لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two statements are correct about App-ID content updates? (Choose two.)
A. Updated application content may change how security policy rules are enforced
B. After an application content update, new applications must be manually classified prior to use
C. Existing security policy rules are not affected by application content updates
D. After an application content update, new applications are automatically identified and classified
عرض الإجابة
اجابة صحيحة: CD
السؤال #2
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
A. Block List
B. Custom URL Categories
C. PAN-DB URL Categories
D. Allow List
عرض الإجابة
اجابة صحيحة: AD
السؤال #3
What are three differences between security policies and security profiles? (Choose three.)
A. Security policies are attached to security profiles
B. Security profiles are attached to security policies
C. Security profiles should only be used on allowed traffic
D. Security profiles are used to block traffic by themselves
E. Security policies can block or allow traffic
عرض الإجابة
اجابة صحيحة: C
السؤال #4
DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. Select and Place:
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
A. User identification
B. Filtration protection
C. Vulnerability protection
D. Antivirus
E. Application identification
F. Anti-spyware
عرض الإجابة
اجابة صحيحة: CD
السؤال #6
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
A. Threat Prevention License
B. Threat Implementation License
C. Threat Environment License
D. Threat Protection License
عرض الإجابة
اجابة صحيحة: D
السؤال #7
An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?
A. branch office traffic
B. north-south traffic
C. perimeter traffic
D. east-west traffic
عرض الإجابة
اجابة صحيحة: A
السؤال #8
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
A. Create an Application Filter and name it Office Programs, the filter it on the business-systems category, office-programs subcategory
B. Create an Application Group and add business-systems to it
C. Create an Application Filter and name it Office Programs, then filter it on the business-systems category
D. Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?
A. Windows-based agent deployed on the internal network
B. PAN-OS integrated agent deployed on the internal network
C. Citrix terminal server deployed on the internal network
D. Windows-based agent deployed on each of the WAN Links
عرض الإجابة
اجابة صحيحة: AD
السؤال #10
Identify the correct order to configure the PAN-OS integrated USER-ID agent. 3. add the service account to monitor the server(s) 2. define the address of the servers to be monitored on the firewall 4. commit the configuration, and verify agent connection status 1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent
A. 2-3-4-1
B. 1-4-3-2
C. 3-1-2-4
D. 1-3-2-4
عرض الإجابة
اجابة صحيحة: A
السؤال #11
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
A. Weaponization
B. Reconnaissance
C. Installation
D. Command and Control
E. Exploitation
عرض الإجابة
اجابة صحيحة: A
السؤال #12
DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. Select and Place:
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #13
How many zones can an interface be assigned with a Palo Alto Networks firewall?
A. two
B. three
C. four
D. one
عرض الإجابة
اجابة صحيحة: BC
السؤال #14
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
A. Layer 2
B. Tap
C. Layer 3
D. Virtual Wire
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: