<< Prev Question Next Question >>

Question 40/172

Which fields can be altered in the default Vulnerability Protection Profile?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (172q)
Question 1: What Security Profile type must be configured to send files ...
Question 2: Which of the following facts about dynamic updates is correc...
Question 3: Previous to PAN-OS 7.0 the firewall was able to decode up to...
Question 4: Which of the following services are enabled on the MGT inter...
1 commentQuestion 5: In PAN-OS 7.0 which of the available choices serves as an al...
Question 6: (Exhibit) Taking into account only the information in the sc...
Question 7: In PANOS 6.0, rule numbers are:...
Question 8: When employing the Brightcloud URL filtering database on the...
Question 9: Select the implicit rules that are applied to traffic that f...
Question 10: A user complains that they are no longer able to access a ne...
Question 11: Which of the following statements is NOT True about Palo Alt...
Question 12: What built-in administrator role allows all rights except fo...
Question 13: You can assign an IP address to an interface in Virtual Wire...
Question 14: Which option allows an administrator to segrate Panorama and...
Question 15: Which of the following interface types can have an IP addres...
Question 16: Which of the following are accurate statements describing th...
Question 17: In order to route traffic between layer 3 interfaces on the ...
Question 18: Which of the following represents HTTP traffic events that c...
Question 19: In Active/Active HA environments, redundancy for the HA3 int...
Question 20: When troubleshooting Phase 1 of an IPSec VPN tunnel, what lo...
Question 21: After the installation of a new Application and Threat datab...
Question 22: Which statement accurately reflects the functionality of usi...
Question 23: What happens at the point of Threat Prevention license expir...
Question 24: Enabling "Highlight Unused Rules" in the Security policy win...
Question 25: Which of the following interfaces types will have a MAC addr...
Question 26: Which fields can be altered in the default Vulnerability pro...
Question 27: Which of the following must be configured when deploying Use...
Question 28: When using remote authentication for users (LDAP, RADIUS, Ac...
Question 29: You have decided to implement a Virtual Wire Subinterface. W...
Question 30: After the installation of the Threat Prevention license, the...
Question 31: Which one of the options describes the sequence of the Globa...
Question 32: In PAN-OS 6.0, rule numbers were introduced. Rule Numbers ar...
Question 33: After the installation of a new version of PANOS, the firewa...
Question 34: All of the interfaces on a Palo Alto Networks device must be...
Question 35: Which of the following Global Protect features requires a se...
Question 36: Besides selecting the Heartbeat Backup option when creating ...
Question 37: How do you limit the amount of information recorded in the U...
Question 38: When an interface is in Tap mode and a policy action is set ...
Question 39: What is the size limitation of files manually uploaded to Wi...
Question 40: Which fields can be altered in the default Vulnerability Pro...
Question 41: When allowing an Application in a Security policy on a PAN-O...
Question 42: An interface in tap mode can transmit packets on the wire....
Question 43: When configuring a Decryption Policy rule, which option allo...
Question 44: Which mode will allow a user to choose when they wish to con...
Question 45: When employing the BrightCloud URL filtering database in a P...
Question 46: Can multiple administrator accounts be configured on a singl...
Question 47: Select the implicit rules that are applied to traffic that f...
Question 48: Which of the Dynamic Updates listed below are issued on a da...
Question 49: Which statement below is True?
Question 50: The "Disable Server Return Inspection" option on a security ...
Question 51: When Network Address Translation has been performed on traff...
Question 52: Color-coded tags can be used on all of the items listed belo...
Question 53: Users may be authenticated sequentially to multiple authenti...
Question 54: WildFire analyzes files to determine whether or not they are...
Question 55: Which of the following statements is NOT True regarding a De...
Question 56: What needs to be done prior to committing a configuration in...
Question 57: For correct routing to SSL VPN clients to occur, the followi...
Question 58: UserID is enabled in the configuration of:...
Question 59: In a Destination NAT configuration, the Translated Address f...
Question 60: When using Config Audit, the color yellow indicates which of...
Question 61: In a Palo Alto Networks firewall, every interface in use mus...
Question 62: Which of the following platforms supports the Decryption Por...
Question 63: Taking into account only the information in the screenshot a...
1 commentQuestion 64: Configuring a pair of devices into an Active/Active HA pair ...
Question 65: Which of the following is NOT a valid option for builtin CLI...
Question 66: When a user logs in via Captive Portal, their user informati...
Question 67: Which of the following objects cannot use User-ID as a match...
Question 68: What is the correct policy to most effectively block Skype?...
Question 69: With IKE Phase 1, each device is identified to the other by ...
Question 70: In PANOS 6.0 and later, which of these items may be used as ...
Question 71: Which of the following types of protection are available in ...
Question 72: Which of the following would be a reason to use an XML API t...
Question 73: An interface in Virtual Wire mode must be assigned an IP add...
Question 74: Select the implicit rules enforced on traffic failing to mat...
Question 75: Which of the following CANNOT use the source user as a match...
Question 76: When creating an application filter, which of the following ...
Question 77: Which of the following is a routing protocol supported in a ...
Question 78: A "Continue" action can be configured on the following Secur...
Question 79: In PAN-OS 5.0, which of the following features is supported ...
Question 80: Which of the Dynamic Updates listed below are issued on a da...
Question 81: Wildfire may be used for identifying which of the following ...
Question 82: An Outbound SSL forward-proxy decryption rule cannot be crea...
Question 83: Which feature can be configured to block sessions that the f...
Question 84: What are the benefits gained when the "Enable Passive DNS Mo...
Question 85: A Config Lock may be removed by which of the following users...
Question 86: Which link is used by an Active-Passive cluster to synchroni...
Question 87: (Exhibit) Taking into account only the information in the sc...
Question 88: With PAN-OS 5.0, how can a common NTP value be pushed to a c...
Question 89: Which type of license is required to perform Decryption Port...
Question 90: Using the API in PAN-OS 6.1, WildFire subscribers can upload...
Question 91: Which of the following must be enabled in order for UserID t...
Question 92: When configuring the firewall for UserID, what is the maximu...
Question 93: In an Anti-Virus profile, changing the action to "Block" for...
Question 94: What is the function of the GlobalProtect Portal?...
Question 95: When creating a Security Policy to allow Facebook in PAN-OS ...
Question 96: A "Continue" action can be configured on which of the follow...
Question 97: Will an exported configuration contain Management Interface ...
Question 98: As the Palo Alto Networks Administrator responsible for User...
Question 99: The following can be configured as a next hop in a Static Ro...
Question 100: In which of the following can UserID be used to provide a ma...
Question 101: When configuring a Security Policy Rule based on FQDN Addres...
Question 102: Which local interface cannot be assigned to the IKE gateway?...
Question 103: As of PAN-OS 7.0, when configuring a Decryption Policy Rule,...
Question 104: Which routing protocol is supported on the Palo Alto Network...
Question 105: Which of the following fields is not available in DoS policy...
1 commentQuestion 106: WildFire Analysis Reports are available for the following Op...
Question 107: What is the name of the debug save file for IPSec VPN tunnel...
Question 108: When you have created a Security Policy Rule that allows Fac...
Question 109: What option should be configured when using User-ID?...
Question 110: When adding an application in a Policy-based Forwarding rule...
Question 111: (Exhibit) Taking into account only the information in the sc...
Question 112: What are two sources of information for determining if the f...
Question 113: "What is the result of an Administrator submitting a WildFir...
Question 114: The "Drive-By Download" protection feature, under File Block...
Question 115: Palo Alto Networks firewalls support the use of both Dynamic...
Question 116: To allow the PAN device to resolve internal and external DNS...
Question 117: Users can be authenticated serially to multiple authenticati...
Question 118: What new functionality is provided in PAN-OS 5.0 by Palo Alt...
Question 119: When configuring Security rules based on FQDN objects, which...
Question 120: Which of the following most accurately describes Dynamic IP ...
Question 121: With IKE, each device is identified to the other by a Peer I...
Question 122: Which of the following options may be enabled to reduce syst...
Question 123: Which of the following is NOT a valid option for built-in CL...
Question 124: Wildfire may be used for identifying which of the following ...
Question 125: In PAN-OS 5.0, how is Wildfire enabled?...
Question 126: When a Palo Alto Networks firewall is forwarding traffic thr...
Question 127: Without a WildFire subscription, which of the following file...
Question 128: As a Palo Alto Networks firewall administrator, you have mad...
Question 129: What is the default DNS Sinkhole address used by Palo Alto N...
Question 130: In PAN-OS 5.0, how is Wildfire enabled?...
Question 131: When Destination Network Address Translation is being perfor...
Question 132: For non-Microsoft clients, what Captive Portal method is sup...
1 commentQuestion 133: (Exhibit) Taking into account only the information in the sc...
Question 134: As the Palo Alto Networks administrator, you have enabled Ap...
Question 135: To create a custom signature object for an Application Overr...
Question 136: You'd like to schedule a firewall policy to only allow a cer...
Question 137: What is the default setting for 'Action' in a Decryption Pol...
Question 138: After configuring Captive Portal in Layer 3 mode, users in t...
Question 139: Which best describes how Palo Alto Networks firewall rules a...
Question 140: If the Forward Proxy Ready shows "no" when running the comma...
Question 141: Which mode will allow a user to choose how they wish to conn...
Question 142: A local/enterprise PKI system is required to deploy outbound...
Question 143: When configuring UserID on a Palo Alto Networks firewall, wh...
Question 144: To properly configure DOS protection to limit the number of ...
Question 145: When setting up GlobalProtect, what is the job of the Global...
Question 146: When configuring Admin Roles for Web UI access, what are the...
Question 147: Both SSL decryption and SSH decryption are disabled by defau...
Question 148: What will the user experience when attempting to access a bl...
Question 149: Traffic going to a public IP address is being translated by ...
Question 150: As the Palo Alto Networks administrator responsible for User...
Question 151: Security policies specify a source interface and a destinati...
Question 152: When configuring a Decryption Policy Rule, which of the foll...
Question 153: What option should be configured when using User Identificat...
Question 154: As the Palo Alto Networks Administrator you have enabled App...
Question 155: What are two sources of information for determining whether ...
Question 156: Which of the following is True of an application filter?...
Question 157: Which of the following are necessary components of a GlobalP...
Question 158: What will the user experience when browsing a Blocked hackin...
Question 159: What is the maximum file size of .EXE files uploaded from th...
Question 160: Which of the following would be a reason to use the PAN-OS X...
Question 161: Administrative Alarms can be enabled for which of the follow...
Question 162: Subsequent to the installation of new licenses, the firewall...
Question 163: Which of the following can provide information to a Palo Alt...
Question 164: How do you reduce the amount of information recorded in the ...
Question 165: Which of the following are methods HA clusters use to identi...
Question 166: Which of the following can provide information to a Palo Alt...
Question 167: Traffic going to a public IP address is being translated by ...
Question 168: An enterprise PKI system is required to deploy SSL Forward P...
Question 169: When configuring a Decryption Policy, which of the following...
Question 170: (Exhibit) Considering the information in the screenshot abov...
Question 171: The "Drive-By Download" protection feature, under File Block...
Question 172: Which of the following describes the sequence of the Global ...