<< Prev Question Next Question >>

Question 68/162

A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (162q)
Question 1: Which two statements are true for the DNS security service i...
Question 2: An administrator notices that protection is needed for traff...
Question 3: Where in Panorama Would Zone Protection profiles be configur...
Question 4: You receive notification about new malware that infects host...
Question 5: Which three statement describe the operation of Security Pol...
Question 6: An administrator is updating Security policy to align with b...
Question 7: Which feature would be useful for preventing traffic from ho...
Question 8: The firewall sends employees an application block page when ...
Question 9: Which five Zero Trust concepts does a Palo Alto Networks fir...
Question 10: An administrator wants to prevent access to media content we...
Question 11: How does the Policy Optimizer policy view differ from the Se...
Question 12: In which section of the PAN-OS GUI does an administrator con...
Question 13: Given the detailed log information above, what was the resul...
Question 14: Where within the firewall GUI can all existing tags be viewe...
Question 15: An administrator has an IP address range in the external dyn...
Question 16: An administrator manages a network with 300 addresses that r...
Question 17: Which object would an administrator create to block access t...
Question 18: A security administrator has configured App-ID updates to be...
Question 19: Which attribute can a dynamic address group use as a filteri...
Question 20: Given the scenario, which two statements are correct regardi...
Question 21: Which type of security rule will match traffic between the I...
Question 22: Given the Cyber-Attack Lifecycle diagram, identify the stage...
Question 23: Which URL Filtering Profile action does not generate a log e...
Question 24: Which Security profile would you apply to identify infected ...
Question 25: What action will inform end users when their access to Inter...
Question 26: Which two DNS policy actions in the anti-spyware security pr...
Question 27: The PowerBall Lottery has reached a high payout amount and a...
Question 28: Which Security profile must be added to Security policies to...
Question 29: Which two types of profiles are needed to create an authenti...
Question 30: How frequently can wildfire updates be made available to fir...
Question 31: Which Security policy set should be used to ensure that a po...
Question 32: What must first be created on the firewall for SAML authenti...
Question 33: What two actions can be taken when implementing an exception...
Question 34: What are three valid ways to map an IP address to a username...
Question 35: Which action would an administrator take to ensure that a se...
Question 36: An administrator creates a new Security policy rule to allow...
Question 37: An administrator would like to protect against inbound threa...
Question 38: Which User-ID mapping method should be used for an environme...
Question 39: You have been tasked to configure access to a new web server...
Question 40: Which profile should be used to obtain a verdict regarding a...
Question 41: Which type of address object is "10 5 1 1/0 127 248 2"?...
Question 42: Based on the screenshot what is the purpose of the group in ...
Question 43: Which type of administrative role must you assign to a firew...
Question 44: Which object would an administrator create to enable access ...
Question 45: URL categories can be used as match criteria on which two po...
Question 46: Within a WildFire Analysis Profile, what match criteria can ...
Question 47: What is a function of application tags?...
Question 48: Which situation is recorded as a system log?...
Question 49: What is the main function of Policy Optimizer?...
Question 50: Within an Anti-Spyware security profile, which tab is used t...
Question 51: Which rule type is appropriate for matching traffic both wit...
Question 52: What is used to monitor Security policy applications and usa...
Question 53: What must be considered with regards to content updates depl...
Question 54: All users from the internal zone must be allowed only Telnet...
Question 55: What are three differences between security policies and sec...
Question 56: Which type of profile must be applied to the Security policy...
Question 57: Based on the security policy rules shown, ssh will be allowe...
Question 58: Access to which feature requires PAN-OS Filtering licens?...
Question 59: When HTTPS for management and GlobalProtect are enabled on t...
Question 60: A network administrator created an intrazone Security policy...
Question 61: What is the best-practice approach to logging traffic that t...
Question 62: What are three valid source or D=destination conditions avai...
Question 63: Palo Alto Networks firewall architecture accelerates content...
Question 64: An administrator is implementing an exception to an external...
Question 65: What is the maximum volume of concurrent administrative acco...
Question 66: Which two security profile types can be attached to a securi...
Question 67: How are Application Fillers or Application Groups used in fi...
Question 68: A server-admin in the USERS-zone requires SSH-access to all ...
Question 69: Which URL profiling action does not generate a log entry whe...
Question 70: An administrator wants to create a NAT policy to allow multi...
Question 71: Which option lists the attributes that are selectable when s...
Question 72: Based on the graphic which statement accurately describes th...
Question 73: Which three types of entries can be excluded from an externa...
Question 74: In the example security policy shown, which two websites fck...
Question 75: Which statement is true regarding a Prevention Posture Asses...
Question 76: Assume a custom URL Category Object of "NO-FILES" has been c...
Question 77: Which statement best describes a common use of Policy Optimi...
Question 78: How do you reset the hit count on a security policy rule?...
Question 79: How is the hit count reset on a rule?...
Question 80: Which policy set should be used to ensure that a policy is a...
Question 81: The NetSec Manager asked to create a new firewall Local Admi...
Question 82: An administrator wishes to follow best practices for logging...
Question 83: Which type security policy rule would match traffic flowing ...
Question 84: Where does a user assign a tag group to a policy rule in the...
Question 85: Which security profile should be used to classify malicious ...
Question 86: Given the screenshot, what are two correct statements about ...
Question 87: Which rule type is appropriate for matching traffic occurrin...
Question 88: Which security policy rule would be needed to match traffic ...
Question 89: An administrator wants to prevent users from submitting corp...
Question 90: Which two actions are needed for an administrator to get rea...
Question 91: Which User Credential Detection method should be applied wit...
Question 92: A network administrator is required to use a dynamic routing...
Question 93: What is a recommended consideration when deploying content u...
Question 94: Which statement is true regarding a Best Practice Assessment...
Question 95: Given the topology, which zone type should zone A and zone B...
Question 96: Based on the image provided, which two statements apply to t...
Question 97: When creating a custom URL category object, which is a valid...
Question 98: Which statements is true regarding a Heatmap report?...
Question 99: The administrator profile "SYS01 Admin" is configured with a...
Question 100: An administrator would like to silently drop traffic from th...
Question 101: Which feature must be configured to enable a data plane inte...
Question 102: Which solution is a viable option to capture user identifica...
Question 103: What are the two main reasons a custom application is create...
Question 104: In order to attach an Antivirus, Anti-Spyware and Vulnerabil...
Question 105: Your company occupies one floor in a single building you hav...
Question 106: Place the following steps in the packet processing order of ...
Question 107: What is a prerequisite before enabling an administrative acc...
Question 108: How often does WildFire release dynamic updates?...
Question 109: Match the Palo Alto Networks Security Operating Platform arc...
Question 110: For the firewall to use Active Directory to authenticate use...
Question 111: An administrator needs to allow users to use their own offic...
Question 112: Refer to the exhibit. (Exhibit) Based on the network diagram...
Question 113: At which point in the app-ID update process can you determin...
Question 114: Which three configuration settings are required on a Palo Al...
Question 115: In which profile should you configure the DNS Security featu...
Question 116: Which action can be performed when grouping rules by group t...
Question 117: Based on the graphic, what is the purpose of the SSL/TLS Ser...
Question 118: Match each rule type with its example (Exhibit)...
Question 119: An administrator is configuring a NAT rule At a minimum, whi...
Question 120: What are three ways application characteristics are used? (C...
Question 121: What does an application filter help you to do?...
Question 122: Recently changes were made to the firewall to optimize the p...
Question 123: Which Security profile can you apply to protect against malw...
Question 124: Match the cyber-attack lifecycle stage to its correct descri...
Question 125: What are two valid selections within an Anti-Spyware profile...
Question 126: Which administrator type provides more granular options to d...
Question 127: Why does a company need an Antivirus profile?...
Question 128: What is a default setting for NAT Translated Packets when th...
Question 129: Which User-ID agent would be appropriate in a network with m...
Question 130: Which stage of the cyber-attack lifecycle makes it important...
Question 131: Given the screenshot what two types of route is the administ...
Question 132: Which two features implement one-to-one translation of a sou...
Question 133: What are two differences between an implicit dependency and ...
Question 134: When is an event displayed under threat logs?...
Question 135: During the packet flow process, which two processes are perf...
Question 136: Which license must an administrator acquire prior to downloa...
Question 137: Which prevention technique will prevent attacks based on pac...
Question 138: An administrator is troubleshooting traffic that should matc...
Question 139: Which feature enables an administrator to review the Securit...
Question 140: What allows a security administrator to preview the Security...
Question 141: Which update option is not available to administrators?...
Question 142: Refer to the exhibit. A web server in the DMZ is being mappe...
Question 143: An administrator would like to see the traffic that matches ...
Question 144: Which interface type requires no routing or switching but ap...
Question 145: What two authentication methods on the Palo Alto Networks fi...
Question 146: Which operations are allowed when working with App-ID applic...
Question 147: An administrator configured a Security policy rule with an A...
Question 148: What is the default action for the SYN Flood option within t...
Question 149: Users from the internal zone need to be allowed to Telnet in...
Question 150: Which tab would an administrator click to create an address ...
Question 151: What is the main function of the Test Policy Match function?...
Question 152: Which protocol used to map username to user groups when user...
Question 153: Which statement best describes the use of Policy Optimizer?...
Question 154: Which two features can be used to tag a username so that it ...
Question 155: What in the minimum frequency for which you can configure th...
Question 156: Starting with PAN-OS version 9.1, application dependency inf...
Question 157: Which DNS Query action is recommended for traffic that is al...
Question 158: You receive notification about a new malware that infects ho...
Question 159: What are the two default behaviors for the intrazone-default...
Question 160: Given the topology, which zone type should interface E1/1 be...
Question 161: If using group mapping with Active Directory Universal Group...
Question 162: Which path is used to save and load a configuration with a P...