Documente Academic
Documente Profesional
Documente Cultură
ACE 8.0
Question 1 of 40.
Question 2 of 40.
An Antivirus Security Profile specifies Actions and WildFire Actions. Wildfire Actions enable you to configure the firewall
to perform which operation?
Question 3 of 40.
An Interface Management Profile can be attached to which two interface types? (Choose two.)
Tap
Layer 2
Virtual Wire
Loopback
Layer 3
Question 4 of 40.
any
web-based
MGT port-based
non-TCP/IP
1 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Question 5 of 40.
Because a firewall examines every packet in a session, a firewall can detect application ________?
shifts
errors
groups
filters
Question 6 of 40.
Finding URLs matched to the not-resolved URL category in the URL Filtering log file might indicate that you should take
which action?
Question 7 of 40.
For which firewall feature should you create forward trust and forward untrust certificates?
SSH decryption
SSL client-side certificate checking
SSL Inbound Inspection decryption
SSL forward proxy decryption
Question 8 of 40.
If a DNS sinkhole is configured, any sinkhole actions indicating a potentially infected host are recorded in which log type?
Traffic
WildFire Submissions
Data Filtering
Threat
Question 9 of 40.
2 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
If there is an HA configuration mismatch between firewalls during peer negotiation, which state will the passive firewall
enter?
INITIAL
NON-FUNCTIONAL
PASSIVE
ACTIVE
Question 10 of 40.
In a destination NAT configuration, which option accurately completes the following sentence? A Security policy rule
should be written to match the _______.
post-NAT source and destination addresses, but the pre-NAT destination zone
original pre-NAT source and destination addresses, but the post-NAT destination zone
original pre-NAT source and destination addresses, and the pre-NAT destination zone
post-NAT source and destination addresses, and the post-NAT destination zone
Question 11 of 40.
In a Security Profile, which action does a firewall take when the profiles action is configured as Reset Server? (Choose
two.)
The traffic responder is reset.
For UDP sessions, the connection is dropped.
For UDP sessions, the connection is reset.
The client is reset.
Question 12 of 40.
Which two user mapping methods are supported by the User-ID integrated agent? (Choose two.)
WMI probing
NetBIOS Probing
LDAP Filters
Client Probing
Question 13 of 40.
SSL Inbound Inspection requires that the firewall be configured with which two components? (Choose two.)
client's public key
server's digital certificate This is Incorrect Answer to this should be Server's digital
certificate and server's Private key.
3 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Question 14 of 40.
The firewall acts as a proxy for which two types of traffic? (Choose two.)
SSH
Non-SSL
This is Incorrect
SSL Inbound Inspection
SSL outbound
Question 15 of 40.
The Threat log records events from which three Security Profiles? (Choose three.)
Vulnerability Protection
Antivirus
URL Filtering
Anti-Spyware
File Blocking
WildFire Analysis
Question 16 of 40.
The WildFire Portal website supports which three operations? (Choose three.)
view WildFire verdicts
report incorrect verdicts
upload files to WildFire for analysis
request firewall WildFire licenses
Question 17 of 40.
What are the two separate planes that make up the PAN-OS architecture? (Choose two.)
control/management plane
dataplane
routing plane
signature processing plane
HA plane
4 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Question 18 of 40.
What are two benefits of attaching a Decryption Profile to a Decryption policy no-decrypt rule? (Choose two.)
expired certificate checking
URL category match checking
untrusted certificate checking
acceptable protocol checking
Question 19 of 40.
Question 20 of 40.
What is a use case for deploying Palo Alto Networks NGFW in the public cloud?
Question 21 of 40.
Question 22 of 40.
Where does a GlobalProtect client connect to first when trying to connect to the network?
AD agent
5 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
GlobalProtect Portal
User-ID agent
GlobalProtect Gateway
Question 23 of 40.
Which action in a File Blocking Security Profile results in the user being prompted to verify a file transfer?
Block
Alert
Continue
Allow
Question 24 of 40.
implicit applications
application filter This is Incorrect
dependent applications
application group
Question 25 of 40.
Which four actions can be applied to traffic matching a URL Filtering Security Profile? (Choose four.)
Override
Alert
Reset Client
Reset Server
Continue
Block
Question 26 of 40.
Which interface type does NOT require any configuration changes to adjacent network devices?
Layer 3
Tap
Virtual Wire
Layer 2
6 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Question 27 of 40.
Layer 3
HA
Virtual Wire
VLAN
Question 28 of 40.
Question 29 of 40.
The candidate configuration is transferred from memory to the firewall's storage device.
The running configuration is transferred from memory to the firewall's storage device.
A saved configuration is transferred to an external hosts storage device.
A copy of the configuration is uploaded to the cloud as a backup.
Question 30 of 40.
Question 31 of 40.
7 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Which three components can be sent to WildFire for analysis? (Choose three.)
files traversing the firewall
URL links found in email
email attachments
MGT interface traffic
Question 32 of 40.
Which three interface types can control or shape network traffic? (Choose three.)
Virtual Wire
Layer 3
Tap
Layer 2
Question 33 of 40.
Which three MGT port configuration settings are required in order to access the WebUI? (Choose three.)
Default gateway
IP address
Netmask
Hostname
Question 34 of 40.
Which three network modes are supported by active/passive HA? (Choose three.)
Virtual Wire
Layer 3
Tap
Layer 2
Question 35 of 40.
Which three statements are true regarding sessions on the firewall? (Choose three.)
Sessions are always matched to a Security policy rule.
Network packets are always matched to a session.
Return traffic is allowed.
The only session information tracked in the session logs are the five-tuples.
8 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Question 36 of 40.
Which two file types can be sent to WildFire for analysis if a firewall has only a standard subscription service? (Choose
two.)
.pdf
This is Incorrect
.exe
.dll
.jar
Question 37 of 40.
Which two User-ID methods are used to verify known IP address-to-user mappings? (Choose two.)
Captive Portal
Server Monitoring
Session Monitoring
Client Probing
Question 38 of 40.
Which type of content update does NOT have to be scheduled for download on the firewall?
Question 39 of 40.
Which user mapping method is recommended for a highly mobile user base?
Client Probing
Server Monitoring
Session Monitoring
GlobalProtect
Question 40 of 40.
Which User-ID user mapping method is recommended for environments where users frequently change IP addresses?
Captive Portal
9 of 10 12/26/2017, 1:25 PM
Realize Your Potential: paloaltonetworks https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=6...
Server Monitoring
Session Monitoring
Client Probing
10 of 10 12/26/2017, 1:25 PM