77范文网 - 专业文章范例文档资料分享平台

PaloAlto ACE认证考试题库及答案(3)

来源:网络收集 时间:2020-06-07 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

Enable SSL decryption, block SSH traffic

Enable SSL decryption, block SSH tunnel traffic

Enable SSH decryption, block SSH traffic

Mark for follow up

Question 25 of 72.

When setting up GlobalProtect, what is the job of the GlobalProtect Portal? Select the best answer

答案: C

To load balance GlobalProtect client connections to GlobalProtect Gateways

To maintain the list of GlobalProtect Gateways and list of categories for checking the client machine To apply Global Server Load Balancing to Global Protect clients to other GlobalProtect Portals or

Gateways.

To maintain the list of remote GlobalProtect Portals and list of categories for checking the client machine

Mark for follow up

Question 26 of 72.

The maximum number of interfaces that can be configured in a single Virtual Wire object is:

答案:B

1

2

4

8

16

Mark for follow up

Question 27 of 72.

The \

答案:D

can only be configured in Tap Mode

does not perform higher-level inspection of traffic from the side that originated the TCP SYN packet

does not perform higher-level inspection of traffic from the side that originated the TCP SYN packet

performs higher-level inspection of traffic from the side that originated the TCP SYN packet

None of the above

Mark for follow up

Question 28 of 72.

The \

答案: B

Increased speed on the downloads of the allowed file types.

Protection against unwanted downloads, by alerting the user with a response page indicating that a file is going to be downloaded.

an administrator the ability to leverage Authentication Profiles in order to protect against unwanted downloads.

Password-protected access to specific file downloads, for authorized users.

Mark for follow up

Question 29 of 72.

To allow the PAN device to resolve internal and external DNS host names for reporting and for security policy, an administrator can do the following:

答案:B

In the device settings set the Primary DNS server to an external server and the secondary to an internal server.

Create a DNS Proxy Object with a default DNS Server for external resolution and a DNS server for internal domain. Then, in the device settings, point to this proxy object for DNS resolution.

Create a DNS Proxy Object with a default DNS Server for external resolution and a DNS server for internal

domain. Then, in the device settings, select the proxy object as the Primary DNS and create a custom security rule which references that object.

In the device settings define internal hosts via a static list.

None of the above

Mark for follow up

Question 30 of 72.

What happens at the point of Threat Prevention license expiration?

答案:A

Threat Prevention no longer updated; existing database still effective

Threat Prevention no longer used; traffic is allowed or blocked by configuration per Security Rule

Threat Prevention no longer used; applicable traffic is blocked

Threat Prevention is no longer used; applicable traffic is allowed

Mark for follow up

Question 31 of 72.

Where can you enable the “Dynamic URL Filtering” option?

答案:D

In the zone configuration that includes the interface for the URL filtered traffic

In the Zone Protection Profile settings

Under Device / Licenses / URL Filtering

In the URL Filtering security profile object

None of the above

Mark for follow up

Question 32 of 72.

Which of the following types of protection are available in DoS policy?

答案:A

Session Limit, SYN Flood, UDP Flood

Session Limit, SYN Flood, Host Swapping, UDP Flood

Session Limit, SYN Flood, Port Scanning, Host Swapping

Session Limit, Port Scanning, Host Swapping, UDP Flood

Mark for follow up

Question 33 of 72.

A customer would like to identify any TCP port scans or UDP ports scans traversing their network links. Where can this type of security policy be configured?

答案:A

Network / Network Profiles / Zone Protection

Policies / Profile / Zone Protection

Objects / Zone Protection

Interfaces / Interface number / Zone Protection

Mark for follow up

Question 34 of 72.

To reduce the amount of URL logs generated you can configure:

答案:A

A URL Filtering Profile with \

A URL Filtering Profile with \

A URL Filtering Profile with the block list set to \

The following CLI command: \

Mark for follow up

Question 35 of 72.

When configuring Security rules based on FQDN objects, which of the following statements are true?

答案: A

The firewall resolves the FQDN first when the policy is committed, and is refreshed at TTL expiration. There is no limit on the number of IP addresses stored for each resolved FQDN.

In order to create FQDN-based objects, you need to manually define a list of associated IP. Up to 10 IP addresses can be configured for each FQDN entry.

The firewall resolves the FQDN first when the policy is committed, and is refreshed each time Security rules are evaluated.

The firewall resolves the FQDN first when the policy is committed, and is refreshed at TTL expiration. The resolution of this FQDN stores up to 10 different IP addresses.

Mark for follow up

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库PaloAlto ACE认证考试题库及答案(3)在线全文阅读。

PaloAlto ACE认证考试题库及答案(3).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/1097187.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: