Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two statements are correct about App-ID content updates? (Choose two.)

A.

Updated application content may change how security policy rules are enforced

B.

After an application content update, new applications must be manually classified prior to use

C.

Existing security policy rules are not affected by application content updates

D.

After an application content update, new applications are automatically identified and classified

Which objects would be useful for combining several services that are often defined together?

A.

shared service objects

B.

service groups

C.

application groups

D.

application filters

An administrator wants to enable access to www.paloaltonetworks.com while denying access to all other sites in the same category.

Which object should the administrator create to use as a match condition for the security policy rule that allows access to www.paloaltonetworks.com?

A.

Application group

B.

Address ab

C.

URL category

D.

Service

An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"

Which security policy action causes this?

A.

Drop

B.

Drop, send ICMP Unreachable

C.

Reset both

D.

Reset server

An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range.

Which steps should the administrator take?

A.

Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.

B.

Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.

C.

Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.

D.

Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.

Where does a user assign a tag group to a policy rule in the policy creation window?

A.

Application tab

B.

General tab

C.

Actions tab

D.

Usage tab

Which three filter columns are available when setting up an Application Filter? (Choose three.)

A.

Parent App

B.

Category

C.

Risk

D.

Standard Ports

E.

Subcategory

How frequently can wildfire updates be made available to firewalls?

A.

every 15 minutes

B.

every 30 minutes

C.

every 60 minutes

D.

every 5 minutes

In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns sessions?

A.

Destination IP Hash b

B.

Concurrent Sessions

C.

Max Sessions

D.

IP Modulo

Which component is a building block in a Security policy rule?

A.

decryption profile

B.

destination interface

C.

timeout (min)

D.

application