my study set

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

True or false? A Security Profile attached to a Security policy rule is evaluated only if the Security policy rule matches traffic and the rule action is set to "allow."

True

True or false? A URL Filtering license is not required to define and use custom URL categories.

True

Which anti-spyware feature enables an administrator to quickly identify a potentially infected host on the network? a. data filtering log entry b. CVE Number c. DNS SInkhole d. continue response pag

c. DNS SInkhole

A "continue" action can be configured on the following security profiles in the Next Generation firewall: a. URL Filtering b. URL Filtering, File Blocking, and Data Filtering c. URL Filtering and Antivirus d. URL Filtering and File Blocking

d. URL Filtering and File Blocking

True or False. If a file type is matched in the File Blocking Profile and WildFire Analysis Profile, and if the File Blocking Profile action is set to "block," then the file is not forwarded to WildFire.

true

True or false? If App-ID cannot identify the traffic, Content-ID cannot inspect the traffic for malware

true

True or false? When migration is done from the firewall of another vendor to a Palo Alto Networks firewall, a best practice is to always migrate the existing Security policy.

true

Network traffic matches an "allow" rule in the Security policy, but the attached File Blocking Profile is configured with a "block" action. To which two locations will the traffic be logged? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted. a. Traffic Log b. Data Filtering Log c. Threat Log d. Alarms Log

a. Traffic Log b. Data Filtering Log

According to best practices, which two URL filtering categories should be blocked in most URL Filtering Profiles? Choose the 2 correct choices. If you choose an incorrect choice your question score will be deducted. Select one or more: a. high-risk b. medium-risk c. new-registered-domain d. adult

a. high-risk b. new-registered-domain

Which URL Filtering Profile action will result in a user being interactively prompted for a password? a. override b. alert c. allow d. continue

a. override

When creating an application filter, which of the following is true? a. They are called dynamic because they will automatically include new applications from an application signature update if the new application's type is included in the filter b. Excessive bandwidth may be used as a filter match criteria c. They are called dynamic because they automatically adapt to new IP addresses d. They are used by malware

a. They are called dynamic because they will automatically include new applications from an application signature update if the new application's type is included in the filter

A "continue" action can be configured on the following security profiles in the Next Generation firewall: a. URL Filtering and File Blocking b. URL Filtering and Antivirus c. URL Filtering d. URL Filtering, File Blocking, and Data Filtering

a. URL Filtering and File Blocking

Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user's browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log? a. override b. alert c. continue d. block

a. override

What feature on the Next Generation firewall will set the security policy to allow the application on the standard ports associated with the application? a. Application-implicit b. Application-default c. Application-custom d. Application-dependent

b Application-default

How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application? a. not-applicable b. insufficient-data c. unknown-tcp d. incomplete

b insufficient-data

Which file type can a firewall send to WildFire when the firewall does not have a WildFire subscription? Select one: a. JAR b. EXE c. PDF d. APK

b. EXE

A Zone Protection Profile is applied to which item? Egress Ports b. Ingress Ports c. Address Groups d. Security Policy Rules

b. Ingress Ports

Which WildFire verdict might indicate obtrusive behavior but not a security threat? Select one: a. benign b. grayware c. malware d. phishing

b. grayware

How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application? a. unknown-tcp b. insufficient-data c. incomplete d. not-applicable

b. insufficient-data

Which URL Filtering Profile action will result in a user being interactively prompted for a password? a. continue b. override c. allow d. alert

b. override

What is the recommended maximum default size of PE - executable - files forwarded from the Next Generation firewall to Wildfire? Select one: a. Configurable up to 2 megabytes b. 16 megabytes c. Always 2 megabytes d. Configurable up to 10 megabytes

b. 16 megabytes

Which Next Generation Firewall URL filter setting is used to prevent users who use the Google, Yahoo, Bing, Yandex, or YouTube search engines from viewing search results unless their browser is configured with the strict safe search option. a. User Credential Detection b. Safe Search Enforcement c. HTTP Header Logging d. Log Container Page Only

b. Safe Search Enforcement

What component of the Next Generation Firewall will protect from port scans? a. Anti-Virus Protection b. Zone protection c. DOS Protection d. Vulnerability protection

b. Zone protection

Which CLI command is used to verify successful file uploads to WildFire? Select one: a. debug wildfire upload-log b. debug wildfire upload-log show c. debug wildfire download-log show d. debug wildfire upload-threat show

b. debug wildfire upload-log show

Which profile type is designed to protect against reconnaissance attacks such as host sweeps and port scans? a. DOS Protection b. Anti-Spyware c. Zone Protection d. Data Filtering

c. Zone Protection

When an Applications and Threats content update is performed, which is the earliest point where you can review the impact of new application signatures on existing policies? a. after install b. after clicking Check Now c. after download d. after commit

c. after download

Assume you have a WildFire subscription. Which file state or condition would trigger a Wildfire file analysis? Select one: a. executable file signed by trusted signer b. file size limit exceeded c. file located in a JAR or RAR archive d. file already has WildFire hash

c. file located in a JAR or RAR archive

Which WildFire verdict might indicate obtrusive behavior but not a security threat? Select one: a. benign b. malware c. grayware d. phishing

c. grayware

What action will show whether a downloaded PDF file from a user has been blocked by a security profile on the Next Generation firewall? a. Filter the traffic logs for all traffic from the user that resulted in a deny action b. Filter the session browser for all sessions from a user with the application adobe c. Filter the data filtering logs for the user's traffic and the name of the PDF file d. Filter the system log for failed download messages

c. Filter the data filtering logs for the user's traffic and the name of the PDF file

Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user's browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log? a. alert b. block c. override d. continue

c. override

A Zone Protection Profile is applied to which item? a. Address Groups b. Egress Ports c. Security Policy Rules d. Ingress Ports

d. Ingress Ports

Which statement is not true regarding Safe Search Enforcement? Select one: a. Safe search is a web server setting b. Safe search is a best effort setting c. Safe search is a web browser setting d. Safe search works only in conjunction with credential submission websites

d. Safe search works only in conjunction with credential submission websites

Which WildFire verdict might indicate obtrusive behavior but not a security threat? Select one: a. phishing b. malware c. benign d. grayware

d. grayware

In a Next Generation firewall, how many packet does it take to identify the application in a TCP exchange? a. One b. Three c. Two d. Four or five

d. four or five

Select True or False. On the Next Generation firewall, application groups are always automatically updated when new applications are added to the App-ID database

false

True or false? When a malicious file or link is detected in an email, WildFire can update antivirus signatures in the PAN-DB database. Select one: True False

False


Kaugnay na mga set ng pag-aaral

genki adverbs and other expressions

View Set

LUOA Economics Module 1: Christian Worldview, Property, and Markets

View Set

BJU Physical Science (6th ed.) - Chapter 4

View Set

Prevention to Sports Injury Ch. 7-12

View Set

Die Revolution der Erde um die Sonne

View Set

Biology: MICROBIAL TAXONOMY and FUNGI Quiz Review

View Set