Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which action results in the firewall blocking network traffic without notifying the sender?

A.

Deny

B.

No notification

C.

Drop

D.

Reset Client

You must configure which firewall feature to enable a data-plane interface to submit DNS queries on behalf of the control plane?

A.

Admin Role profile

B.

virtual router

C.

DNS proxy

D.

service route

What are three configurable interface types for a data-plane ethernet interface? (Choose three.)

A.

Layer 3

B.

HSCI

C.

VWire

D.

Layer 2

E.

Management

Which two addresses should be reserved to enable DNS sinkholing? (Choose two.)

A.

IPv6

B.

Email

C.

IPv4

D.

MAC

An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save the changes, but the OK button is grayed out.

What are two possible reasons the OK button is grayed out? (Choose two.)

A.

The entry contains wildcards.

B.

The entry is duplicated.

C.

The entry doesn't match a list entry.

D.

The entry matches a list entry.

In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)

A.

Objects tab > Application Filters

B.

Policies tab > Security

C.

ACC tab > Global Filters

D.

Objects tab > Application Groups

E.

Objects tab > Applications

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?

A.

It defines the SSUTLS encryption strength used to protect the management interface.

B.

It defines the CA certificate used to verify the client's browser.

C.

It defines the certificate to send to the client's browser from the management interface.

D.

It defines the firewall's global SSL/TLS timeout values.

Based on the screenshot what is the purpose of the group in User labelled ''it"?

A.

Allows users to access IT applications on all ports

B.

Allows users in group "DMZ" lo access IT applications

C.

Allows "any" users to access servers in the DMZ zone

D.

Allows users in group "it" to access IT applications

Which solution is a viable option to capture user identification when Active Directory is not in use?

A.

Cloud Identity Engine

B.

group mapping

C.

Directory Sync Service

D.

Authentication Portal

Which action can be performed when grouping rules by group tags?

A.

Delete Tagged Rule(s)

B.

Edit Selected Rule(s)

C.

Apply Tag to the Selected Rule(s)

D.

Tag Selected Rule(s)