
Topic 1 Question 601 to 619

Quiz
•
Engineering
•
Professional Development
•
Hard

Juan Juan
FREE Resource
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.
How should email log forwarding be configured to achieve this goal?
With the relevant system log filter inside Device > Log Settings
With the relevant configuration log filter inside Device > Log Settings
With the relevant configuration log filter inside Objects > Log Forwarding
With the relevant system log filter inside Objects > Log Forwarding
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An engineer has been given approval to upgrade their environment to the latest of PAN-OS.
The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair, and virtual log collectors.
What is the recommended order of operational steps when upgrading?
Upgrade the firewalls, upgrade log collectors, upgrade Panorama
Upgrade the firewalls, upgrade Panorama, upgrade the log collectors
Upgrade the log collectors, upgrade the firewalls, upgrade Panorama
Upgrade Panorama, upgrade the log collectors, upgrade the firewalls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.
Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?
Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.
Use the highest TLS protocol version to maximize security.
Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
A. Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
B. Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
C. Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
D. Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when the log forwarding built-in action with tagging is used?
Selected logs are forwarded to the Azure Security Center
Destination zones of selected unwanted traffic are blocked.
Destination IP addresses of selected unwanted traffic are blocked
Selected unwanted traffic source zones are blocked.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer creates a source NAT rule to allow the company’s internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three.)
Create a URL filtering profile
Create an anti-virus profile.
Enable User-ID.
Configure a URL profile to block the phishing category.
Create a decryption policy rule.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Database Security

Quiz
•
Professional Development
15 questions
Java Networking Fundamentals

Quiz
•
Professional Development
21 questions
Martensite, Austenite, and Ferrite

Quiz
•
Professional Development
20 questions
RME Review - Soft Starter

Quiz
•
Professional Development
20 questions
IoT based Applications quiz 23.5.25

Quiz
•
Professional Development
20 questions
Java Programming Quiz 1

Quiz
•
Professional Development
18 questions
Fluid Properties Quiz

Quiz
•
Professional Development
20 questions
PCNSC question 21 to 40

Quiz
•
Professional Development
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
10 questions
Afterschool Activities & Sports

Quiz
•
6th - 8th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
15 questions
Cool Tool:Chromebook

Quiz
•
6th - 8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
20 questions
Bullying

Quiz
•
7th Grade
18 questions
7SS - 30a - Budgeting

Quiz
•
6th - 8th Grade
Discover more resources for Engineering
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
11 questions
complex sentences

Quiz
•
Professional Development
8 questions
Ötzi the Iceman: A 5,000-Year-Old True Crime Murder Mystery | Full Documentary | NOVA | PBS

Interactive video
•
Professional Development
1 questions
Savings Questionnaire

Quiz
•
6th Grade - Professio...
6 questions
Basics of Budgeting 7

Quiz
•
6th Grade - Professio...
20 questions
Movies

Quiz
•
Professional Development