Review Test Questions: View: ID Correct
Review Test Questions: View: ID Correct
Test results are summarized below. Change the view to see only Correct or Incorrect questions.
ID Question Correct
A Config Lock may be removed by which of the following users? (Select all
6786 Incorrect
correct answers.)
As the Palo Alto Networks Administrator you have enabled Application Block
pages. Afterwards, not knowing they are attempting to access a blocked web-
7984 based application, users call the Help Desk to complain about network Incorrect
connectivity issues. What is the cause of the increased number of help desk
calls?
Choose the best answer: In PAN-OS, the WildFire Subscription Service allows
8731 Incorrect
updates for malware signatures to be distributed as often as…
7945 Security policy rules specify a source interface and a destination interface. Incorrect
8671 What is the default setting for 'Action' in a Decryption Policy's rule? Incorrect
When an interface is in Tap mode and a Policy’s action is set to “block”, the
7949 Incorrect
interface will send a TCP reset.
When configuring Admin Roles for Web UI access, what are the available access
8625 Incorrect
levels?
When you have created a Security Policy Rule that allows Facebook, what must
8606 Incorrect
you do to block all other web-browsing traffic?
8526 Which of the following is NOT a valid option for built-in CLI Admin roles? Incorrect
8456 Which statement about config locks is True? Incorrect
https://paloaltonetworks.csod.com/Evaluations/Tests/UserTestReview.aspx?OID=e9d5a4... 30/07/2016
Realize Your Potential: paloaltonetworks Página 2 de 2
ID Question Correct
With IKE Phase 1, each device is identified to the other by a Peer ID. In most
7950 cases, the Peer ID is just the public IP address of the device. In situations where Incorrect
the public IP address is not static, the Peer ID can be a text value.
True or False: The WildFire Analysis Profile can only be configured to send
13814 Incorrect
unknown files to the WildFire Public Cloud only.
Attackers will employ a number of tactics to hide malware. One such tactic is to
encode and/or compress the file so as to hide the malware. With PAN-OS 7.0 the
13787 Incorrect
firewall can decode up to four levels. But if an attacker has encoded the file
beyond four levels, what can you as an administer do to protect your users?
Close
https://paloaltonetworks.csod.com/Evaluations/Tests/UserTestReview.aspx?OID=e9d5a4... 30/07/2016