You are on page 1of 3

1In an Anti-virus profile, setting the action to "Block" for IMAP and POP3 decoders will result in which of

the following actions?


All e-mail sent using IMAP or POP3 will be dropped, even if not infected by virus.
The FW will send an HTTP 404 err msg

2Which of the following services are enabled on the MGT interface by default? (Select all correct
answers.)
Telnet & HTTP

3-

Taking into account only the information in the screenshot above, answer the following question: A span
port or a switch is connected to e1/4, but there are no traffic logs. Which of the following conditions most
likely explains this behavior?
Interface not assigned IP add
No virtual router

4What is the default setting for 'Action' in a Decryption Policy's rule?


None
Decrypt
5A user complains that she is no longer able to access a needed work application after the administrator
implemented vulnerability and anti-spyware profiles. How best can the administrator resolve this issue so
the user will once again have access to the needed application?
In the Vul & AS prof create an App exemption for groups app
6In PAN-OS, the WildFire Subscription Service allows updates for malware signatures to be distributed as
often as

Once a day

11When using remote authentication for users (LDAP, RADIUS, Active Directory, etc.), what must be done to
allow a user to authenticate through multiple methods?
Create Multiple Auth Prof for same user
12Users may be authenticated sequentially to multiple authentication servers by configuring:
An Auth profile
13-

Considering the information in the screenshot above, what is the order of evaluation for this URL Filtering
Profile?
Block list, Allow list, URL cat, Custom cat

14As a Palo Alto Networks firewall administrator, you have made unwanted changes to the Candidate
configuration. These changes may be undone by Device > Setup > Operations > Configuration
Management>....and then what operation?
Revert to last saved config
Last revision

15-

The screenshot above shows part of a firewalls configuration. If ping traffic can traverse this device from
e1/2 to e1/1, which of the following statements must be True about this firewalls configuration? (Select all
correct answers.)
ALL
All but Sec Pol from Int zone to Trust zone that allows PING
16What are the benefits gained when the "Enable Passive DNS Monitoring" checkbox is chosen on the firewall?
(Select all correct answers.)
ALL
17Which of the following can provide information to a Palo Alto Networks firewall for the purposes of User-ID?
(Select all correct answers.)
DC, NAC device, SSL cert

You might also like