0% found this document useful (0 votes)
63 views

Review Test Questions: View: ID Correct

The document appears to be a summary of test results from a Palo Alto Networks certification or training exam. It lists 19 multiple choice questions related to configuring and using Palo Alto Networks firewalls and security policies. For each question, it indicates whether the user's answer was correct or incorrect. The questions cover topics like config locks, application blocking, security policies, interfaces, and WildFire subscriptions.

Uploaded by

gustavo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Review Test Questions: View: ID Correct

The document appears to be a summary of test results from a Palo Alto Networks certification or training exam. It lists 19 multiple choice questions related to configuring and using Palo Alto Networks firewalls and security policies. For each question, it indicates whether the user's answer was correct or incorrect. The questions cover topics like config locks, application blocking, security policies, interfaces, and WildFire subscriptions.

Uploaded by

gustavo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Realize Your Potential: paloaltonetworks Página 1 de 2

Test results are summarized below. Change the view to see only Correct or Incorrect questions.

Review Test Questions

View: All Questions Correct Questions Incorrect Questions



(19 Results)

ID Question Correct

A Config Lock may be removed by which of the following users? (Select all
6786 Incorrect
correct answers.)

As the Palo Alto Networks Administrator you have enabled Application Block
pages. Afterwards, not knowing they are attempting to access a blocked web-
7984 based application, users call the Help Desk to complain about network Incorrect
connectivity issues. What is the cause of the increased number of help desk
calls?

8751 In Palo Alto Networks terms, an application is: Incorrect

8746 In PAN-OS 6.0 and later, rule numbers are: Incorrect

Choose the best answer: In PAN-OS, the WildFire Subscription Service allows
8731 Incorrect
updates for malware signatures to be distributed as often as…

7945 Security policy rules specify a source interface and a destination interface. Incorrect

8671 What is the default setting for 'Action' in a Decryption Policy's rule? Incorrect

When an interface is in Tap mode and a Policy’s action is set to “block”, the
7949 Incorrect
interface will send a TCP reset.

When configuring Admin Roles for Web UI access, what are the available access
8625 Incorrect
levels?

When Destination Network Address Translation is being performed, the


8591 Incorrect
destination in the corresponding Security Policy Rule should use:

When you have created a Security Policy Rule that allows Facebook, what must
8606 Incorrect
you do to block all other web-browsing traffic?

Which link is used by an Active/Passive cluster to synchronize session


8571 Incorrect
information?

8526 Which of the following is NOT a valid option for built-in CLI Admin roles? Incorrect

Which of the following most accurately describes Dynamic IP in a Source NAT


8521 Incorrect
configuration?


8456 Which statement about config locks is True? Incorrect
 

https://paloaltonetworks.csod.com/Evaluations/Tests/UserTestReview.aspx?OID=e9d5a4... 30/07/2016
Realize Your Potential: paloaltonetworks Página 2 de 2

ID Question Correct

With IKE Phase 1, each device is identified to the other by a Peer ID. In most
7950 cases, the Peer ID is just the public IP address of the device. In situations where Incorrect
the public IP address is not static, the Peer ID can be a text value.

In PAN-OS 7.0 which of the available choices serves as an alert warning by


13816 defining patterns of suspicious traffic and network anomalies that may indicate a Incorrect
host has been compromised?

True or False: The WildFire Analysis Profile can only be configured to send
13814 Incorrect
unknown files to the WildFire Public Cloud only.

Attackers will employ a number of tactics to hide malware. One such tactic is to
encode and/or compress the file so as to hide the malware. With PAN-OS 7.0 the
13787 Incorrect
firewall can decode up to four levels. But if an attacker has encoded the file
beyond four levels, what can you as an administer do to protect your users?

Close

https://paloaltonetworks.csod.com/Evaluations/Tests/UserTestReview.aspx?OID=e9d5a4... 30/07/2016

You might also like