Topic 1 : Main Questions pool
If the firewall is configured for credential phishing prevention using the “Domain Credential Filter” method,
which login will be detected as credential theft?
A.
Mapping to the IP address of the logged-in user.
B.
First four letters of the username matching any valid corporate username.
C.
Using the same user’s corporate username and password.
D.
Marching any valid corporate username.
Mapping to the IP address of the logged-in user.
Explanation
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/content-inspection-features/credentialphishing-
prevention
Which is the maximum number of samples that can be submitted to WildFire per day, based on wildfire subscription?
A.
15,000
B.
10,000
C.
75,00
D.
5,000
10,000
Which three firewall states are valid? (Choose three)
A.
Suspended
B.
Passive
C.
Active
D.
Pending
E.
Functional
Suspended
Passive
Active
A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on
TCP port 8080. A Security policy rule allowing access from the Trustzone to the DMZ zone need to be
configured to enable we browsing access to the server.
Which application and service need to be configured to allow only cleartext web-browsing traffic to thins
server on tcp/8080.
A.
application: web-browsing; service:application-default
B.
application: web-browsing; service: service-https
C.
application: ssl; service: any
D.
application: web-browsing; service: (custom with destination TCP port 8080)
application: web-browsing; service:application-default
Which three file types can be forwarded to WildFire for analysis as a part of the basic WildFire service? (Choose three.)
A.
.dll
B.
.exe
C.
.src
D.
.apk
E.
.pdf
F.
.jar
.apk
.pdf
.jar
Page 3 out of 55 Pages |
Previous |