Corregidas Pcnsa Palo Alto
Corregidas Pcnsa Palo Alto
A. Policy Optimizer can display which Security policies have not been used in the last 90 days
B. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have
unused applications
C. Policy Optimizer can add or change a Log Forwarding profile for each Secunty policy selected
D. Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-
ID Security policy for every Layer 4 policy that exists Admins can then manually enable policies
they want to keep and delete ones they want to remove
Answer: B
5.An administrator would like to determine the default deny action for the application dns-
over-https Which action would yield the information?
B. Check the action for the Security policy matching that traffic
Answer: B
NEW QUESTION 9 Which two Palo Alto Networks security management tools provide a
consolidated creation of policies, centralized management and centralized threat
intelligence. (Choose two.)
A. GlobalProtect
B. Panorama
C. Aperture
D. AutoFocus
Answer: BD
NEW QUESTION: An administrator would like to determine the default deny action for the
application dns-over-https Which action would yield the information?
B. Check the action for the Security policy matching that traffic
Answer: B
QUESTION3: A security administrator has configured App-ID updates to be automatically
downloaded and installed. The company is currently using an application identified by
App-ID as SuperApp_base.
On a content update notice, Palo Alto Networks is adding new app signatures labeled
SuperApp_chat and SuperApp_download, which will be deployed in 30 days.
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
ANSWER:
A. All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer
matches the SuperApp-base application
QUESTION 8: Actions can be set for which two items in a URL filtering security profile? (Choose
two.)
ANSWER:
QUESTION 10: Which two statements are correct about App-ID content updates? (Choose
two.)
ANSWER:
A. Updated application content might change how Security policy rules are enforced.
D. After an application content update, new applications are automatically identified and
classified
QUESTION 15: Choose the option that correctly completes this statement. A Security Profile can
block or allow traffic ____________.
ANSWER:
QUESTION 39: Which user mapping method could be used to discover user IDs in an environment
with multiple Windows domain controllers?
ANSWER:
ANSWER:
QUESTION 41: Given the image, which two options are true about the Security policy rules.
(Choose two.)
QUESTION53: An administrator receives a global notification for a new malware that infects
hosts. The infection will result in the infected host attempting to contact and command-and-
control (C2) server.
Which security profile components will detect and prevent this threat after the firewall's signature
database has been updated?
ANSWER:
QUESTION66:
Which path in PAN-OS 9.0 displays the list of port-based security policy rules?
ANSWER:
QUESTION75: Four configuration choices are listed, and each could be used to block access to a
specific URL. If you configured each choice to block the same URL then which choice would be the
last to block access to the URL?
ANSWER:
QUESTION81: Which two statements are true for the DNS Security service introduced in PAN-OS
version 9.0? (Choose two.)
ANSWER:
B. It eliminates the need for dynamic DNS updates.
D. It removes the 100K limit for DNS entries for the downloaded DNS updates
QUESTION82; Which two features can be used to tag a username so that it is included in a
dynamic user group? (Choose two.)
ANSWER:
B. XML API
QUESTION83: The CFO found a malware infected USB drive in the parking lot, which when
inserted infected their corporate laptop. The malware contacted a known command- and-control
server, which caused the infected laptop to begin exfiltrating corporate data.
Which security profile feature could have been used to prevent the communication with the
command-and-control server?
ANSWER:
QUESTION84; You must configure which firewall feature to enable a data-plane interface to
submit DNS queries on behalf of the control plane?
ANSWER:
D. service route
QUESTION85: Which component provides network security for mobile endpoints by inspecting
traffic routed through gateways?
ANSWER:
B. GlobalProtect
QUETION87: Which operations are allowed when working with App-ID application tags?
ANSWER:
QUETION88: Your company occupies one floor in a single building. You have two Active Directory
domain controllers on a single network. The firewall's management plane is only slightly utilized.
Which User-ID agent is sufficient in your network?
ANSWER:
ANSWER:
D. Apps Seen
QUESTION94: Based on the graphic, which statement accurately describes the output shown in
the Server Monitoring panel?
ANSWER:
QUESTION97: Which type of security policy rule will match traffic that flows between the Outside
zone and inside zone, but would not match traffic that flows within the zones?
ANSWR:
C. interzone
QUESTION100: Which type of administrator account cannot be used to authenticate user traffic
flowing through the firewall's data plane?
ANSWER:
D. local user
QUESTION115: You receive notification about new malware that is being used to attack hosts.
The malware exploits a software bug in common application.
Which Security Profile detects and blocks access to this threat after you update the firewall's
threat signature database?
ANSWER:
QUESTION111: Which method allows the employees to access the PowerBall Lottery
website but without unblocking access to the “gambling” URL category?
ANSWER:
QUESTION126: An administrator would like to see the traffic that matches the
interzone-default rule in the traffic logs.
What is the correct process to enable this logging?
ANSWER:
A. Select the interzone-default rule and click Override; on the Actions tab,
select Log at Session End and click OK.
ANSWER:
B. streaming-media
C. known-risk
QUESTION 269
What are three valid ways to map an IP address to a username? (Choose three.)
Answer: ACD
QUESTION 270
Which object would an administrator create to enable access to all applications in the office-
programs subcategory?
A. application filter
B. URL category
C. HIP profile
D. application group
Answer: A
QUESTION 272
QUESTION 274
An administrator is reviewing the Security policy rules shown in the screenshot below. Which
statement is correct about
Answer: B
QUESTION 276
What are two valid selections within an Antivirus profile? (Choose two.)
A. deny
B. drop
C. default
D. block-ip
Answer: BC
QUESTION 277
B. Dynamic IP
C. Static IP
D. Destination
Answer: A
QUESTION 279
B. application prioritization
Answer: C
QUESTION 280
What are three Palo Alto Networks best practices when implementing the DNS Security Service?
(Choose three.)
Answer: ABD
QUESTION 257
Which action would an administrator take to ensure that a service object will be available only to
the selected device
group?
Answer: D