
Topic 1 Question 601 to 619
Authored by Juan Juan
Engineering
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.
How should email log forwarding be configured to achieve this goal?
With the relevant system log filter inside Device > Log Settings
With the relevant configuration log filter inside Device > Log Settings
With the relevant configuration log filter inside Objects > Log Forwarding
With the relevant system log filter inside Objects > Log Forwarding
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An engineer has been given approval to upgrade their environment to the latest of PAN-OS.
The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair, and virtual log collectors.
What is the recommended order of operational steps when upgrading?
Upgrade the firewalls, upgrade log collectors, upgrade Panorama
Upgrade the firewalls, upgrade Panorama, upgrade the log collectors
Upgrade the log collectors, upgrade the firewalls, upgrade Panorama
Upgrade Panorama, upgrade the log collectors, upgrade the firewalls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.
Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?
Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.
Use the highest TLS protocol version to maximize security.
Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
A. Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
B. Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
C. Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
D. Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when the log forwarding built-in action with tagging is used?
Selected logs are forwarded to the Azure Security Center
Destination zones of selected unwanted traffic are blocked.
Destination IP addresses of selected unwanted traffic are blocked
Selected unwanted traffic source zones are blocked.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer creates a source NAT rule to allow the company’s internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three.)
Create a URL filtering profile
Create an anti-virus profile.
Enable User-ID.
Configure a URL profile to block the phishing category.
Create a decryption policy rule.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
RME Review - VFD Motor Starter
Quiz
•
Professional Development
15 questions
Electric Vehicles
Quiz
•
Professional Development
20 questions
QUIZ ACTIVITY - MODULE 4 & 5 _ IME_BESCK204D_B SECTION
Quiz
•
Professional Development
17 questions
Quiz on Hybrid Electric Vehicles
Quiz
•
Professional Development
15 questions
MCQs on Creativity and Innovation2
Quiz
•
Professional Development
15 questions
CIMS - Part 4
Quiz
•
Professional Development
17 questions
THE ENGINEERS DAY
Quiz
•
Professional Development
20 questions
RME Review - Repair and Maintenance
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Engineering
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Christmas Movies
Quiz
•
Professional Development
20 questions
Christmas Trivia
Quiz
•
Professional Development
15 questions
Fun Holiday Trivia
Quiz
•
Professional Development
25 questions
Name That Tune - Christmas
Quiz
•
Professional Development
29 questions
Christmas Song Emoji Pictionary
Quiz
•
Professional Development
9 questions
Holiday Movie Trivia
Lesson
•
Professional Development
34 questions
Winter Trivia
Quiz
•
Professional Development