
Topic 1 Question 601 to 619
Quiz
•
Engineering
•
Professional Development
•
Practice Problem
•
Hard
Juan Juan
FREE Resource
Enhance your content in a minute
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.
How should email log forwarding be configured to achieve this goal?
With the relevant system log filter inside Device > Log Settings
With the relevant configuration log filter inside Device > Log Settings
With the relevant configuration log filter inside Objects > Log Forwarding
With the relevant system log filter inside Objects > Log Forwarding
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An engineer has been given approval to upgrade their environment to the latest of PAN-OS.
The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair, and virtual log collectors.
What is the recommended order of operational steps when upgrading?
Upgrade the firewalls, upgrade log collectors, upgrade Panorama
Upgrade the firewalls, upgrade Panorama, upgrade the log collectors
Upgrade the log collectors, upgrade the firewalls, upgrade Panorama
Upgrade Panorama, upgrade the log collectors, upgrade the firewalls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits.
Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?
Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.
Use the highest TLS protocol version to maximize security.
Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
A. Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
B. Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
C. Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
D. Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when the log forwarding built-in action with tagging is used?
Selected logs are forwarded to the Azure Security Center
Destination zones of selected unwanted traffic are blocked.
Destination IP addresses of selected unwanted traffic are blocked
Selected unwanted traffic source zones are blocked.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall engineer creates a source NAT rule to allow the company’s internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three.)
Create a URL filtering profile
Create an anti-virus profile.
Enable User-ID.
Configure a URL profile to block the phishing category.
Create a decryption policy rule.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Basic Electrical Engineering test-1(EEE)
Quiz
•
Professional Development
15 questions
22EC4204 TLW practice quiz3
Quiz
•
Professional Development
20 questions
Exploring Semiconductor Devices
Quiz
•
Professional Development
20 questions
Emerging Technologies in Electricity
Quiz
•
Professional Development
20 questions
HOW WELL DO YOU KNOW ME ( MADYSON ADDITION 2025)
Quiz
•
Professional Development
20 questions
DDCO QUIZ
Quiz
•
Professional Development
15 questions
HVE Breakdown in Insulating Materials
Quiz
•
Professional Development
20 questions
Operating systems (CSE) test-2
Quiz
•
Professional Development
Popular Resources on Wayground
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
15 questions
Solving Equations with Variables on Both Sides Review
Quiz
•
8th Grade
Discover more resources for Engineering
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
Disney Characters
Quiz
•
Professional Development
20 questions
Customer Service
Quiz
•
Professional Development
10 questions
Food Idioms
Quiz
•
Professional Development
20 questions
NCCER Power Tools Quiz
Quiz
•
Professional Development
