لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An administrator is receiving complaints about application performance degradation. After checking the CC, the administrator observes that there is an excessive amount of SSL traffic. Which three elements should the administrator configure to address this issue? (Choose three.)
A. n Application Override policy for the SSL traffic
B. oS on the egress interface for the traffic flows
C. QoS policy for each application ID
D. QoS profile defining traffic classes
E. oS on the ingress interface for the traffic flows
عرض الإجابة
اجابة صحيحة: BCD
السؤال #2
An engineer is troubleshooting a traffic-routing issue. What is the correct packet-flow sequence?
A. BF > Zone Protection Profiles > Packet Buffer Protection
B. AT > Security policy enforcement > OSPF
C. BF > Static route > Security policy enforcement
D. GP > PBF > NAT
عرض الإجابة
اجابة صحيحة: C
السؤال #3
An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted Information Security to look for more controls that can secure access to critical assets. For users that need to access these systems, Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MF
A. What should the enterprise do to use PAN-OS MFA?
A. onfigure a Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile
B. onfigure a Captive Portal authentication policy that uses an authentication sequence
C. se a Credential Phishing agent to detect, prevent, and mitigate credential phishing campaigns
D. reate an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged. Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
A. tandalone User-ID agent
B. aptive portal
C. yslog listener
D. gentless User-ID with redistribution
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Why would a traffic log list an application as "not-applicable''?
A. he firewall denied the traffic before the application match could be performed
B. he TCP connection terminated without identifying any application data
C. here was not enough application data after the TCP connection was established
D. he application is not a known Palo Alto Networks App-ID
عرض الإجابة
اجابة صحيحة: A
السؤال #6
When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?
A. isable config sync
B. et the passive link state to "shutdown
C. isable the HA2 link
D. isable HA
عرض الإجابة
اجابة صحيحة: A
السؤال #7
During the process of developing a decryption strategy and evaluating which websites are required for corporate users to access, several sites have been identified that cannot be decrypted due to technical reasons. In this case, the technical reason is unsupported ciphers. Traffic to these sites will therefore be blocked if decrypted. How should the engineer proceed?
A. nstall the the unsupported cipher into the firewall to allow the sites to be decrypted
B. reate a Security policy to allow access to those sites
C. dd the sites to the SSL Decryption Exclusion list to exempt them from decryption
D. llow the firewall to block the sites to improve the security posture
عرض الإجابة
اجابة صحيحة: C
السؤال #8
lf an administrator wants to apply QoS to traffic based on source, what must be specified in a QoS policy rule?
A. re-NAT source address
B. ost-NAT destination address
C. re-NAT destination address
D. ost-NAT source address
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An engineer is monitoring an active/passive high availability (HA) firewall pair. Which HA firewall state describes the firewall that is experiencing a failure of a monitored path?
A. uspended
B. nitial
C. on-functional
D. assive
عرض الإجابة
اجابة صحيحة: B
السؤال #10
An engineer needs to configure a standardized template for all Panorama-managed firewalls. These settings will be configured on a template named "Global" and will be included in all template stacks. Which three settings can be configured in this template? (Choose three.)
A. ogin banner
B. og Forwarding profile
C. SL decryption exclusion
D. mail scheduler
E. ynamic updates
عرض الإجابة
اجابة صحيحة: ABE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: