next Generation firewall policy enforcement.
True
True or false? A Security Profile attached to a Security policy rule is evaluated only if the Security policy rule matches traffic and the rule action is set to "allow."
True
True or false? A URL Filtering license is not required to define and use custom URL categories.
True
True or false? Certificate-based authentication replaces all other forms of either local or external authentication.
True
True or false? If App-ID cannot identify the traffic, Content-ID cannot inspect the traffic for malware.
True
True or false? The SSL forward untrusted certificate should not be trusted by the client but should still be a CA certificate.
True
True or false? The firewall still can check for expired or untrusted certificates even if the SSL traffic is not being decrypted.
True
True or false? When migration is done from the firewall of another vendor to a Palo Alto Networks firewall, a best practice is to always migrate the existing Security policy.
True
True or false? You can customize the list of logs that are aggregated into the Unified log.
True
Which two firewall features display information using widgets? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted Select one or more: a. ACC b. Dashboard c. Traffic log d. Botnet report
a. ACC b. Dashboard
Which URL filtering security profile action logs the category to the URL filtering log? Select one: a. Alert b. Log c. Allow d. Default
a. Alert
What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth? Select one: a. Application Command Center (ACC) b. Quality of Service Statistics c. Applications Report d. Quality of Service Log
a. Application Command Center (ACC)
Which attribute is associated with the dedicated out-of-band network management port in Palo Alto Networks firewalls? Select one: a. Cannot be configured as a standard traffic port b. Requires a static, non-DHCP network configuration c. Supports only SSH connections d. Supports DHCP only
a. Cannot be configured as a standard traffic port
Which two statements are true regarding User-ID and firewall configuration? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted Select one or more: a. Communication between the firewall and USER-ID agent are sent over an encrypted SSL connection b. The firewall needs to have information for every USER-ID agent for which it will connect c. NETBIOS is the only client-probing method supported by the USER-ID agent d. The USER-ID agent must be installed on the domain controller
a. Communication between the firewall and USER-ID agent are sent over an encrypted SSL connection b. The firewall needs to have information for every USER-ID agent for which it will connect
Which anti-spyware feature enables an administrator to quickly identify a potentially infected host on the network? Select one: a. DNS SInkhole b. continue response page c. CVE Number d. data filtering log entry
a. DNS SInkhole
Which file type can a firewall send to WildFire when the firewall does not have a WildFire subscription? Select one: a. EXE b. PDF c. JAR d. APK
a. EXE
In a Next Generation firewall, how many packet does it take to identify the application in a TCP exchange? Select one: a. Four or five b. Two c. Three d. One
a. Four or five
In the Palo Alto Networks Firewall WebUI, which type of report can be compiled into a single emailed PDF? Select one: a. Group b. Botnet c. PDF Summary d. Predefined
a. Group
Which type of Security policy rule is the default rule type? Select one: a. Interzone b. Universal c. Default d. Intrazone
a. Interzone
Which statement is true regarding the Palo Alto Networks Firewall candidate configuration? Select one: a. It can be reverted to the current configuration. b. It controls the current operation of the firewall. c. It does not control changes to the current configuration. d. It always contains the factory default configuration.
a. It can be reverted to the current configuration.
Which series of Palo Alto Networks Next Generation Firewall offers two modes, Secure Mode, and Express Mode? a. K2 b. VM c. CN d. VS
a. K2
What are the three pre-defined tabs in the Next Generation firewall Application Command Center (ACC)? Choose the 3 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. Network Traffic b. Blocked Activity c. Application Traffic d. Threat Activity
a. Network Traffic b. Blocked Activity d. Threat Activity
What are the three pre-defined tabs in the Next Generation firewall Application Command Center (ACC)? Choose the 3 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. Network Traffic b. Application Traffic c. Threat Activity d. Blocked Activity
a. Network Traffic c. Threat Activity d. Blocked Activity
Which series of firewall is a high-performance physical appliance solution? Select one: a. PA b. VM c. CN d. HA
a. PA
When creating a custom admin role, which type of privileges can not be defined? Select one: a. Panorama b. WebUI c. Command Line d. REST API e. XML API
a. Panorama
Which action in a Security policy rule results in traffic being silently rejected? Select one: a. Reset Server b. Drop c. Reset Client d. Deny
a. Reset Server
Which type of Next Generation Firewall decryption inspects SSL traffic between an internal host and an external web server? Select one: a. SSL Forward Proxy b. SSL Outbound Inspection c. SSH d. SSL Inbound Inspection
a. SSL Forward Proxy
When creating an application filter, which of the following is true? Select one: a. They are called dynamic because they will automatically include new applications from an application signature update if the new application's type is included in the filter b. Excessive bandwidth may be used as a filter match criteria c. They are called dynamic because they automatically adapt to new IP addresses d. They are used by malware
a. They are called dynamic because they will automatically include new applications from an application signature update if the new application's type is included in the filter
What are the three pre-defined tabs in the Next Generation firewall Application Command Center (ACC)? Choose the 3 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. Threat Activity b. Network Traffic c. Application Traffic d. Blocked Activity
a. Threat Activity b. Network Traffic d. Blocked Activity
What component of the Next Generation Firewall will protect from port scans? Select one: a. Zone protection b. DOS Protection c. Vulnerability protection d. Anti-Virus Protection
a. Zone protection
NGFW QoS policies can be configured to apply: Select one: a. either preferential treatment or bandwidth-limiting traffic rules b. forwarding for anti-virus screening c. data encryption d. third party authentication
a. either preferential treatment or bandwidth-limiting traffic rules
How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application? Select one: a. insufficient-data b. not-applicable c. unknown-tcp d. incomplete
a. insufficient-data
Which two types of activities does SSL/TLS decryption on the firewall help to block? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted Select one or more: a. malware introduction b. protocol-based attacks c. denial-or-service attacks d. sensitive data exfiltration
a. malware introduction d. sensitive data exfiltration
Select the answer that best completes this sentence. Source NAT commonly is used for _________ users to access the ________ internet. Select one: a. private, public b. private, private c. public, public d. public, private
a. private, public
Which three methods does App-ID use to identify network traffic? Choose the 3 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. protocol decoders b. signatures c. URL category d. application filter match e. heuristics
a. protocol decoders b. signatures e. heuristics
Which command will reset a next generation firewall to its factory default settings if you know the admin account password? Select one: a. request system private-data-reset b. reset system settings c. reload d. reset startup-config
a. request system private-data-reset
Which role-based privilege allows full access to the Palo Alto Networks firewall, including defining new administrator accounts and virtual systems? Select one: a. superuser b. deviceadmin c. superreader d. devicereader
a. superuser
The first important task of building a Zero Trust Architecture is to identify __________________. a. the protect surface b. interdependencies c. traffic d. microperimeter
a. the protect surface
Which port does the Palo Alto Networks Windows-based User-ID agent use by default? Select one: a. TCP port 5007 b. TCP port 4125 c. TCP port 80 d. TCP port 443
a.TCP port 5007
To properly configure DOS protection to limit the number of sessions individually from specific source IPS you would configure a DOS Protection rule with the following characteristics: Select one: a. Action: Deny, Classified Profile with "Resources Protection" configured, and Classified Address with "source-ip-only" configured b. Action: Protect, Classified Profile with "Resources Protection" configured, and Classified Address with "source-ip-only" configured c. Action: Protect, Aggregate Profile with "Resources Protection" configured d. Action: Deny, Aggregate Profile with "Resources Protection" configured
b. Action: Protect, Classified Profile with "Resources Protection" configured, and Classified Address with "source-ip-only" configured
Which type of firewall license or subscription provides a graphical analysis of firewall traffic logs and identifies potential risks to your network by using threat intelligence from a portal? Select one: a. Threat Prevention b. AutoFocus c. WildFire d. GlobalProtect
b. AutoFocus
When using config audit to compare configuration files on a Next Generation firewall, what does the yellow indication reveal? Select one: a. Deletion b. Change c. Addition d. None
b. Change
When making changes to configuration settings on the PAN-OS firewall, which of the following options lists the individual changes for which you are committing changes: Select one: a. Validate Commit b. Change Summary c. Preview Changes for all d. Preview Changes for selected administrators.
b. Change Summary
When committing changes to a firewall, what is the result of clicking the Preview Changes link? Select one: a. Displays any unresolved application dependencies b. Compares the candidate configuration to the running configuration c. Lists the individual settings for which you are committing changes d. Shows any error messages that would appear during a commit
b. Compares the candidate configuration to the running configuration
What action will show whether a downloaded PDF file from a user has been blocked by a security profile on the Next Generation firewall? Select one: a. Filter the system log for failed download messages b. Filter the data filtering logs for the user's traffic and the name of the PDF file c. Filter the session browser for all sessions from a user with the application adobe d. Filter the traffic logs for all traffic from the user that resulted in a deny action
b. Filter the data filtering logs for the user's traffic and the name of the PDF file
Which Palo Alto Networks product for securing the enterprise extends the enterprise perimeter to remote offices and mobile users? Select one: a. WildFire b. GlobalProtect c. Panorama d. VM-Serie
b. GlobalProtect
A Zone Protection Profile is applied to which item? Select one: a. Egress Ports b. Ingress Ports c. Security Policy Rules d. Address Groups
b. Ingress Ports
Which NGFW security policy rule applies to all matching traffic within the specified source zones? Select one: a. Interzone b. Intrazone c. Universal d. Default
b. Intrazone
Which one of the following statements is true about NAT rules? Select one: a. The addresses used in source NAT rules always refer to the original IP address in the packet (that is, the pre-translated address). b. NAT rules provide address translation, while security policy rules allow or deny packets. c. The destination zone in the security rule is determined before the route lookup of the post-NAT destination IP address. d. NAT rules are applied after security policy rules.
b. NAT rules provide address translation, while security policy rules allow or deny packets.
When resetting the PAN-OS firewall to factory defaults, you can save all configuration settings and logs by performing the following: Select one: a. Selecting 'yes' when prompted b. None of the above c. Pressing Shift-C when prompted d. Executing the CLI command when in maintenance mode: rebuild/FactoryReset
b. None of the above
Which Strata product provides centralized firewall management and logging? Select one: a. Prisma Access b. Panorama c. WildFire d. GlobalProtect
b. Panorama
In the latest Next Generation firewall version, what is the shortest time that can be configured on the firewall to check for Wildfire updates? Select one: a. 1 Hour b. Real Time c. 15 Minutes d. 5 Minutes
b. Real Time
Which Next Generation FW configuration type has settings active on the firewall? Select one: a. Startup b. Running c. Legacy d. Candidate
b. Running
Which feature can be configured with an IPv6 address? Select one: a. DHCP Server b. Static Route c. RIPv2 d. BGP
b. Static Route
When defining Security policy rules, why should you consider only the c2s flow direction, and define policy rules that allow or deny traffic from the source zone to the destination zone, that is, in the c2s direction? Select one: a. Default rules are predefined to allow all interzone traffic (between zones) and deny all intrazone traffic (within a zone). b. The return s2c flow does not require a separate rule because the return traffic automatically is allowed c. The return c2s flow does not require a separate rule because communications are automatically allowed. d. For traffic that does not match any custom defined rules, all communications are conducted in a separate traffic buffer
b. The return s2c flow does not require a separate rule because the return traffic automatically is allowed
Network traffic matches an "allow" rule in the Security policy, but the attached File Blocking Profile is configured with a "block" action. To which two locations will the traffic be logged? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. Alarms Log b. Traffic Log c. Data Filtering Log d. Threat Log
b. Traffic Log c. Data Filtering Log
Which Palo Alto Networks Next Generation VM Series Model requires a minimum of 16 GB of memory and 60 GB of dedicated disk drive capacity? a. VM-100 b. VM-500 c. VM-50 d. VM-700
b. VM-500
Assume you have a WildFire subscription. Which file state or condition would trigger a Wildfire file analysis? Select one: a. file size limit exceeded b. file located in a JAR or RAR archive c. executable file signed by trusted signer d. file already has WildFire hash
b. file located in a JAR or RAR archive
According to best practices, which two URL filtering categories should be blocked in most URL Filtering Profiles? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. medium-risk b. high-risk c. adult d. new-registered-domain
b. high-risk d. new-registered-domain
A strength of the Palo Alto Networks firewall is: Select one: a. hardware consolidation - data and control plane processing is improved and performed in successive linear fasion b. its single-pass parallel processing (SP3) engine and software performs operations once per packet c. increased buffering capability.
b. its single-pass parallel processing (SP3) engine and software performs operations once per packet
Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user's browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log? Select one: a. block b. override c. continue d. alert
b. override
What is the recommended maximum default size of PE - executable - files forwarded from the Next Generation firewall to Wildfire? Select one: a. Configurable up to 2 megabytes b. Configurable up to 10 megabytes c. 16 megabytes d. Always 2 megabytes
c. 16 megabytes
Select the answer that completes this sentence. DIPP source NAT will support a maximum of about ______________ concurrent sessions on each IP address configured within the NAT pool. Select one: a. 8100 b. 250 c. 64,000 d. 16,300
c. 64,000
The Gartner Magic Quadrant for Network Firewalls rates company's: Select one: a. Growth Potential / Profitability b. Regulatory Compliance / Intellectual Properties c. Ability to Execute / Completeness of Vision
c. Ability to Execute / Completeness of Vision
What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth? Select one: a. Quality of Service Log b. Applications Report c. Application Command Center (ACC) d. Quality of Service Statistics
c. Application Command Center (ACC)
When creating PAN-OS firewall administrator accounts, which configuration step is required for Non-Local Administrators, but not for Local Administrators? Select one: a. API Interface b. Directory Services Replication c. Authentication Profile d. Authentication Sequence
c. Authentication Profile
For guidance on continuing to deploy the security platform features to address your network security needs, review the PAN-OS Administrator's Guide section titled ______________________________________________. a. Best Practices for Securing Administrative Access b. Set Up a Basic Security Policy c. Best Practices for Completing the Firewall Deployment d. Register the Firewall
c. Best Practices for Completing the Firewall Deployment
Which is the correct URL matching order on a Palo Alto Networks Next Generation Firewall? Select one: a. Block, Allow, Custom URL, External Dynamic, PAN-DB Download, PAN-DB Cloud, PAN-DB Cache b. Allow, Block, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud c. Block, Allow, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud d. Block, Allow, External Dynamic, Custom URL, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
c. Block, Allow, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
Which feature can be configured to block sessions that the firewall cannot decrypt? Select one: a. Decryption profile in PBF b. Decryption profile in security policy c. Decryption profile in decryption policy d. Decryption profile in security profile
c. Decryption profile in decryption policy
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display? Select one: a. Group b. Universal c. Global d. Local
c. Global
Which statement about the automated correlation engine is not correct? Select one: a. It outputs correlation events. b. It detects possible infected hosts. c. It is available only in Panorama d. It uses correlation objects as input.
c. It is available only in Panorama
What is the method used to create a Zero Trust policy that answers the 'who, what, when, where, why and how' definition? Select one: a. Never Trust - Always Verify b. Full Authentication c. Kipling d. Logging
c. Kipling
Global user authentication is not supported by which authentication service? Select one: a. TACACS + b. SAML c. LDAP d. RADIUS
c. LDAP
What type of interface allows the Next Generation firewall to provide connections between two or more networks? Select one: a. Tap b. Layer2 c. Layer3 d. Virtual Wire
c. Layer3
Which object cannot be segmented using virtual systems on a firewall? Select one: a. Network Security Zone b. Data Plane Interface c. MGT interface d. Administrative Access
c. MGT interface
What is default setting for "Action" in a decryption policy rule? Select one: a. Any b. Decrypt c. None d. No-decrypt
c. None
Without a Wildfire licensed subscription, which of the following files can be submitted by the Next Generation Firewall to the hosted Wildfire virtualized sandbox? Select one: a. PDF files only b. MS Office doc/docx, xls/xlsx, and ppt/pptx files only c. PE files only d. PE and Java Applet only
c. PE files only
Which statement about the predefined reports is not correct? Select one: a. They are grouped in 5 categories b. There are more than 40 predefined reports c. They are emailed daily to users d. They are generated daily by default
c. They are emailed daily to users
Which of the following are NOT traffic attributes or criteria that can be defined in a Security policy rule? Select one: a. Source user b. URL Catgegory c. Traffic that does not pass through the firewall data plane d. Source / Destination zones
c. Traffic that does not pass through the firewall data plane
Which type of interface will allow the firewall to be inserted into an existing topology without requiring any reallocation of network addresses or redesign on the network topology? Select one: a. Layer 2 b. Tap c. Virtual Wire d. Layer 3
c. Virtual Wire
Which profile type is designed to protect against reconnaissance attacks such as host sweeps and port scans? Select one: a. Anti-Spyware b. DOS Protection c. Zone Protection d. Data Filtering
c. Zone Protection
Which item is not a valid choice when the Source User field is configured in a Security policy rule? Select one: a. known-user b. unknown c. all d. any
c. all
Which CLI command is used to verify successful file uploads to WildFire? Select one: a. debug wildfire download-log show b. debug wildfire upload-threat show c. debug wildfire upload-log show d. debug wildfire upload-log
c. debug wildfire upload-log show
Which built-in administrator role allows all rights except for the creation of administrative accounts and virtual systems? Select one: a. vsysadmin b. Custom role c. deviceadmin d. superuser
c. deviceadmin
Which WildFire verdict might indicate obtrusive behavior but not a security threat? Select one: a. phishing b. malware c. grayware d. benign
c. grayware
Which URL Filtering Profile action will result in a user being interactively prompted for a password? Select one: a. alert b. continue c. override d. allow
c. override
Which two actions affect all of the widgets in the Application Command Center? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted Select one or more: a. setting a local filter b. setting a global search c. setting a global filter d. setting a time range
c. setting a global filter d. setting a time range
On the Palo Alto Networks Next Generation Firewall, which is the default port for transporting Syslog traffic? Select one: a. 6514 b. 443 c. 8080 d. 514
d. 514
On the Palo Alto Networks Next Generation Firewall, which is the default port for transporting Syslog traffic? Select one: a. 8080 b. 443 c. 6514 d. 514
d. 514
When SSL encrypted traffic first arrives at the Next Generation Firewall, which technology initially identifies the application as web-browsing? Select one: a. Encryption-ID b. Content-ID c. User-ID d. App-ID
d. App-ID
What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth? Select one: a. Quality of Service Statistics b. Quality of Service Log c. Applications Report d. Application Command Center (ACC)
d. Application Command Center (ACC)
What feature on the Next Generation firewall will set the security policy to allow the application on the standard ports associated with the application? Select one: a. Application-implicit b. Application-custom c. Application-dependent d. Application-default
d. Application-default
Which User-ID component and mapping method is recommended for web clients that do not use the domain server? Select one: a. Terminal Services agent b. XML API c. GlobalProtect d. Captive Portal
d. Captive Portal
Which Palo Alto Networks Prisma technology provides continuous security monitoring, compliance validation, and cloud storage security capabilities across multi-cloud environments. In addition, you can simplify security operations through effective threat protections enhanced with comprehensive cloud context? Select one: a. SaaS b. Compliance c. Access d. Cloud
d. Cloud
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display? Select one: a. Local b. Universal c. Group d. Global
d. Global
Which of the following is NOT a PAN-OS Firewall Administrator Dynamic Role? Select one: a. Virtual system administrator b. Device administrator (read-only) c. Superuser d. Local only administrator
d. Local only administrator
Which routing protocol is supported on a virtual router? Select one: a. PPP b. EGP c. IGRP d. OSPF
d. OSPF
Which of the following is a routing protocol supported in a Next Generation firewall? Select one: a. ISIS b. IGRP c. EIGRP d. RIPV2
d. RIPV2
Which type of Next Generation Firewall decryption inspects SSL traffic coming from external users to internal servers? Select one: a. SSL Outbound Inspection b. SSL Forward Proxy c. SSH d. SSL Inbound Inspection
d. SSL Inbound Inspection
Which type of firewall decryption requires the administrator to import a server certificate and a private key into the firewall? Select one: a. SSH Decryption b. SSL Forward Proxy Decryption c. SSH Tunnel Decryption d. SSL Inbound Inspection Decryption
d. SSL Inbound Inspection Decryption
Which Next Generation Firewall URL filter setting is used to prevent users who use the Google, Yahoo, Bing, Yandex, or YouTube search engines from viewing search results unless their browser is configured with the strict safe search option. Select one: a. User Credential Detection b. Log Container Page Only c. HTTP Header Logging d. Safe Search Enforcement
d. Safe Search Enforcement
Which statement is not true regarding Safe Search Enforcement? Select one: a. Safe search is a best effort setting b. Safe search is a web server setting c. Safe search is a web browser setting d. Safe search works only in conjunction with credential submission websites
d. Safe search works only in conjunction with credential submission websites
Which type of firewall interface enables passive monitoring of network traffic? Select one: a. Virtual wire b. Loopback c. Tunnel d. Tap
d. Tap
Traffic going to a public IP address is being translated by a Next Generation firewall to an internal server private IP address. Which IP address should the security policy use as the destination IP in order to allow traffic to the server? Select one: a. The firewall Management port IP b. The server private IP c. The firewall gateway IP d. The server public IP
d. The server public IP
In the web interface, what is signified when a text box is highlighted in red? Select one: a. The value in the text box is controlled by Panorama b. The value in the text box is optional c. The value in the text box is an error d. The value in the text box is required
d. The value in the text box is required
A "continue" action can be configured on the following security profiles in the Next Generation firewall: Select one: a. URL Filtering b. URL Filtering, File Blocking, and Data Filtering c. URL Filtering and Antivirus d. URL Filtering and File Blocking
d. URL Filtering and File Blocking
Which statement is true regarding User-ID and Security policy rules? Select one: a. If the user associated with an IP address cannot be determined, all traffic from that address will be dropped. b. The Source User field can match only users, not groups. c. The Source IP and Source User fields cannot be used in the same policy. d. Users can be used in policy rules only if they are known by the firewall
d. Users can be used in policy rules only if they are known by the firewall
Which Palo Alto Networks Cortex technology prevents malware, blocks exploits, and analyzes suspicious patterns through behavioral threat protection? Select one: a. Data Lake b. AutoFocus c. XSOAR d. XDR
d. XDR
When an Applications and Threats content update is performed, which is the earliest point where you can review the impact of new application signatures on existing policies? Select one: a. after commit b. after clicking Check Now c. after install d. after download
d. after download
Which built-in role on the Next Generation firewall is the same as superuser except for creation of administrative accounts? Select one: a. devicereader b. vsysadmin c. sysadmin d. deviceadmin
d. deviceadmin