Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What Policy Optimizer policy view differ from the Security policy do?

A.

It shows rules that are missing Security profile configurations.

B.

It indicates rules with App-ID that are not configured as port-based.

C.

It shows rules with the same Source Zones and Destination Zones.

D.

It indicates that a broader rule matching the criteria is configured above a more specific rule.

What does an application filter help you to do?

A.

It dynamically provides application statistics based on network, threat, and blocked activity,

B.

It dynamically filters applications based on critical, high, medium, low. or informational severity.

C.

It dynamically groups applications based on application attributes such as category and subcategory.

D.

It dynamically shapes defined application traffic based on active sessions and bandwidth usage.

How is the hit count reset on a rule?

A.

select a security policy rule, right click Hit Count > Reset

B.

with a dataplane reboot

C.

Device > Setup > Logging and Reporting Settings > Reset Hit Count

D.

in the CLI, type command reset hitcount

An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny. What deny action will the firewall perform?

A.

Drop the traffic silently

B.

Perform the default deny action as defined in the App-ID database for the application

C.

Send a TCP reset packet to the client- and server-side devices

D.

Discard the session's packets and send a TCP reset packet to let the client know the session has been terminated

Which two settings allow you to restrict access to the management interface? (Choose two )

A.

enabling the Content-ID filter

B.

administrative management services

C.

restricting HTTP and telnet using App-ID

D.

permitted IP addresses

An administrator would like to silently drop traffic from the internet to a ftp server.

Which Security policy action should the administrator select?

A.

Reset-server

B.

Block

C.

Deny

D.

Drop

Which feature enables an administrator to review the Security policy rule base for unused rules?

A.

Security policy tags

B.

Test Policy Match

C.

View Rulebase as Groups

D.

Policy Optimizer

An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?

A.

branch office traffic

B.

north-south traffic

C.

perimeter traffic

D.

east-west traffic

What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)

A.

Service

B.

User

C.

Application

D.

Address

E.

Zone ab

Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?

A.

NAT Target Tab

B.

NAT Active/Active HA Binding Tab

C.

NAT Translated Packet Tab

D.

NAT Policies General Tab