Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How would a Security policy need to be written to allow outbound traffic using Secure Shell (SSH) to destination ports tcp/22 and tcp/4422?

A.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin then creates a Security policy allowing application "ssh" and service "tcp-4422".

B.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service "application-default".

C.

The admin creates a Security policy allowing application "ssh" and service "application-default".

D.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin also creates a custom service object named "tcp-22" with port tcp/22.

The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service "tcp-22".

What is a recommended consideration when deploying content updates to the firewall from Panorama?

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

The NetSec Manager asked to create a new firewall Local Administrator profile with customized privileges named NewAdmin. This new administrator has to authenticate without inserting any username or password to access the WebUI.

What steps should the administrator follow to create the New_Admin Administrator profile?

A.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Role Based.

3. Issue to the Client a Certificate with Common Name = NewAdmin

B.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Certificate Name = NewAdmin

C.

1. Set the Authentication profile to Local.

2. Select the "Use only client certificate authentication" check box.

3. Set Role to Role Based.

D.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Common Name = New Admin

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

A.

antivirus profile applied to outbound security policies

B.

data filtering profile applied to inbound security policies

C.

data filtering profile applied to outbound security policies

D.

vulnerability profile applied to inbound security policies

Which three configuration settings are required on a Palo Alto networks firewall management interface?

A.

default gateway

B.

netmask

C.

IP address

D.

hostname

E.

auto-negotiation

An administrator needs to add capability to perform real-time signature lookups to block or sinkhole all known malware domains.

Which type of single unified engine will get this result?

A.

User-ID

B.

App-ID

C.

Security Processing Engine

D.

Content-ID

What is an advantage for using application tags?

A.

They are helpful during the creation of new zones

B.

They help with the design of IP address allocations in DHCP.

C.

They help content updates automate policy updates

D.

They help with the creation of interfaces

During the packet flow process, which two processes are performed in application identification? (Choose two.)

A.

pattern based application identification

B.

application override policy match

C.

session application identified

D.

application changed from content inspection

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

A.

Antivirus Profile

B.

Data Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

A.

global

B.

intrazone

C.

interzone

D.

universal