Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.

Which two types of traffic will the rule apply to? (Choose two)

A.

traffic between zone IT and zone Finance

B.

traffic between zone Finance and zone HR

C.

traffic within zone IT

D.

traffic within zone HR

Which Security policy action will message a user's browser that their web session has been terminated?

A.

Drop

B.

Deny

C.

Reset client

D.

Reset server

Where within the firewall GUI can all existing tags be viewed?

A.

Network > Tags

B.

Monitor > Tags

C.

Objects > Tags

D.

Policies > Tags

What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?

A.

Increase the backup capacity for configuration backups per firewall

B.

Increase the per-firewall capacity for address and service objects

C.

Reduce the configuration and session synchronization time between HA pairs

D.

Reduce the number of objects pushed to a firewall

During the App-ID update process, what should you click on to confirm whether an existing policy rule is affected by an App-ID update?

A.

check now

B.

review policies

C.

test policy match

D.

download

An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240 addresses and found that connections from addresses that needed new translations were being dropped.

Which type of NAT was configured?

A.

Static IP

B.

Dynamic IP

C.

Destination NAT

D.

Dynamic IP and Port

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications

Which policy achieves the desired results?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?

A.

Management

B.

High Availability

C.

Aggregate

D.

Aggregation

Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?

A.

global

B.

intrazone

C.

interzone

D.

universal

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

A.

It uses techniques such as DGA.DNS tunneling detection and machine learning.

B.

It requires a valid Threat Prevention license.

C.

It enables users to access real-time protections using advanced predictive analytics.

D.

It requires a valid URL Filtering license.

E.

It requires an active subscription to a third-party DNS Security service.