FOR THE WIN!
What is an "application shift?"
A) an application change during the lifetime of a session
B) a session change during the lifetime of an application
C) a packet change during the lifetime of a session
D) application dependency
An application change during the lifetime of a session
What is the default metric value of static routes?
A) 1
B) 2
C) 10
D) 20
10
How often are new antivirus signatures published?
A) Hourly
B) Weekly
C) Daily
D) Monthly
daily
Which interface type can be used to switch traffic between multiple interfaces inside the same VLAN?
A) Tap interfaces
B) Layer 2 interfaces
C) Layer 3 interfaces
D) other subnets
Layer 2 interfaces
Which type of firewall configuration contains in-progress configuration changes?
A) running
B) candidate
C) named
D) saved
candidate
, Given the topology shown in the graphic, which interface type should you configure for zone A and
zone B?
A) Layer3
B) Layer2
C) Virtual Wire
D) Ethernet
Layer 3 (has IP address)
What does the Save Named Configuration Snapshot option do?
A) creates a tentative configuration snapshot that does not overwrite the default snapshot
(.snapshot.xml)
B) creates a candidate configuration snapshot that does not overwrite the default snapshot
(.snapshot.xml)
C) deletes a candidate configuration snapshot that does not overwrite the default snapshot
(.snapshot.xml)
D) creates a candidate configuration snapshot that does not overwrite the default snapshot
(.saved.xml)
creates a candidate configuration snapshot that does not overwrite the default snapshot (.snapshot.xml)
Which statement is true about the App-ID database?
A) App-ID always requires an explicit Security policy rule for parent applications.
B) Some App-IDs implicitly allow required application without the need to explicitly add the parent to
the Security policy.
C) Every application has a parent application.
D) If an App-ID has a web-browsing dependency, you will not need to add web-browsing to other
Security polices to use web-browsing
Some App-IDs implicitly allow required applications without the need to explicitly add the parent to the
Security policy.
An internal host needs to connect through the firewall using source NAT to servers on the internet.
Which policy is required to enable source NAT on the firewall?
A) NAT policy with internal zone and internet zone specified
B) NAT policy with no internal or internet zone selected
C) pre-NAT policy with external source and any destination address
D) post-NAT policy with external source and any destination address
NAT policy with internal zone and internet zone specified
Which two agents can be used to monitor servers and gather User-ID information? (Choose two.)
A) Built-in agent inside the PAN-OS® firewall