Palo Alto Final Exam Questions with Answers All Correct
8 vistas 0 veces vendidas
Grado
Palo Alto
Institución
Palo Alto
Palo Alto Final Exam Questions with Answers All Correct
When creating an application filter, which of the following is true?
Select one:
a. They are called dynamic because they will automatically include new applications from an application signature update if the new application's type is...
Palo Alto Final Exam Questions with
Answers All Correct
When creating an application filter, which of the following is true?
Select one:
a. They are called dynamic because they will automatically include new applications
from an application signature update if the new application's type is included in the filter
b. Excessive bandwidth may be used as a filter match criteria
c. They are called dynamic because they automatically adapt to new IP addresses
d. They are used by malware - Answer-a. They are called dynamic because they will
automatically include new applications from an application signature update if the new
application's type is included in the filter
Select True or False. On the Next Generation firewall, application groups are always
automatically updated when new applications are added to the App-ID database. -
Answer-False
In a Next Generation firewall, how many packet does it take to identify the application in
a TCP exchange?
Select one:
a. Four or five
b. Two
c. Three
d. One - Answer-a. Four or five
What feature on the Next Generation firewall will set the security policy to allow the
application on the standard ports associated with the application?
Select one:
a. Application-implicit
b. Application-custom
c. Application-dependent
d. Application-default - Answer-d. Application-default
,What feature on the Next Generation firewall can be used to identify, in real time, the
applications taking up the most bandwidth?
Select one:
a. Quality of Service Log
b. Applications Report
c. Application Command Center (ACC)
d. Quality of Service Statistics - Answer-c. Application Command Center (ACC)
What are the three pre-defined tabs in the Next Generation firewall Application
Command Center (ACC)?
Choose the 3 correct choices.
If you choose an incorrect choice your question score will be deducted.
Select one or more:
a. Network Traffic
b. Blocked Activity
c. Application Traffic
d. Threat Activity - Answer-a. Network Traffic
b. Blocked Activity
d. Threat Activity
How would App-ID label TCP traffic when the three-way handshake completes, but not
enough data is sent to identify an application?
Select one:
a. insufficient-data
b. not-applicable
c. unknown-tcp
d. incomplete - Answer-a. insufficient-data
A strength of the Palo Alto Networks firewall is:
Select one:
a. hardware consolidation - data and control plane processing is improved and
performed in successive linear fasion
, b. its single-pass parallel processing (SP3) engine and software performs operations
once per packet
c. increased buffering capability. - Answer-b. its single-pass parallel processing (SP3)
engine and software performs operations once per packet
Select True or false. The CN-Series firewalls deliver the same capabilities as the PA-
Series and VM-Series firewalls. - Answer-True
Select True or False. Traffic protection from external locations where the egress point is
the perimeter is commonly referred to as "North-South" traffic. - Answer-True
The first important task of building a Zero Trust Architecture is to identify
__________________.
a. the protect surface
b. interdependencies
c. traffic
d. microperimeter - Answer-a. the protect surface
What is the method used to create a Zero Trust policy that answers the 'who, what,
when, where, why and how' definition?
Select one:
a. Never Trust - Always Verify
b. Full Authentication
c. Kipling
d. Logging - Answer-c. Kipling
Which object cannot be segmented using virtual systems on a firewall?
Select one:
a. Network Security Zone
b. Data Plane Interface
c. MGT interface
d. Administrative Access - Answer-c. MGT interface
Which Palo Alto Networks Cortex technology prevents malware, blocks exploits, and
analyzes suspicious patterns through behavioral threat protection?
Select one:
a. Data Lake
b. AutoFocus
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for 12,94 €. You're not tied to anything after your purchase.