Topic 1 Question 601 to 619

Topic 1 Question 601 to 619

Professional Development

19 Qs

quiz-placeholder

Similar activities

SAP EAM Assessement_MCT

SAP EAM Assessement_MCT

Professional Development

18 Qs

APC System Quiz

APC System Quiz

Professional Development

15 Qs

HOW WELL DO YOU KNOW ME ( MADYSON ADDITION 2025)

HOW WELL DO YOU KNOW ME ( MADYSON ADDITION 2025)

Professional Development

20 Qs

HVE Breakdown in Insulating Materials

HVE Breakdown in Insulating Materials

Professional Development

15 Qs

DDCO QUIZ

DDCO QUIZ

Professional Development

20 Qs

Basic Electrical Engineering test-1(EEE)

Basic Electrical Engineering test-1(EEE)

Professional Development

20 Qs

22EC4204 TLW practice quiz3

22EC4204 TLW practice quiz3

Professional Development

15 Qs

Exploring Semiconductor Devices

Exploring Semiconductor Devices

Professional Development

20 Qs

Topic 1 Question 601 to 619

Topic 1 Question 601 to 619

Assessment

Quiz

Engineering

Professional Development

Hard

Created by

Juan Juan

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.

How should email log forwarding be configured to achieve this goal?

With the relevant system log filter inside Device > Log Settings

With the relevant configuration log filter inside Device > Log Settings

With the relevant configuration log filter inside Objects > Log Forwarding

With the relevant system log filter inside Objects > Log Forwarding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer has been given approval to upgrade their environment to the latest of PAN-OS.

The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair, and virtual log collectors.

What is the recommended order of operational steps when upgrading?

Upgrade the firewalls, upgrade log collectors, upgrade Panorama

Upgrade the firewalls, upgrade Panorama, upgrade the log collectors

Upgrade the log collectors, upgrade the firewalls, upgrade Panorama

Upgrade Panorama, upgrade the log collectors, upgrade the firewalls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.

Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?

Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.

Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.

Use the highest TLS protocol version to maximize security.

Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.

Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?

  • A. Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.

  • B. Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.

  • C. Create a custom application with specific timeouts, then create an application override rule and reference the custom application.

  • D. Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.

Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.

Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.

Create a custom application with specific timeouts, then create an application override rule and reference the custom application

Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when the log forwarding built-in action with tagging is used?

Selected logs are forwarded to the Azure Security Center

Destination zones of selected unwanted traffic are blocked.

Destination IP addresses of selected unwanted traffic are blocked

Selected unwanted traffic source zones are blocked.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall engineer creates a source NAT rule to allow the company’s internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.

Media Image
Media Image
Media Image
Media Image

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three.)

Create a URL filtering profile

Create an anti-virus profile.

Enable User-ID.

Configure a URL profile to block the phishing category.

Create a decryption policy rule.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?