Domain 3 - Policy Evaluation and Management Flashcards
What will be the result of one or more occurrences of shadowing?
a. A failed commit
b. An invalid configuration
c. A warning
d. An alarm window
c. A warning
Which column in the Applications and Threats screen includes the options Review Apps and Policies?
a. Features
b. Type
c. Version
d. Action
d. Action
Which link can you select in the web interface to minimize the risk of installing new App-Id updates?
a. Enable new apps in content update.
b. Disable new apps in App-ID database.
c. Disable new apps in content update.
d. Enable new apps in App-ID database.
c. Disable new apps in content update.
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose two)
a. Web-browsing
b. Chat
c. Gaming
d. SSL
a. Web-browsing
d. SSL
What are the two default (predefined) Security policy rule type sin PAN-OS software? (Choose two)
a. Universal
b. Interzone
c. Intrazone
d. Extrazone
b. Interzone
c. Intrazone
Which type of Security policy rules most often exist above the two predefined security policies?
a. Intrazone
b. Interzone
c. Universal
d. Global
c. Universal
What does the TCP Half Closed setting mean?
a. Maximum length of time that a session remains in the session table between reception of the first FIN and reception of the third FIN or RST.
b. Minimum length of time that a session remains in the session table between reception of the first FIN and reception of the third FIN or RST.
c. Maximum length of time that a session remains in the session table between reception of the first FIN and reception of the second FIN or RST.
d. Minimum length of time that a session remains in the session table between reception of the first FIN and reception of the second FIN or RST.
c. Maximum length of time that a session remains in the session table between reception of the first FIN and reception of the second FIN or RST.
What are two application characteristics? (Choose two)
a. Stateful
b. Excessive bandwidth use.
c. Intensive
d. Evasive
b. Excessive bandwidth use.
d. Evasive
Which two HTTP Header Logging options are within a URL Filtering profile? (Choose two)
a. User-Agent
b. Safe Search
c. URL redirection
d. X-Forwarded-For
a. User-Agent
d. X-Forwarded-For
What are two source NAT types? (Choose two)
a. Universal
b. Static
c. Dynamic
e. Extrazone
b. Static
c. Dynamic
Which phrase is a simple way to remember how to configure Security policy rules where NAT was implemented?
a. Post-NAT IP, pre-NAT zone
b. Post-NAT IP, post-NAT zone
c. Pre-NAT IP, post-NAT zone
d. Pre-NAT IP, pre-NAT zone
c. Pre-NAT IP, post-NAT zone
What are two types of destination NAT? (Choose two)
a. Dynamic IP (with session distribution)
b. DIPP
c. Global
d. Static IP
a. Dynamic IP (with session distribution)
d. Static IP
The Policy Optimizer does not analyze which statistics?
a. Applications allowed through port-based Security policy rules
b. The usage of existing App-IDs in Security policy rules
c. Which users matched Security policies
d. Existing Security policy rule App-IDs that have not matched processed traffic
e. Days since the latest new application discovery in a port-based Security policy rule.
c. Which users matched Security policies