لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided password?
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which statement best describes a common use of Policy Optimizer?
A. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications
B. Policy Optimizer can add or change a Log Forwarding profile for each Security policy selected
C. Policy Optimizer can display which Security policies have not been used in the last 90 days
D. Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID Security policy for every Layer 4 policy that exist
E. Admins can then manually enable policies they want to keep and delete ones they want to remove
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which license is required to use the Palo Alto Networks built-in IP address EDLs?
A. DNS Security
B. Threat Prevention
C. WildFire
D. SD-Wan
عرض الإجابة
اجابة صحيحة: D
السؤال #4
An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)
A. Packets sent/received
B. IP Protocol
C. Action
D. Decrypted
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A network administrator is required to use a dynamic routing protocol for network connectivity. Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)
A. RIP
B. OSPF
C. IS-IS
D. EIGRP
E. BGP
عرض الإجابة
اجابة صحيحة: BD
السؤال #6
An administrator wishes to follow best practices for logging traffic that traverses the firewall Which log setting is correct?
A. Disable all logging
B. Enable Log at Session End
C. Enable Log at Session Start
D. Enable Log at both Session Start and End
عرض الإجابة
اجابة صحيحة: AD
السؤال #7
URL categories can be used as match criteria on which two policy types? (Choose two.)
A. authentication
B. decryptionC application override
C. NAT
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which statement is true regarding a Best Practice Assessment? The BPA tool can be run only on firewalls
A.
B. It provides a percentage of adoption for each assessment data
C. The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities
D. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which type of address object is "10 5 1 1/0 127 248 2"?
A. IP subnet
B. IP wildcard mask
C. IP netmask
D. IP range
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR. Which two types of traffic will the rule apply to? (Choose two)
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: D
السؤال #11
What is a recommended consideration when deploying content updates to the firewall from Panorama?
A. Content updates for firewall A/P HA pairs can only be pushed to the active firewall
B. Content updates for firewall A/A HA pairs need a defined master device
C. Before deploying content updates, always check content release version compatibility
D. After deploying content updates, perform a commit and push to Panorama
عرض الإجابة
اجابة صحيحة: A
السؤال #12
An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range. Which steps should the administrator take?
A. Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry
B. Add each IP address in the range as a list entry and then exclude the IP address by
C. Select the address range in the List Entries lis
D. A column will open with the IP addresse
E. Select the entry to exclude
F. Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry
عرض الإجابة
اجابة صحيحة: A
السؤال #13
How often does WildFire release dynamic updates?
A. every 5 minutes
B. every 15 minutes
C. every 60 minutes
D. every 30 minutes
عرض الإجابة
اجابة صحيحة: A
السؤال #14
You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database? Data Filtering Profile applied to outbound Security policy rules
A.
B. Antivirus Profile applied to outbound Security policy rules
C. Data Filtering Profile applied to inbound Security policy rules
D. Vulnerability Profile applied to inbound Security policy rules
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Why should a company have a File Blocking profile that is attached to a Security policy?
A. To block uploading and downloading of specific types of files
B. To detonate files in a sandbox environment
C. To analyze file types
D. To block uploading and downloading of any type of files
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic .
A. on either the data place or the management plane
B. after it is matched by a security policy rule that allows traffic
C. before it is matched to a Security policy rule
D. after it is matched by a security policy rule that allows or blocks traffic
عرض الإجابة
اجابة صحيحة: C
السؤال #17
An administrator needs to add capability to perform real-time signature lookups to block or sinkhole all known malware domains. Which type of single unified engine will get this result?
A. User-ID
B. App-ID
C. Security Processing Engine
D. Content-ID
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which rule type is appropriate for matching traffic occurring within a specified zone?
A. Interzone
B. Universal
C. Intrazone
D. Shadowed
عرض الإجابة
اجابة صحيحة: A
السؤال #19
An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?
A. Dynamic IP and Port
B. Dynamic IP
C. Static IP
D. Destination
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Given the topology, which zone type should you configure for firewall interface E1/1?
A. Tap
B. Tunnel
C. Virtual Wire
D. Layer3
عرض الإجابة
اجابة صحيحة: D
السؤال #21
A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks? Windows-based agent on a domain controller
A.
B. Captive Portal
C. Citrix terminal server with adequate data-plane resources
D. PAN-OS integrated agent
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)
A. XML API
B. log forwarding auto-tagging
C. GlobalProtect agent
D. User-ID Windows-based agent
عرض الإجابة
اجابة صحيحة: B
السؤال #23
Where within the firewall GUI can all existing tags be viewed?
A. Network > Tags
B. Monitor > Tags
C. Objects > Tags
D. Policies > Tags
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: