Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which three types of entries can be excluded from an external dynamic list (EDL)? (Choose three.)

A.

IP addresses

B.

Domains

C.

User-ID

D.

URLs

E.

Applications

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

A.

Override

B.

Allow

C.

Block

D.

Continue

Which three types of Source NAT are available to users inside a NGFW? (Choose three.)

A.

Dynamic IP and Port (DIPP)

B.

Static IP

C.

Static Port

D.

Dynamic IP

E.

Static IP and Port (SIPP)

Arrange the correct order that the URL classifications are processed within the system.

Which Security policy set should be used to ensure that a policy is applied first?

A.

Child device-group pre-rulebase

B.

Shared pre-rulebase

C.

Parent device-group pre-rulebase

D.

Local firewall policy

How many zones can an interface be assigned with a Palo Alto Networks firewall?

A.

two

B.

three

C.

four

D.

one

An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs.

What is the correct process to enable this logging1?

A.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OK

B.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session End and click OK

C.

This rule has traffic logging enabled by default no further action is required

D.

Select the interzone-default rule and click Override on the Actions tab select Log at Session End and click OK

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

How are service routes used in PAN-OS?

A.

By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network

B.

To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services

C.

For routing, because they are the shortest path selected by the BGP routing protocol

D.

To route management plane services through data interfaces rather than the management interface

You receive notification about new malware that infects hosts through malicious files transferred by FTP.

Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?

A.

URL Filtering profile applied to inbound Security policy rules.

B.

Data Filtering profile applied to outbound Security policy rules.

C.

Antivirus profile applied to inbound Security policy rules.

D.

Vulnerability Prote

ction profile applied to outbound Security policy rules.