What is an advantage for using application tags Correct Ans - They
help content update and automate policy updates
What two authentication methods on the Palo Alto Networks Firewall
support authorization and authentication for role based access controls
Correct Ans - SAML and TACAS+
Which license must an administrator acquire prior to downloading
Antivirus updates for use with the firewall? Correct Ans - Threat
Prevention
Which action would an administrator take to ensure that a service object
will be available only to the selected device group? Correct Ans -
Ensure that disabled override is cleared
Which dynamic update type includes updated Anti-Spyware signatures?
Correct Ans - Applications and threats
You need to allow users to access the office-suites application of their
choice. How should you configure the firewall to allow access to any office-
suite application? Correct Ans - Create application filter and name
it Office Programs, Then filter it on the office programs subcategory
You recieve notification about a new malware that infects host. An infection
results n the infected host attempting to contact a command-and-control
server.
Which security profile detects and prevents this threat from establishing a
command-and-control connection? Correct Ans - Anti-spyware
Profile applied to outbound security policies
The PowerBall Lottery has reached an unusually high value this week. Your
company has decided to raise morale by allowing employees to access the
PowerBall website for just this week. However, the company doesnt want
employees to access any other gambling websites also listed in the URL-
Filtering Category. Which method allows the employee to access the
, PowerBall website but without unblocking access to "gambling" url
category? Correct Ans - Add *.powerball.com to the URL-Filtering
allow list & create a custom URL Category, add *.powerball.com to it and
allow it in the security profile.
Based on the security policy rules shown, SSH will be allowed on which
port? Correct Ans - The Default Port
You receive notifcation about new malware that is being used to attack
hosts. The malware exploits a software bug in common applications.
Which security profile detects and blocks access to this threat after you
update the firewall threat system database? Correct Ans -
Vulnerability Protection Profile applied to inbound Security Policy rules
An administrator is reviewing another adminstator Security Policy log
settings.
Which log setting configuration is consistent with best practices for normal
traffic? Correct Ans - Log at session start disabled, Log at session
end enabled
Which security profile would you apply to identify infected hosts on the
protected network using DNS Traffic? Correct Ans - Anti-Spyware
Assume a custom URL Category Object of "No-Files" has been created to
identify a specific website?
How can file uploading/downloading be restricted for the website while
permitting general browsing access to that website? Correct Ans -
Create a Security policy that references NO-FILES as a URL Category
Qualifier with an appropriate File Blocking profile
How are Application Filters or Application groups used in firewall policy?
Correct Ans - An Application Filter is a dynamic way to group
applications and can be configured as a nested member of an Application
group
An administrator wishes to follow best practices for logging traffic that
traverse the firewall Correct Ans - Enable log at session end
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studyhall. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.99. You're not tied to anything after your purchase.