لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An administrator would like to determine the default deny action for the application dns- over-https Which action would yield the information?
A. View the application details in beacon paloaltonetworks
B. Check the action for the Security policy matching that traffic
C. Check the action for the decoder in the antivirus profile
D. View the application details in Objects > Applications
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone. Complete the security policy to ensure only Telnet is allowed. Security Policy: Source Zone: Internal to DMZ Zone services “Application defaults”, and action = Allow
A. Destination IP: 192
B. Application = ‘Telnet’
C. Log Forwarding
D. USER-ID = ‘Allow users in Trusted’
عرض الإجابة
اجابة صحيحة: AD
السؤال #3
An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?
A. 50
B. 100
C. 200
D. 1,000
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Given the topology, which zone type should interface E1/1 be configured with?
A. Tap
B. Tunnel
C. Virtual Wire
D. Layer3
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Access to which feature requires PAN-OS Filtering licens?
A. PAN-DB database
B. URL external dynamic lists
C. Custom URL categories
D. DNS Security
عرض الإجابة
اجابة صحيحة: C
السؤال #6
An administrator is configuring a NAT rule At a minimum, which three forms of information are required? (Choose three.)
A. name
B. source zone
C. destination interface
D. destination address
E. destination zone
عرض الإجابة
اجابة صحيحة: A
السؤال #7
An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs. What is the correct process to enable this logging1?
A. Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OK
B. Select the interzone-default rule and edit the rule on the Actions tab select Log at Session End and click OK
C. This rule has traffic logging enabled by default no further action is required
D. Select the interzone-default rule and click Override on the Actions tab select Log at Session End and click OK
عرض الإجابة
اجابة صحيحة: C
السؤال #8
An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule, which is set to default configuration. What should the administrator do?
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: C
السؤال #9
What can be used as match criteria for creating a dynamic address group?
A. Usernames
B. IP addresses
C. Tags
D. MAC addresses
عرض الإجابة
اجابة صحيحة: BD
السؤال #10
How frequently can wildfire updates be made available to firewalls?
A. every 15 minutes
B. every 30 minutes
C. every 60 minutes
D. every 5 minutes
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Based on the screenshot what is the purpose of the group in User labelled ''it"? Allows users to access IT applications on all ports
A.
B. Allows users in group "DMZ" lo access IT applications
C. Allows "any" users to access servers in the DMZ zone
D. Allows users in group "it" to access IT applications
عرض الإجابة
اجابة صحيحة: B
السؤال #12
What are the two default behaviors for the intrazone-default policy? (Choose two.)
A. Allow
B. Logging disabled
C. Log at Session End Deny D
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
A. on the App Dependency tab in the Commit Statuswindow
B. on the Policy Optimizer'sRule UsagepageC ontheApplication tab in the Security Policy Rulecreation window
C. ontheObjects>Applicationsbrowser pages
عرض الإجابة
اجابة صحيحة: ABE
السؤال #14
Which statement is true regarding a Best Practice Assessment?
A. The BPA tool can be run only on firewalls
B. It provides a percentage of adoption for each assessment data
C. The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities
D. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: