Topic 1 Question 601 to 619

Topic 1 Question 601 to 619

Professional Development

19 Qs

quiz-placeholder

Similar activities

RME Review - DOL Motor Starting

RME Review - DOL Motor Starting

Professional Development

20 Qs

BSD 3B Quiz No. 2

BSD 3B Quiz No. 2

Professional Development

14 Qs

Microprocessor Quiz

Microprocessor Quiz

Professional Development

22 Qs

Training Test PA-PSE

Training Test PA-PSE

Professional Development

20 Qs

Air pollution

Air pollution

Professional Development

21 Qs

Topic 1 Question 180 to 200

Topic 1 Question 180 to 200

Professional Development

20 Qs

Zero Trust Management

Zero Trust Management

Professional Development

15 Qs

MCQ on Innovation & Creativity

MCQ on Innovation & Creativity

Professional Development

15 Qs

Topic 1 Question 601 to 619

Topic 1 Question 601 to 619

Assessment

Quiz

Engineering

Professional Development

Hard

Created by

Juan Juan

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.

How should email log forwarding be configured to achieve this goal?

With the relevant system log filter inside Device > Log Settings

With the relevant configuration log filter inside Device > Log Settings

With the relevant configuration log filter inside Objects > Log Forwarding

With the relevant system log filter inside Objects > Log Forwarding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer has been given approval to upgrade their environment to the latest of PAN-OS.

The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair, and virtual log collectors.

What is the recommended order of operational steps when upgrading?

Upgrade the firewalls, upgrade log collectors, upgrade Panorama

Upgrade the firewalls, upgrade Panorama, upgrade the log collectors

Upgrade the log collectors, upgrade the firewalls, upgrade Panorama

Upgrade Panorama, upgrade the log collectors, upgrade the firewalls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.

Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?

Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.

Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.

Use the highest TLS protocol version to maximize security.

Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.

Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?

  • A. Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.

  • B. Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.

  • C. Create a custom application with specific timeouts, then create an application override rule and reference the custom application.

  • D. Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.

Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.

Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.

Create a custom application with specific timeouts, then create an application override rule and reference the custom application

Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when the log forwarding built-in action with tagging is used?

Selected logs are forwarded to the Azure Security Center

Destination zones of selected unwanted traffic are blocked.

Destination IP addresses of selected unwanted traffic are blocked

Selected unwanted traffic source zones are blocked.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall engineer creates a source NAT rule to allow the company’s internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.

Media Image
Media Image
Media Image
Media Image

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three.)

Create a URL filtering profile

Create an anti-virus profile.

Enable User-ID.

Configure a URL profile to block the phishing category.

Create a decryption policy rule.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?