Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When configuring Security policies on VM-Series firewalls, which set of actions will ensure the most comprehensive Security policy enforcement?

A.

Configure port-based policies, check threat logs weekly, conduct software updates annually, and enable decryption.

B.

Configure policies using User-ID and App-ID, enable decryption, apply appropriate security profiles to rules, and update regularly with dynamic updates.

C.

Configure all default policies provided by the firewall, use Policy Optimizer, and adjust security rules after an incident occurs.

D.

Configure a block policy for all malicious inbound traffic, configure an allow policy for all outbound traffic, and update regularly with dynamic updates.

Which security profile provides real-time protection against threat actors who exploit the misconfigurations of DNS infrastructure and redirect traffic to malicious domains?

A.

Antivirus

B.

URL Filtering

C.

Vulnerability Protection

D.

Anti-spyware

An administrator wants to implement additional Cloud-Delivered Security Services (CDSS) on a data center NGFW that already has one enabled. What benefit does the NGFW’s single-pass parallel processing (SP3) architecture provide?

A.

It allows for traffic inspection at the application level.

B.

There will be no additional performance degradation.

C.

There will be only a minor reduction in performance.

D.

It allows additional security inspection devices to be added inline.

When a firewall acts as an application-level gateway (ALG), what does it require in order to establish a connection?

A.

Dynamic IP and Port (DIPP)

B.

Payload

C.

Session Initiation Protocol (SIP)

D.

Pinholes

Which two configurations are required when creating deployment profiles to migrate a perpetual VM-Series firewall to a flexible VM? (Choose two.)

A.

Choose “Fixed vCPU Models” for configuration type.

B.

Allocate the same number of vCPUs as the perpetual VM.

C.

Allow only the same security services as the perpetual VM.

D.

Deploy virtual Panorama for management.

Which action allows an engineer to collectively update VM-Series firewalls with Strata Cloud Manager (SCM)?

A.

Creating an update grouping rule

B.

Scheduling software update

C.

Creating a device grouping rule

D.

Setting a target OS version

A company has an ongoing initiative to monitor and control IT-sanctioned SaaS applications. To be successful, it will require configuration of decryption policies, along with data filtering and URL Filtering Profiles used in Security policies. Based on the need to decrypt SaaS applications, which two steps are appropriate to ensure success? (Choose two.)

A.

Configure SSL Forward Proxy.

B.

Validate which certificates will be used to establish trust.

C.

Configure SSL Inbound Inspection.

D.

Create new self-signed certificates to use for decryption.

Which two types of logs must be forwarded to Strata Logging Service for IoT Security to function? (Choose two.)

A.

WildFire

B.

Enhanced application

C.

Threat

D.

URL Filtering