What is the size limitation of files manually uploaded to WildFire
A. Configuarable up to 10 megabytes
B. Hard-coded at 10 megabytes
C. Hard-coded at 2 megabytes
D. Configuarable up to 20 megabytes
When adding an application in a Policy-based Forwarding rule, only a subset of the entire App-ID database is represented. Why would this be?
A. Policy-based forwarding can only indentify certain applications at this stage of the packet flow, as the majority of applications are only identified once the session is created.
B. Policy-based forwarding rules require that a companion Security policy rule, allowing the needed Application traffic, must first be created.
C. The license for the Application ID database is no longer valid.
D. A custom application must first be defined before it can be added to a Policy-based forwarding rule.
Which local interface cannot be assigned to the IKE gateway?
A. Tunnel
B. L3
C. VLAN
D. Loopback
Which routing protocol is supported on the Palo Alto Networks platform?
A. BGP
B. RSTP
C. ISIS
D. RIPv1
A Security policy rule displayed in italic font indicates which condition?
A. The rule has been overridden.
B. The rule is a clone.
C. The rule is disabled.
D. The rule is active.
Finding URLs matched to the not-resolved URL category in the URL Filtering log file might indicate that you should takewhich action?
A. Reboot the firewall.
B. Validate connectivity to the PAN-DB cloud.
C. Re-download the URL seed database.
D. Validate your Security policy rules.
An Antivirus Security Profile specifies Actions and WildFire Actions. Wildfire Actions enable you to configure the firewall toperform which operation?
A. Block traffic when a WildFire virus signature is detected.
B. Download new antivirus signatures from WildFire.
C. Upload traffic to WildFire when a virus is suspected.
D. Delete packet data when a virus is suspected.
When using remote authentication for users (LDAP, RADIUS, Active Directory, etc.), what must be done to allow a user to authenticate through multiple methods?
A. Create an Authentication Sequence, dictating the order of authentication profiles.
B. Create multiple authentication profiles for the same user.
C. This cannot be done. A single user can only use one authentication type.
D. This cannot be done. Although multiple authentication methods exist, a firewall must choose a single, global authentication type and all users must use this method.
In a Palo Alto Networks firewall, every interface in use must be assigned to a zone in order to process traffic.
A. True
B. False
With IKE, each device is identified to the other by a Peer ID. In most cases, this is just the public IP address of the device. In situations where the public ID is not static, this value can be replaced with a domain name or other text value
A. True
B. False