لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
How do you configure the rate of file submissions to WildFire in the NGFW?
A. nce a day
B. nce a week
C. nce every minute
D. nce an hour
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
A. 500 to 2500 bytes
B. 0MB to 30 MB
C. MB to 5 MB
D. 00MB to 200 MB
عرض الإجابة
اجابة صحيحة: BCD
السؤال #3
A client chooses to not block uncategorized websites.Which two additions should be made to help provide some protection? (Choose two.)
A. ontent Filtering
B. ildFire
C. ustom App-ID rules
D. pp-ID
عرض الإجابة
اجابة صحيحة: AD
السؤال #4
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
A. ccess key ID
B. ecret access key
C. dministrative Password
D. WS account ID
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A company has deployed the following:-VM-300 firewalls in AWS-endpoint protection with the Traps Management Service-a Panorama M-200 for managing its VM-Series firewalls-PA-5220s for its internet perimeter,-Prisma SaaS for SaaS security.Which two products can send logs to the Cortex Data Lake? (Choose two).
A. nterface management profile on the zone of the ingress interface
B. one protection profile on the zone of the ingress interface
C. n App-ID security policy rule to block traffic sourcing from the untrust zone
D. ecurity profiles to security policy rules for traffic sourcing from the untrust zone
عرض الإجابة
اجابة صحيحة: CD
السؤال #6
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)
A. ased on the purchased license uploaded
B. oS tagging
C. aximum number of files per minute
D. aximum number of files per day
عرض الإجابة
اجابة صحيحة: AB
السؤال #7
Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)
A. raps TMS
B. utoFocus
C. anorama Correlation Report
D. irewall Botnet Report
عرض الإجابة
اجابة صحيحة: BD
السؤال #8
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer's requirements? (Choose two.)
A. nti-virus (weekly): Application (daily)
B. nti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)
C. nti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)
D. nti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)
عرض الإجابة
اجابة صحيحة: AB
السؤال #9
Which two methods provide a virtual IP address when implementing active/active HA? (Choose two )
A. M-Series uses NetX API to receive and send packets
B. raffic steering rules could be defined on Panorama and pushed to NSX Manager
C. M-Series provide Multi-tenancy support with multiple zones
D. ne panorama could support to connect with only one NSX manager
عرض الإجابة
اجابة صحيحة: CD
السؤال #10
How do you configure the rate of file submissions to WildFire in the NGFW?
A. nce a day
B. nce a week
C. nce every minute
D. nce an hour
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which VM-Series can be deployed on Amazon Web Services (AWS)?
A. an deploy any VM-Series except the VM-50
B. nly VM-100, VM-200 and VM-300
C. ny VM-Series model
D. ny VM-Series model except the VM-700
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
A. 500 to 2500 bytes
B. 0MB to 30 MB
C. MB to 5 MB
D. 00MB to 200 MB
عرض الإجابة
اجابة صحيحة: BCD
السؤال #13
Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?
A. enerate a Stats Dump File and upload it to the Palo Alto Networks support portal
B. elect Panorama > Licenses and click Activate feature using authorization code
C. enerate a Tech Support File and call PANTAC
D. elect Device > Licenses and click Activate feature using authorization code
عرض الإجابة
اجابة صحيحة: B
السؤال #14
How frequently do WildFire signatures move into the antivirus database?
A. very 24 hours
B. very 12 hours
C. nce a week
D. very 1 hour
عرض الإجابة
اجابة صحيحة: A
السؤال #15
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)
A. show sdwan connection all |
B. show sdwan path-monitor stats vif
C. show sdwan rule vif sdwan
D. show sdwan session distribution policy-name
عرض الإجابة
اجابة صحيحة: CD
السؤال #16
A client chooses to not block uncategorized websites.Which two additions should be made to help provide some protection? (Choose two.)
A. ontent Filtering
B. ildFire
C. ustom App-ID rules
D. pp-ID
عرض الإجابة
اجابة صحيحة: AD
السؤال #17
Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?
A. rototype
B. nputs
C. lass
D. eed Base URL
عرض الإجابة
اجابة صحيحة: D
السؤال #18
When deploying VM series on NSX platform to support micro-segmentation, which statement is NOT correct?
A. an use a Palo Alto Networks NGFW for this requirement, but not a port filter firewall
B. an use either a Palo Alto Networks NGFW or a port filler firewall for this requirement
C. an use a port filter firewall for this requirement but not the Palo Alto Networks NGFW
D. an use a specialized VM with advanced threat protection for this requirement
عرض الإجابة
اجابة صحيحة: A
السؤال #19
In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)
A. ildFire hybrid deployment
B. minute WildFire updates to threat signatures
C. ccess to the WildFire API
D. E file upload to WildFire
عرض الإجابة
اجابة صحيحة: AD
السؤال #20
An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP addressWhich mechanism prevents this connection from succeeding?
A. NS Sinkholing
B. NS Proxy
C. nti-Spyware Signatures
D. ildfire Analysis
عرض الإجابة
اجابة صحيحة: A
السؤال #21
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)
A. ased on the purchased license uploaded
B. oS tagging
C. aximum number of files per minute
D. aximum number of files per day
عرض الإجابة
اجابة صحيحة: AB
السؤال #22
What is the basis for purchasing Cortex XDR licensing?
A. olume of logs being processed based on Datalake purchased
B. umber of nodes and endpoints providing logs
C. nlimited licenses
D. umber of NGFWs
عرض الإجابة
اجابة صحيحة: B
السؤال #23
Which configuration is required in NSX for Panorama to use the tags from security groups in dynamic address groups?
A. rista supports all hardware models of the Palo Alto Networks NGFW natively
B. rista allows standalone non-HA firewalls to be attached to a service leaf switch
C. rista CloudVision obtains relevant rules from Panorama through API and programs the Arista switches to steer intercepted east-west traffic to the Palo Alto Networks NGFW
D. rista owns the Security policy
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which profile or policy should be applied to protect against port scans from the internet?
A. MB
B. epends on the Cortex Data Lake tier purchased
C. 8 bytes
D. 500 bytes
عرض الإجابة
اجابة صحيحة: B
السؤال #25
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?A)B)C)D)
A. ption
B. ption
C. ption
D. ption
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which VM-Series can be deployed on VMware NSX?
A. M-100, VM-200, VM-300
B. M-50r VM-100, VM-200, VM-300, VM-500
C. M-100, VM-200, VM-300, VM-500, VM-700
D. ll VM Series Models can be deployed on VMware NSX
عرض الإجابة
اجابة صحيحة: A
السؤال #27
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer's requirements? (Choose two.)
A. nti-virus (weekly): Application (daily)
B. nti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)
C. nti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)
D. nti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)
عرض الإجابة
اجابة صحيحة: AB
السؤال #28
When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?
A. vulnerability profile to security policy rules that deny general web access
B. n antivirus profile to security policy rules that deny general web access
C. zone protection profile to the untrust zone
D. file blocking profile to security policy rules that allow general web access
عرض الإجابة
اجابة صحيحة: D
السؤال #29
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?A)B)C)D)
A. ption
B. ption
C. ption
D. ption
عرض الإجابة
اجابة صحيحة: A
السؤال #30
How do Palo Alto Networks NGFWs integrate with an ACI architecture?
A. roduction
B. evelopment
C. esting
D. A
عرض الإجابة
اجابة صحيحة: B
السؤال #31
A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.The customer uses a firewall with User-ID enabledWhich feature must also be enabled to prevent these attacks?
A. ll hardware-based and VM-Series firewalls with the exception of VMware NSX
B. n hardware only
C. nly one the PA-5000 Series and higher
D. ll hardware-based and VM-Series firewalls regardless of where installed
عرض الإجابة
اجابة صحيحة: B
السؤال #32
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)
A. show sdwan connection all |
B. show sdwan path-monitor stats vif
C. show sdwan rule vif sdwan
D. show sdwan session distribution policy-name
عرض الإجابة
اجابة صحيحة: CD
السؤال #33
In an overlay network model of an ACI architecture, which statement is correct?
A. he Top of Rack (TOR) switch must be able to understand both the overlay and the underlay network
B. ll forwarding lookups are done at the network controller
C. he network controller is responsible for setting up the overlay paths
D. he underlay network must be Layer 3 only
عرض الإجابة
اجابة صحيحة: A
السؤال #34
What is the default session distribution policy in the PA-7000 Series?
A. ash
B. gress-Slot
C. ound Robin
D. ngress-Slot
عرض الإجابة
اجابة صحيحة: D
السؤال #35
A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions.Which Network Processing Card should be recommended in the Bill of Materials?
A. A-7000-20GQ-NPC
B. A-7000-40G-NPC
C. A-7000-20GQXM-NPC
D. A-7000-20G-NPC
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: