Palo Alto Adult School
Latest uploads at Palo Alto Adult School. Looking for notes at Palo Alto Adult School? We have lots of notes, study guides and study notes available for your school.
-
9
- 0
- 0
All courses for Palo Alto Adult School
Latest notes & summaries Palo Alto Adult School
A Security Policy rule displayed in italic font indicates which condition? The rule is disabled 
A server profile enables a firewall to locate which server type? A server with remote user 
accounts 
An Interface management profile can be attached to which two interface types Loopback and 
Layer 3 
Application block pages can be enabled for which applications web-based 
because a firewall examines every packet in a session, a firewall can detect 
application_____________? shifts 
Finding URLs mat...
Which four models are the Palo Alto Networks next-generation firewall models? (Choose four.) 
a. PA-200 Series 
b. PA-2000 Series 
c. PA-300 Series 
d. PA-3200 Series 
e. PA-400 Series 
f. PA-5000 Series 
g. PA-7000 Series a. PA-200 Series 
d. PA-3200 Series 
f. PA-5000 Series 
g. PA-7000 Series 
Which two planes are found in Palo Alto Networks single-pass platform architecture? (Choose 
two.) 
a. control 
b. single pass 
c. data 
d. parallel processing a. control 
c. data 
(T/F) The strength of...
A client downloads a malicious file from the internet. The Palo Alto firewall has a valid WildFire 
subscription. The Security policy rule shown above matches the client HTTP session: Which three 
actions take place when the firewall's Content-ID engine detects a virus in the file and the decoder 
action is set to "block"? (Choose three.) A threat log entry is generated. 
The file download is terminated. 
The client receives a block page. 
A company has a pair of PA-3050s running PAN-OS 6.0.4...
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? 
(Choose three.) 
A. securing operations response 
B. securing the enterprise 
C. securing third-party application access 
D. securing the cloud 
E. securing the internet of things ABD 
2. What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) 
A. Cortex DynamicDNS 
B. Wildfire 
C. Cortex XDR 
D. OpenConnect 
E. Prisma Access 
F. Autofocus BCEF 
3. Which cloud-deli...
Palo Alto NGFWs enable you to adopt security best practices to minimize opportunities for attack 
by using the following *three* policy types... Application, User, and Content based policies. 
T/F: 
Palo Alto NGFWs allow you to automate workflows via integration with administrative tools such 
as ticketing services, or any system with a RESTful API. True 
What are the *three* families of Palo Alto NGFWs? 1) VM Series 
2) Prisma Access (Cloud Firewall SaaS) 
3) Physical Firewalls 
Name at least *...
Which two actions are available for antivirus security profiles? (Choose two.) 
A. continue 
B. allow 
C. block IP 
D. alert B. allow 
D. alert 
Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) 
A. User‐Agent 
B. Safe Search 
C. URL redirection 
D. X‐Forward‐For A. User‐Agent 
D. X‐Forward‐For 
What are the two components of Denial‐of‐Service Protection? (Choose two.) 
A. zone protection profile 
B. DoS protection profile and policy rules 
C...
Which two actions are available for antivirus security profiles? (Choose two.) 
A. continue 
B. allow 
C. block IP 
D. alert B. allow 
D. alert 
Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) 
A. User‐Agent 
B. Safe Search 
C. URL redirection 
D. X‐Forward‐For A. User‐Agent 
D. X‐Forward‐For 
What are the two components of Denial‐of‐Service Protection? (Choose two.) 
A. zone protection profile 
B. DoS protection profile and policy rules 
C...
Threat Intelligence Cloud Identifies and inspects all traffic to block known threats. 
Next Generation Firewall Gathers, analyzes, correlates, and disseminates threats to and from 
network endpoints 
Advanced Endpoint Detection Inspects processes and files to prevent known and unknown 
exploits 
Which firewall plane provides configuration, logging, and reporting functions on a separate 
processor? 
A. control 
B. network processing 
C. data 
D. security processing A. Control 
A security administ...
The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? 
(Choose three.) 
A. securing operations response 
B. securing the enterprise 
C. securing third-party application access 
D. securing the cloud 
E. securing the internet of things A. securing operations response 
B. securing the enterprise 
D. securing the cloud 
What are four components of the Palo Alto Networks Cybersecurity Portfolio?(Choose four.) 
A. Cortex DynamicDNS 
B. WildFire 
C. Cortex XDR 
...