PCNSE試験無料問題集「Palo Alto Networks Certified Network Security Engineer 認定」
A company configures its WildFire analysis profile to forward any file type to the WildFire public cloud. A company employee receives an email containing an unknown link that downloads a malicious Portable Executable (PE) file.
What does Advanced WildFire do when the link is clicked?
What does Advanced WildFire do when the link is clicked?
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A network security engineer needs to ensure that virtual systems can communicate with one another within a Palo Alto Networks firewall. Separate virtual routers (VRs) are created for each virtual system.
In addition to confirming security policies, which three configuration details should the engineer focus on to ensure communication between virtual systems? (Choose three.)
In addition to confirming security policies, which three configuration details should the engineer focus on to ensure communication between virtual systems? (Choose three.)
正解:A,C,D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
An engineer is configuring a Protection profile to defend specific endpoints and resources against malicious activity.
The profile is configured to provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet.
Which profile is the engineer configuring?
The profile is configured to provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet.
Which profile is the engineer configuring?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
An administrator needs to validate that policies that will be deployed will match the appropriate rules in the device-group hierarchy. Which tool can the administrator use to review the policy creation logic and verify that unwanted traffic is not allowed?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A firewall engineer creates a new App-ID report under Monitor > Reports > Application Reports > New Applications to monitor new applications on the network and better assess any Security policy updates the engineer might want to make.
How does the firewall identify the New App-ID characteristic?
How does the firewall identify the New App-ID characteristic?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Users have reported an issue when they are trying to access a server on your network. The requests aren't taking the expected route. You discover that there are two different static routes on the firewall for the server.
What is used to determine which route has priority?
What is used to determine which route has priority?
正解:D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)