
Topic 1 Question 601 to 619
Quiz
•
Engineering
•
Professional Development
•
Hard

Juan Juan
FREE Resource
Enhance your content
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.
How should email log forwarding be configured to achieve this goal?
With the relevant system log filter inside Device > Log Settings
With the relevant configuration log filter inside Device > Log Settings
With the relevant configuration log filter inside Objects > Log Forwarding
With the relevant system log filter inside Objects > Log Forwarding
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An engineer has been given approval to upgrade their environment to the latest of PAN-OS.
The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair, and virtual log collectors.
What is the recommended order of operational steps when upgrading?
Upgrade the firewalls, upgrade log collectors, upgrade Panorama
Upgrade the firewalls, upgrade Panorama, upgrade the log collectors
Upgrade the log collectors, upgrade the firewalls, upgrade Panorama
Upgrade Panorama, upgrade the log collectors, upgrade the firewalls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.
Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?
Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.
Use the highest TLS protocol version to maximize security.
Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
A. Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
B. Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
C. Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
D. Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when the log forwarding built-in action with tagging is used?
Selected logs are forwarded to the Azure Security Center
Destination zones of selected unwanted traffic are blocked.
Destination IP addresses of selected unwanted traffic are blocked
Selected unwanted traffic source zones are blocked.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer creates a source NAT rule to allow the company’s internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three.)
Create a URL filtering profile
Create an anti-virus profile.
Enable User-ID.
Configure a URL profile to block the phishing category.
Create a decryption policy rule.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
Renewable Energy Quiz
Quiz
•
Professional Development
20 questions
Circuit Theory (ECE) test-1
Quiz
•
Professional Development
14 questions
Perform workshop process
Quiz
•
Professional Development
20 questions
Topic 1 question 141 to160
Quiz
•
Professional Development
19 questions
List,Tuples,Dictionary
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade