Corregidas Pcnsa Palo Alto
Corregidas Pcnsa Palo Alto
Corregidas Pcnsa Palo Alto
A. Policy Optimizer can display which Security policies have not been used in the last 90 days
B. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have
unused applications
C. Policy Optimizer can add or change a Log Forwarding profile for each Secunty policy selected
D. Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-
ID Security policy for every Layer 4 policy that exists Admins can then manually enable policies
they want to keep and delete ones they want to remove
Answer: B
5.An administrator would like to determine the default deny action for the application dns-
over-https Which action would yield the information?
B. Check the action for the Security policy matching that traffic
Answer: B
NEW QUESTION 9 Which two Palo Alto Networks security management tools provide a
consolidated creation of policies, centralized management and centralized threat
intelligence. (Choose two.)
A. GlobalProtect
B. Panorama
C. Aperture
D. AutoFocus
Answer: BD
NEW QUESTION: An administrator would like to determine the default deny action for the
application dns-over-https Which action would yield the information?
B. Check the action for the Security policy matching that traffic
Answer: B
QUESTION3: A security administrator has configured App-ID updates to be automatically
downloaded and installed. The company is currently using an application identified by
App-ID as SuperApp_base.
On a content update notice, Palo Alto Networks is adding new app signatures labeled
SuperApp_chat and SuperApp_download, which will be deployed in 30 days.
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
ANSWER:
A. All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer
matches the SuperApp-base application
QUESTION 8: Actions can be set for which two items in a URL filtering security profile? (Choose
two.)
ANSWER:
QUESTION 10: Which two statements are correct about App-ID content updates? (Choose
two.)
ANSWER:
A. Updated application content might change how Security policy rules are enforced.
D. After an application content update, new applications are automatically identified and
classified
QUESTION 15: Choose the option that correctly completes this statement. A Security Profile can
block or allow traffic ____________.
ANSWER:
QUESTION 39: Which user mapping method could be used to discover user IDs in an environment
with multiple Windows domain controllers?
ANSWER:
ANSWER:
QUESTION 41: Given the image, which two options are true about the Security policy rules.
(Choose two.)
QUESTION53: An administrator receives a global notification for a new malware that infects
hosts. The infection will result in the infected host attempting to contact and command-and-
control (C2) server.
Which security profile components will detect and prevent this threat after the firewall's signature
database has been updated?
ANSWER:
QUESTION66:
Which path in PAN-OS 9.0 displays the list of port-based security policy rules?
ANSWER:
QUESTION75: Four configuration choices are listed, and each could be used to block access to a
specific URL. If you configured each choice to block the same URL then which choice would be the
last to block access to the URL?
ANSWER:
QUESTION81: Which two statements are true for the DNS Security service introduced in PAN-OS
version 9.0? (Choose two.)
ANSWER:
B. It eliminates the need for dynamic DNS updates.
D. It removes the 100K limit for DNS entries for the downloaded DNS updates
QUESTION82; Which two features can be used to tag a username so that it is included in a
dynamic user group? (Choose two.)
ANSWER:
B. XML API
QUESTION83: The CFO found a malware infected USB drive in the parking lot, which when
inserted infected their corporate laptop. The malware contacted a known command- and-control
server, which caused the infected laptop to begin exfiltrating corporate data.
Which security profile feature could have been used to prevent the communication with the
command-and-control server?
ANSWER:
QUESTION84; You must configure which firewall feature to enable a data-plane interface to
submit DNS queries on behalf of the control plane?
ANSWER:
D. service route
QUESTION85: Which component provides network security for mobile endpoints by inspecting
traffic routed through gateways?
ANSWER:
B. GlobalProtect
QUETION87: Which operations are allowed when working with App-ID application tags?
ANSWER:
QUETION88: Your company occupies one floor in a single building. You have two Active Directory
domain controllers on a single network. The firewall's management plane is only slightly utilized.
Which User-ID agent is sufficient in your network?
ANSWER:
ANSWER:
D. Apps Seen
QUESTION94: Based on the graphic, which statement accurately describes the output shown in
the Server Monitoring panel?
ANSWER:
QUESTION97: Which type of security policy rule will match traffic that flows between the Outside
zone and inside zone, but would not match traffic that flows within the zones?
ANSWR:
C. interzone
QUESTION100: Which type of administrator account cannot be used to authenticate user traffic
flowing through the firewall's data plane?
ANSWER:
D. local user
QUESTION115: You receive notification about new malware that is being used to attack hosts.
The malware exploits a software bug in common application.
Which Security Profile detects and blocks access to this threat after you update the firewall's
threat signature database?
ANSWER:
QUESTION111: Which method allows the employees to access the PowerBall Lottery
website but without unblocking access to the “gambling” URL category?
ANSWER:
QUESTION126: An administrator would like to see the traffic that matches the
interzone-default rule in the traffic logs.
What is the correct process to enable this logging?
ANSWER:
A. Select the interzone-default rule and click Override; on the Actions tab,
select Log at Session End and click OK.
ANSWER:
B. streaming-media
C. known-risk
QUESTION 269
What are three valid ways to map an IP address to a username? (Choose three.)
Answer: ACD
QUESTION 270
Which object would an administrator create to enable access to all applications in the office-
programs subcategory?
A. application filter
B. URL category
C. HIP profile
D. application group
Answer: A
QUESTION 272
QUESTION 274
An administrator is reviewing the Security policy rules shown in the screenshot below. Which
statement is correct about
Answer: B
QUESTION 276
What are two valid selections within an Antivirus profile? (Choose two.)
A. deny
B. drop
C. default
D. block-ip
Answer: BC
QUESTION 277
B. Dynamic IP
C. Static IP
D. Destination
Answer: A
QUESTION 279
B. application prioritization
Answer: C
QUESTION 280
What are three Palo Alto Networks best practices when implementing the DNS Security Service?
(Choose three.)
Answer: ABD
QUESTION 257
Which action would an administrator take to ensure that a service object will be available only to
the selected device
group?
Answer: D