Which local interface cannot be assigned to the IKE gateway?
A.
Tunnel
B.
L3
C.
VLAN
D.
Loopback
Tunnel
As of PAN-OS 7.0, when configuring a Decryption Policy Rule, which of the following is
NOT an available option as matching criteria in the rule?
A.
Application
B.
Source User
C.
URL Category
D.
Source Zone
E.
Service
Application
When troubleshooting Phase 1 of an IPSec VPN tunnel, what location will have the most
informative logs?
A.
Responding side, Traffic Logs
B.
Initiating side, Traffic Logs
C.
Responding side, System Logs
D.
Initiating side, System Logs
Responding side, System Logs
Which of the following is NOT a valid option for built-in CLI access roles?
A.
read/write
B.
superusers
C.
vsysadmin
D.
deviceadmin
read/write
Which of the following types of protection are available in DoS policy?
A.
Session Limit, SYN Flood, UDP Flood
B.
Session Limit, Port Scanning, Host Swapping, UDP Flood
C.
Session Limit, SYN Flood, Host Swapping, UDP Flood
D.
Session Limit, SYN Flood, Port Scanning, Host Swapping
Session Limit, SYN Flood, UDP Flood
Page 4 out of 25 Pages |
Previous |