Академический Документы
Профессиональный Документы
Культура Документы
0
Version
ACE 8.0
Question 1 of 40.
An Interface Management Profile can be attached to which two interface types? (Choose two.)
Layer 3
Layer 2
Virtual Wire
Tap
Loopback
Question 2 of 40.
App-ID running on a firewall identifies applications using which three methods? (Choose three.)
WildFire lookups
Program heuristics
Application signatures
PAN-DB lookups
Question 3 of 40.
web-based
non-TCP/IP
MGT port-based
any
Mark for follow up
Question 4 of 40.
Because a firewall examines every packet in a session, a firewall can detect application ________?
errors
filters
groups
shifts
Question 5 of 40.
Finding URLs matched to the not-resolved URL category in the URL Filtering log file might indicate that you
should take which action?
Question 6 of 40.
For which firewall feature should you create forward trust and forward untrust certificates?
SSH decryption
Question 7 of 40.
If a DNS sinkhole is configured, any sinkhole actions indicating a potentially infected host are recorded in
which log type?
Threat
Data Filtering
WildFire Submissions
Traffic
Question 8 of 40.
In a destination NAT configuration, which option accurately completes the following sentence? A Security
policy rule should be written to match the _______.
post-NAT source and destination addresses, and the post-NAT destination zone
original pre-NAT source and destination addresses, and the pre-NAT destination zone
original pre-NAT source and destination addresses, but the post-NAT destination zone
post-NAT source and destination addresses, but the pre-NAT destination zone
Question 9 of 40.
In a Security Profile, which action does a firewall take when the profiles action is configured as Reset
Server? (Choose two.)
The traffic responder is reset.
Question 10 of 40.
In an HA configuration, which three components are synchronized between the pair of firewalls? (Choose
three.)
logs
policies
networks
objects
Question 11 of 40.
In an HA configuration, which three functions are associated with the HA1 Control Link? (Choose three.)
exchanging hellos
synchronizing sessions
synchronizing configuration
exchanging heartbeats
Question 12 of 40.
In an HA configuration, which two failure detection methods rely on ICMP ping? (Choose two.)
hellos
link groups
path groups
heartbeats
Question 13 of 40.
On a firewall that has 32 Ethernet ports and is configured with a dynamic IP and port (DIPP) NAT
oversubscription rate of 2x, what is the maximum number of concurrent sessions supported by each
available IP address?
32
64K
128K
64
Which two user mapping methods are supported by the User-ID integrated agent? (Choose two.)
LDAP Filters
WMI probing
NetBIOS Probing
Client Probing
Question 15 of 40.
SSL Inbound Inspection requires that the firewall be configured with which two components? (Choose two.)
client's digital certificate
Question 16 of 40.
The Threat log records events from which three Security Profiles? (Choose three.)
WildFire Analysis
File Blocking
Vulnerability Protection
Antivirus
Anti-Spyware
URL Filtering
Question 17 of 40.
The WildFire Portal website supports which three operations? (Choose three.)
request firewall WildFire licenses
view WildFire verdicts
Question 18 of 40.
What are three connection methods for the GlobalProtect agent? (Choose three.)
User-Logon
Pre-Logon
On-demand
Captcha portal
Question 19 of 40.
What are two benefits of attaching a Decryption Profile to a Decryption policy no-decrypt rule? (Choose two.)
acceptable protocol checking
Question 20 of 40.
Question 22 of 40.
When SSL traffic passes through the firewall, which component is evaluated first?
Decryption policy
Decryption Profile
Security policy
Question 23 of 40.
Where does a GlobalProtect client connect to first when trying to connect to the network?
AD agent
GlobalProtect Gateway
GlobalProtect Portal
User-ID agent
Question 24 of 40.
Which action in a File Blocking Security Profile results in the user being prompted to verify a file transfer?
Block
Allow
Alert
Continue
Question 25 of 40.
Which condition must exist before a firewall's in-band interface can process traffic?
Question 26 of 40.
Which four actions can be applied to traffic matching a URL Filtering Security Profile? (Choose four.)
Reset Server
Continue
Reset Client
Alert
Override
Block
Question 27 of 40.
Which interface type does NOT require any configuration changes to adjacent network devices?
Virtual Wire
Tap
Layer 3
Layer 2
Mark for follow up
Question 28 of 40.
Virtual Wire
HA
Layer 3
VLAN
Question 29 of 40.
Question 30 of 40.
The candidate configuration is transferred from memory to the firewall's storage device.
Question 31 of 40.
Which statement is true about a URL Filtering Profile continue password?
Question 32 of 40.
Which three components can be sent to WildFire for analysis? (Choose three.)
URL links found in email
email attachments
Question 33 of 40.
Which three MGT port configuration settings are required in order to access the WebUI? (Choose three.)
IP address
Default gateway
Hostname
Netmask
Question 34 of 40.
Which three network modes are supported by active/passive HA? (Choose three.)
Layer 3
Virtual Wire
Layer 2
Tap
Mark for follow up
Question 35 of 40.
Which three statements are true regarding sessions on the firewall? (Choose three.)
Network packets are always matched to a session.
The only session information tracked in the session logs are the five-tuples.
Question 36 of 40.
Which two file types can be sent to WildFire for analysis if a firewall has only a standard subscription
service? (Choose two.)
.exe
.dll
.jar
Question 37 of 40.
Which two User-ID methods are used to verify known IP address-to-user mappings? (Choose two.)
Server Monitoring
Session Monitoring
Captive Portal
Client Probing
Question 38 of 40.
Which type of content update does NOT have to be scheduled for download on the firewall?
PAN-DB updates
Question 39 of 40.
Which user mapping method is recommended for a highly mobile user base?
Client Probing
Server Monitoring
GlobalProtect
Session Monitoring
Question 40 of 40.
Which User-ID user mapping method is recommended for environments where users frequently change IP
addresses?
Captive Portal
Server Monitoring
Client Probing
Session Monitoring