問題一覧
1
Only one processor is needed to complete all the functions within the box
2
Vulnerability Protection Profile
3
Stream-based Signature Engine
4
The Automated Correlation Engine
5
HTTPS , HTTP
6
Enterprise CA-signed certificates , Self-Signed certificates
7
Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once , Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcement
8
The push operation will fail regardless of an error or not within the configuration itself
9
identify and provide recommendations for device management access
10
Create a custom spyware signature matching the known signature with the time attribute
11
Policy match is based on application , Identification of application is possible on any port
12
Network segments in the Datacenter need to be advertised to only one Service Connection , The customer edge device needs to support policy-based routing with symmetric return functionality
13
use of device management access and settings , measure the adoption of URL filters, App-ID, User-ID, use of decryption policies
14
Dynamic User Groups
15
Group Mapping , Domain Credential Filter, IP User Mapping
16
7-Zip , Flash , ISO
17
Threat Prevention Profile
18
HA2
19
SP3 (Single Pass Parallel Processing)
20
Tags
21
multi-factor authentication , URL Filtering Profiles , SSL decryption rules
22
File Blocking Profile
23
enable User-ID, define an SSL decryption rulebase, define URL Filtering Profile
24
Default policies block all interzone traffic. Palo Alto Networks empowers you to control applications by default ports or a configurable list of approved ports on a per-policy basis
25
Reset , Drop , Allow , Alert
26
Client Probing , Active Directory monitoring , eDirectory monitoring
27
>show sdwan rule vif sdwan.x
28
Attach the vulnerability profile to a security rule , Install content updates that include new signatures to protect against emerging threats
29
Cortex XDR Prevent
30
Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed , Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned , Inform the customer that they will need to provide a SPAN port for the evaluation unit assuming a TAP mode deployment
31
Accessing domains registered in the last 30 days, Visiting a malicious URL, Using dynamic DNS domain providers
32
WildFire
33
A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation
34
Once a week
35
Configure a Backup HA1 Interface , Configure a Heartbeat Backup
36
JScript, PowerShell Script, VBScript
37
Use the management interface as the HA1 backup link
38
Specify included and excluded networks when configuring User-ID , Only enable User-ID on trusted zones , Use a dedicated service account for User-ID services with the minimal permissions necessary
39
Inability to access websites, Exclude certain types of traffic in decryption policy , Include all traffic types in decryption policy
40
Connector , Operator , Attribute
41
show sdwan event
42
deliver the malware , exfiltrate data , lateral movement
43
Zone protection profile on the zone of the ingress interface
44
Prisma Cloud Compute , Prisma Cloud Enterprise
45
WildFire hybrid cloud solution, WildFire public cloud, WF-500
46
The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks
47
Dynamic User Groups
48
show mlav cloud-status
49
Onboard a Service Connection in the Americas region
50
Benign, Malicious, Phishing, Grayware
51
All Business and regulatory traffic, All Mutual Authentication traffic
52
PE file upload to WildFire
53
Utilize dynamic updates with an aggressive update schedule
54
Environments, Interfaces , Sessions
55
Panorama Interconnect Plugin
56
Panorama VM-Series
57
HA active/active, Policy-based forwarding
58
NGFW permit a response from the DNS server.
59
It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server.
60
X-Forwarded-For
61
command and control (C2) , malware , grayware
62
App-ID with the Zero Trust model, WildFire Cloud threat analysis
63
Infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs.
64
active / active high availability (HA) , non-SYN first packet
65
signatures being available within minutes to protect global users once malware has been submitted
66
WildFire appliance, WildFire public cloud
67
Apply a File Blocking profile to Security policy rules that allow general web access.
68
PE file upload to WildFire
69
single-pass architecture (SPA)
70
DNS Security
71
Tag the user using Panorama or the Web UI of the firewall. , Tag the user through the firewall's XML API.
72
Categorize data and applications by levels of sensitivity. , Validate user identities through authentication.
73
Identify and provide recommendations for device configurations.
74
Step 4: Create the Zero Trust Policy
75
User-ID and Device-ID
76
In situations where the internal DNS server is between the client and the firewall, it gives the firewall the ability to identify the clients who originated the query to the malicious domain., The client communicates with it instead of the malicious IP address.
77
Step 1: Define the protect surface.
78
cost savings due reduction in IT management effort and device consolidation , operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR) , increased security due to scalable cloud-delivered security services (CDSS)
79
App-ID, because it will give visibility into what exact applications are being run over that port and allow the customer to block unsanctioned applications using port 53
80
Policy match is based on application. , Identification of application is possible on any port.
81
Vulnerability Protection profile
82
dynamic user groups (DUGs)
83
Advanced URL Filtering (AURLF)
84
client probing, domain server monitoring, Captive Portal
85
GlobalProtect
86
PE File is forwarded.
87
It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity.
88
PE File is forwarded.
89
It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity.
90
It requires only one processor to complete all the functions within the box.
91
Ensure throughput will not be an issue. , Determine whether local / regional decryption laws apply.
92
Create a custom URL category and add it on exception of the inline ML profile.
93
domain credential filter, IP user mapping
94
Use the WildFire Application Programming Interface (API) to submit website links for analysis. , Forward advanced file types from the firewall for analysis.
95
Add a URL-filtering profile with the action set to "Continue" for unknown URL categories attached to Security policy rules that allow web access. , Add a Security policy rule using only known URL categories with the action set to "Allow."
96
It is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through a single stream-based content inspection engine before egress.
97
Anti-Spyware profile
98
Alert, Reset
99
Directory Sync and Cloud Authentication Service that support IdP using SAML 2.0
100
It allows a list of websites or URL categories to be defined for exclusion from decryption.