Default Antivirus Profile protocols - -smtp
-smb
-ftp
-imap
-pop3
-http/2
Antivirus profile actions - -allow
-allert (Default)
-drop
-reset client
-reset server
-reset both
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will
find i...
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will
find in Rule Usage tab? - ✔✔-Basics
-Applications
-Activity
-Traffic
A Virtual Wire object is capable of blocking or allowing traffic based on? - ✔✔802.1Q VLAN tag values
When new applications are added to the App-ID database, application groups are always automatically
updated ? - ✔✔No!
, After updating an application group, you need to issue a firewall commit.
Application groups allow you to create a logical group of applications that can be added to the policy
rules of Security and QoS.
When you want to treat a set of applications similarly in a policy, an application group is used.
Ultimately, application groups simplify the administration of the rule bases.
Instead of applying multiple rules to the same list of applications, you can create an application group
and apply multiple rules to that group.
In a TCP exchange how many packets does it take to identify the application? - ✔✔Four or five
What are the methods of managing the Palo Alto firewall ? - ✔✔-Web interface
-Panorama
-SSH/Console CLI
-Rest XML API
The first classification of network traffic is based on its IP and port address.
The Security Policy is consulted by the firewall to decide whether to allow or block traffic based on the IP
address and port.
What is application set to during this initial Security Policy check? - ✔✔ANY .
The application is set to "any" during this initial Security Policy check.
If traffic is allowed, a session is generated and the App-ID then looks for a signature for the application.
Which are all the security profiles ? - ✔✔▪ Antivirus: Detects infected files being transferred with the
application
▪ Anti-Spyware: Detect downloads of spyware and traffic from spyware already installed
▪ Vulnerability Protection: Detects attempts at exploiting known vulnerabilities in applications
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jessyqueen. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.60. You're not tied to anything after your purchase.