<< Prev Question Next Question >>

Question 24/117

Which two methods can be used to mitigate resource exhaustion of an application server? (Choose two)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (117q)
Question 1: A company has a web server behind a Palo Alto Networks next-...
2 commentQuestion 2: What are three valid actions in a File Blocking Profile? (Ch...
1 commentQuestion 3: Which three options are available when creating a security p...
Question 4: Which two virtualized environments support Active/Active Hig...
1 commentQuestion 5: At which stage of the cyber-attack lifecycle would the attac...
Question 6: A file sharing application is being permitted and no one kno...
Question 7: Which operation will impact performance of the management pl...
Question 8: A web server is hosted in the DMZ and the server is configur...
Question 9: Click the Exhibit button below, (Exhibit) A firewall has thr...
Question 10: Palo Alto Networks maintains a dynamic database of malicious...
Question 11: An administrator sees several inbound sessions identified as...
Question 12: An administrator has been asked to configure active/passive ...
Question 13: A network administrator wants to use a certificate for the S...
Question 14: Which data flow describes redistribution of user mappings?...
Question 15: Starting with PAN-OS version 9.1, Global logging information...
Question 16: An administrator deploys PA-500 NGFWs as an active/passive h...
Question 17: The IT department has received complaints abou VoIP call jit...
Question 18: Which option would an administrator choose to define the cer...
Question 19: A network security engineer has a requirement to allow an ex...
1 commentQuestion 20: Refer to the exhibit. (Exhibit) An administrator cannot see ...
Question 21: Starling with PAN-OS version 9.1, GlobalProtect logging info...
Question 22: An administrator wants to upgrade an NGFW from PAN-OS® 9.0 t...
Question 23: A company needs to preconfigure firewalls to be sent to remo...
Question 24: Which two methods can be used to mitigate resource exhaustio...
Question 25: Decrypted packets from the website https://www.microsoft.com...
Question 26: An administrator has been asked to create 100 virtual firewa...
Question 27: How does Panorama handle incoming logs when it reaches the m...
Question 28: A bootstrap USB flash drive has been prepared using a Window...
Question 29: Which protection feature is available only in a Zone Protect...
Question 30: Company.com has an in-house application that the Palo Alto N...
Question 31: An administrator encountered problems with inbound decryptio...
Question 32: Several offices are connected with VPNs using static IPV4 ro...
Question 33: What file type upload is supported as part of the basic Wild...
Question 34: PBF can address which two scenarios? (Select Two)...
Question 35: An administrator has configured a QoS policy rule and a QoS ...
Question 36: An administrator wants to enable zone protection Before doin...
Question 37: Site-A and Site-B need to use IKEv2 to establish a VPN conne...
Question 38: A Palo Alto Networks NGFW just submitted a file to WildFire ...
Question 39: Which method does an administrator use to integrate all non-...
Question 40: Match each SD-WAN configuration element to the description o...
Question 41: An administrator accidentally closed the commit window/scree...
Question 42: Which statement accurately describes service routes and virt...
Question 43: An administrator has been asked to configure a Palo Alto Net...
Question 44: Which three steps will reduce the CPU utilization on the man...
Question 45: An Administrator is configuring Authentication Enforcement a...
Question 46: YouTube videos are consuming too much bandwidth on the netwo...
Question 47: In which two types of deployment is active/active HA configu...
Question 48: How can a candidate or running configuration be copied to a ...
Question 49: Which processing order will be enabled when a Panorama admin...
Question 50: If an administrator wants to decrypt SMTP traffic and posses...
Question 51: What must be used in Security Policy Rule that contain addre...
Question 52: A network security engineer needs to configure a virtual rou...
Question 53: What are two characteristic types that can be defined for a ...
Question 54: An administrator sees several inbound sessions identified as...
Question 55: A logging infrastructure may need to handle more than 10,000...
Question 56: When you configure a Layer 3 interface what is one mandatory...
Question 57: Which two methods can be configured to validate the revocati...
Question 58: Which two mechanisms help prevent a spilt brain scenario an ...
Question 59: An administrator wants a new Palo Alto Networks NGFW to obta...
Question 60: Refer to the exhibit. (Exhibit) Which certificate can be use...
Question 61: Firewall administrators cannot authenticate to a firewall GU...
Question 62: How would an administrator monitor/capture traffic on the ma...
Question 63: In a Panorama template which three types of objects are conf...
Question 64: Which two actions would be part of an automatic solution tha...
Question 65: Which two features can be used to tag a username so that it ...
Question 66: An administrator is configuring an IPSec VPN to a Cisco ASA ...
Question 67: Which CLI command is used to simulate traffic going through ...
Question 68: An administrator has left a firewall to use the default port...
Question 69: How does an administrator schedule an Applications and Threa...
Question 70: A customer has an application that is being identified as un...
Question 71: A network Administrator needs to view the default action for...
Question 72: Which DoS protection mechanism detects and prevents session ...
Question 73: Which User-ID mapping method should be used in a high-securi...
Question 74: What are two benefits of nested device groups in Panorama? (...
Question 75: In High Availability, which information is transferred via t...
Question 76: Which version of GlobalProtect supports split tunneling base...
Question 77: An engineer is planning an SSL decryption implementation Whi...
Question 78: An administrator logs in to the Palo Alto Networks NGFW and ...
Question 79: An administrator has been asked to configure active/active H...
Question 80: Which URL Filtering Security Profile action togs the URL Fil...
Question 81: When is it necessary to activate a license when provisioning...
Question 82: Which option enables a Palo Alto Networks NGFW administrator...
Question 83: Which feature can provide NGFWs with User-ID mapping informa...
Question 84: What are two prerequisites for configuring a pair of Palo Al...
Question 85: Which prerequisite must be satisfied before creating an SSH ...
Question 86: View the GlobalProtect configuration screen capture. (Exhibi...
Question 87: Which setting allow a DOS protection profile to limit the ma...
Question 88: An administrator needs to upgrade an NGFW to the most curren...
Question 89: Which PAN-OS® policy must you configure to force a user to p...
Question 90: Which CLI command enables an administrator to view details a...
Question 91: A client has a sensitive application server in their data ce...
Question 92: An administrator cannot see any Traffic logs from the Palo A...
Question 93: Which GlobalProtect Client connect method requires the distr...
Question 94: A company has a policy that denies all applications it class...
Question 95: Which administrative authentication method supports authoriz...
Question 96: When overriding a template configuration locally on a firewa...
Question 97: Which Security Policy Rule configuration option disables ant...
Question 98: What is the purpose of the firewall decryption broker?...
Question 99: In SSL Forward Proxy decryption, which two certificates can ...
Question 100: Given the following snippet of a WildFire submission log. di...
Question 101: The certificate information displayed in the following image...
Question 102: Which is not a valid reason for receiving a decrypt-cert-val...
Question 103: Which field is optional when creating a new Security Policy ...
Question 104: Where can an administrator see both the management plane and...
Question 105: Which three function are found on the dataplane of a PA-5050...
Question 106: How are IPV6 DNS queries configured to user interface ethern...
Question 107: A web server is hosted in the DMZ, and the server is configu...
Question 108: When an in-band data port is set up to provide access to req...
Question 109: Which event will happen if an administrator uses an Applicat...
Question 110: A user's traffic traversing a Palo Alto Networks NGFW someti...
Question 111: The following objects and policies are defined in a device g...
Question 112: Place the steps in the WildFire process workflow in their co...
Question 113: Which value in the Application column indicates UDP traffic ...
Question 114: A company hosts a publicly accessible web server behind a Pa...
Question 115: When configuring the firewall for packet capture, what are t...
Question 116: Site-A and Site-B have a site-to-site VPN set up between the...
Question 117: Which Panorama administrator types require the configuration...