What option should be configured when using User Identification?
A. Enable User Identification per Zone
B. Enable User Identification per Security Rule
C. Enable User Identification per interface
D. None of the above
After the installation of a new Application and Threat database, the firewall must be rebooted.
A. True
B. False
Traffic going to a public IP address is being translated by your PANW firewall to your web server's private IP. Which IP should the Security Policy use as the "Destination IP" in order to allow traffic to the server.
A. The server's public IP
B. The firewall's gateway IP
C. The server's private IP
D. The firewall's MGT IP
Which of the following is a routing protocol supported in a Palo Alto Networks firewall?
A. RIPv2
B. ISIS
C. IGRP
D. EIGRP
In PAN-OS8.0, rule numbers were introduced. Rule Numbers are:
A. Dynamic numbers that refer to a security policy's order and are especially useful when filtering security policies by tags
B. Numbers referring to when the security policy was created and do not have a bearing on the order of policy enforcement
C. Static numbers that must be manually re-numbered whenever a new security policy is added
To create a custom signature object for an Application Override Policy, which of the following fields are mandatory?
A. Category
B. Regular Expressions
C. Ports
D. Characteristics
InPAN-OS 8.0which of the available choices serves as an alert warning by defining patterns of suspicious traffic and network anomalies that may indicate a host has been compromised?
A. App-ID Signatures
B. Correlation Objects
C. Command and Control Signatures
D. Correlation Events
E. Custom Signatures
What needs to be done prior to committing a configuration in Panorama after making a change via the CLI or web interface on a device?
A. No additional actions required
B. Synchronize the configuration between the device and Panorama
C. Make the same change again via Panorama
D. Re-import the configuration from the device into Panorama
What option should be configured when using User-ID
A. Enable User-ID per zone
B. Enable User-ID per interface
C. Enable User-ID per Security Policy
D. None of the above
When using Config Audit, the color yellow indicates which of the following?
A. A setting has been changed between the two config files
B. A setting has been deleted from a config file.
C. A setting has been added to a config file
D. An invalid value has been used in a config file.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Palo Alto Networks exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ACE exam preparations and Palo Alto Networks certification application, do not hesitate to visit our Vcedump.com to find your solutions here.