لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two security profile types can be attached to a security policy? (Choose two.)
A. antivirus
B. DDoS protection
C. threat
D. vulnerability
عرض الإجابة
اجابة صحيحة: C
السؤال #2
According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?
A. by minute
B. hourly
C. daily
D. weekly
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)
A. GlobalProtect
B. Panorama
C. Aperture
D. AutoFocus
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Access to which feature requires the PAN-OS Filtering license?
A. PAN-DB database
B. DNS Security
C. Custom URL categories
D. URL external dynamic lists
عرض الإجابة
اجابة صحيحة: A
السؤال #5
DRAG DROP Match the cyber-attack lifecycle stage to its correct description.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which action results in the firewall blocking network traffic without notifying the sender? Deny
A.
B. No notification
C. Drop
D. Reset Client
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Complete the statement. A security profile can block or allow traffic
A. on unknown-tcp or unknown-udp traffic
B. after it is matched by a security policy that allows traffic
C. before it is matched by a security policy
D. after it is matched by a security policy that allows or blocks traffic
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)
A. Deny
B. Sinkhole
C. Override
D. Block
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Given the image, which two options are true about the Security policy rules. (Choose two.) The Allow Office Programs rule is using an Application Filter
A.
B. In the Allow FTP to web server rule, FTP is allowed using App-ID
C. The Allow Office Programs rule is using an Application Group
D. In the Allow Social Networking rule, allows all of Facebook’s functions
عرض الإجابة
اجابة صحيحة: BCE
السؤال #10
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which administrative management services can be configured to access a management interface?
A. HTTP, CLI, SNMP, HTTPS
B. HTTPS, SSH telnet SNMP
C. SSH: telnet HTTP, HTTPS
D. HTTPS, HTT
E. CLI, API
عرض الإجابة
اجابة صحيحة: BD
السؤال #12
An administrator is reviewing the Security policy rules shown in the screenshot below. Which statement is correct about the information displayed?
A. Eleven rules use the "Infrastructure* tag
B. The view Rulebase as Groups is checked
C. There are seven Security policy rules on this firewall
D. Highlight Unused Rules is checked
عرض الإجابة
اجابة صحيحة: B
السؤال #13
What is a recommended consideration when deploying content updates to the firewall from Panorama?
A. Before deploying content updates, always check content release version compatibility
B. Content updates for firewall A/P HA pairs can only be pushed to the active firewall
C. Content updates for firewall A/A HA pairs need a defined master device
D. After deploying content updates, perform a commit and push to Panorama
عرض الإجابة
اجابة صحيحة: A
السؤال #14
An administrator is troubleshooting traffic that should match the interzone-default rule. However, the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was never changed from its default configuration. Why doesn't the administrator see the traffic?
A. Traffic is being denied on the interzone-default policy
B. The Log Forwarding profile is not configured on the policy
C. The interzone-default policy is disabled by default
D. Logging on the interzone-default policy is disabled
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?
A. Prisma SaaS
B. Panorama
C. AutoFocus
D. GlobalProtect
عرض الإجابة
اجابة صحيحة: D
السؤال #16
What is the purpose of the automated commit recovery feature?
A. It reverts the Panorama configuration
B. It causes HA synchronization to occur automatically between the HA peers after a push from Panorama
C. It reverts the firewall configuration if the firewall recognizes a loss of connectivity to Panorama after the change
D. It generates a config log after the Panorama configuration successfully reverts to the last running configuration
عرض الإجابة
اجابة صحيحة: C
السؤال #17
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email? delivery
A.
B. command and control
C. explotation
D. reinsurance
E. installation
عرض الإجابة
اجابة صحيحة: D
السؤال #18
An administrator would like to apply a more restrictive Security profile to traffic for file sharing applications. The administrator does not want to update the Security policy or object when new applications are released. Which object should the administrator use as a match condition in the Security policy? the Content Delivery Networks URL category
A.
B. the Online Storage and Backup URL category
C. an application group containing all of the file-sharing App-IDs reported in the traffic logs
D. an application filter for applications whose subcategory is file-sharing
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
A. Anti-Spyware
B. Antivirus
C. Vulnerability Protection
D. URL Filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones. Which Security policy rule type should they use? default
A.
B. universal
C. intrazone
D. interzone
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which Security profile would you apply to identify infected hosts on the protected network uwall user database?
A. Anti-spyware
B. Vulnerability protection
C. URL filtering
D. Antivirus
عرض الإجابة
اجابة صحيحة: AB
السؤال #22
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?
A. Active Directory monitoring
B. Windows session monitoring
C. Windows client probing
D. domain controller monitoring
عرض الإجابة
اجابة صحيحة: AD
السؤال #23
Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?
A. Review Apps
B. Review App Matches
C. Pre-analyze
D. Review Policies
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: