*
Enable and Disable only
Allow and Deny only
Enable, Read-Only, and Disable None, Superuser, Administrator
Mark for follow up
Question 22 of 50.
User-ID is enabled in the configuration of … *
An Interface.
A Security Profile. A Zone. A Security Policy.
Mark for follow up
Question 23 of 50.
Considering the information in the screenshot above, what is the order of evaluation for this URL
Device
Filtering Profile? *
Allow List, Block List, Custom Categories, URL Categories (BrightCloud or PAN-DB).
Block List, Allow List, URL Categories (BrightCloud or PAN-DB), Custom Categories.
Block List, Allow List, Custom Categories, URL Categories (BrightCloud or PAN-DB).
URL Categories (BrightCloud or PAN-DB), Custom Categories, Block List, Allow List.
Mark for follow up
Question 24 of 50.
Choose the best answer: In PAN-OS, the WildFire Subscription Service allows updates for malware signatures to be distributed as often as… *
Once an hour
Once a week Once every minutes Once a day
Mark for follow up
Question 25 of 50.
15
As a Palo Alto Networks firewall administrator, you have made unwanted changes to the Candidate configuration. These changes may be undone by Device > Setup > Operations > Configuration Management>....and then what operation? *
Revert to Running Configuration
Revert to last Saved Configuration Load Configuration Version Import Named Snapshot
Mark for follow up
Question 26 of 50.
The \ *
The ability to use Authentication Profiles, in order to protect against unwanted downloads.
Password-protected access to specific file downloads for authorized users.
Protection against unwanted downloads by showing the user a response page indicating that a file is going to be downloaded.
Increased speed on downloads of file types that are explicitly enabled.
Mark for follow up
Question 27 of 50.
Configuration
In order to route traffic between Layer 3 interfaces on the Palo Alto Networks firewall, you need a: *
Virtual Router VLAN Virtual Wire Security Profile
Mark for follow up
Question 28 of 50.
Which type of license is required to perform Decryption Port Mirroring? *
A subscription-based license
PAN-PA-Decrypt
A subscription-based SSL Port license A free PAN-PA-Decrypt license A Client Decryption license
Mark for follow up
Question 29 of 50.
Which of the following are methods that HA clusters use to identify network outages? *
Link and Session Monitors
Heartbeat Monitors
and
Session
Path and Link Monitoring VR and VSYS Monitors
Mark for follow up
Question 30 of 50.
Color-coded tags can be used on all of the items listed below EXCEPT: *
Service Groups Zones Vulnerability Profiles Address Objects
Mark for follow up
Question 31 of 50.