PaloAltoPSE認(rèn)證考試題庫(kù)及答案.docx
《PaloAltoPSE認(rèn)證考試題庫(kù)及答案.docx》由會(huì)員分享,可在線閱讀,更多相關(guān)《PaloAltoPSE認(rèn)證考試題庫(kù)及答案.docx(11頁(yè)珍藏版)》請(qǐng)?jiān)谘b配圖網(wǎng)上搜索。
Test - PSE: Foundation Exam 7.0 Section 1 Question 1 of 22. How many different models of hardware-based firewall appliances does Palo Alto Networks sell today? Fewer than 5 More than 30 Fewer than 20 More than 20 Mark for follow up Question 2 of 22. Which hardware platform should I consider if the customer needs at least 1 Gbps of Threat Prevention throughput and the ability to handle at least 250K sessions? Any PA-3000, PA-5000, or PA-7000 series firewall Only the PA-3060 firewall and higher Any PA-5000 or PA-7000 series firewall Only the PA-3050 firewall and higher Mark for follow up Question 3 of 22. Which hardware firewall platforms include both built-in front-to-back airflow and redundant power supplies? All Palo Alto Networks hardware firewall platforms All PA-5000 and PA-7000 series firewall platforms The PA-3060 firewall platform The PA-7000 series firewall platforms Mark for follow up Question 4 of 22. When selling a Palo Alto Networks device as an Internet gateway that will be doing threat inspection, which of these components should be included in the Bill of Materials (BoM)? (Select the three correct answers.) A Threat Subscription A Support Contract An M-100 A Palo Alto Networks Appliance A GP-100 A Global Protect Portal Mark for follow up Save / Return Later Summary Next Test - PSE: Foundation Exam 7.0 Section 3 Question 5 of 22. TRUE or FALSE: Many customers purchase Palo Alto Networks NGFWs (Next Generation Firewalls) just to gain previously unavailable levels of visibility into their traffic flows. TRUE FALSE Mark for follow up Question 6 of 22. What are the major families of file types now supported by Wildfire in PAN-OS 7.0? PE files, Microsoft Office, PDF, Java applets, APK, and Flash All executable files, PDF files, Microsft Office files and Adobe Flash applets All executable files, PDF files and Microsft Office files All executable files and all files with a MIME type Mark for follow up Question 7 of 22. What are the main benefits of WildFire? (Select the three correct answers.) Its a sandboxing environment that can detect malware by observing the behavior of suspicious files. WildFire gathers information from possible threats detected by both NGFWs and Endpoints. By collecting and distributing malware signatures from every major anti-virus vendor, WildFire can provide comprehensive protection. Signatures for malicious files are quickly distributed globally to all Palo Alto Networks customers firewalls. By using Palo Alto Networks proprietary cloud-based architecture, quarantine holds on suspicious files are typically reduced to less than 30 seconds. Mark for follow up Question 8 of 22. What are five benefits of Palo Alto Networks NGFWs (Next Generation Firewalls)? (Select the five correct answers.) Seemless integration with the Threat Intelligence Cloud Identical security subscriptions on all models Comprehensive security platform designed to scale functionality over time Convenient configuration Wizard Predictable throughput Easy-to-use GUI which is the same on all models Mark for follow up Question 9 of 22. How quickly are Wildfire updates about previously unknown files now being delivered from the cloud to customers with a WildFire subscription (as of version 6.1)? 1 day 15 minutes 30 minutes 5 minutes 60 minutes Mark for follow up Question 10 of 22. What are the five critical places in the network where Palo Alto Networks NGFWs and other software are commonly deployed in order to solve many of todays enterprise security problems? (Select the five correct answers.) Vehicle-Mounted Internet Hotspots Virtual Machine Mobile/Endpoint Branch Office Internet-Connected Home Appliances Campus Edge Internet Perimeter VLAN Aggregation Datacenter Perimeter Mark for follow up Question 11 of 22. What are the major families of threat cloud virtual operating systems now supported by Wildfire in PAN-OS 7.0? Windows XP, Windows 7, and Android Windows XP, Windows Vista, and Windows 7 Windows XP, Windows Vista, Windows 7 and Windows 8 Windows XP, Windows 7, Android, and IOS Mark for follow up Back Save / Return Later Summary Next Test - PSE: Foundation Exam 7.0 Section 4 Question 12 of 22. True or False: Antivirus inspection is proxy-based? True False Mark for follow up Question 13 of 22. What does App-ID inspect to identify an application? Source IP Source Port TTL Data Payload Hash Encryption Key Mark for follow up Question 14 of 22. True or False: PAN-DB is a service that aligns URLs with category types True False Mark for follow up Question 15 of 22. True or False: DSRI degrades the performance of a firewall? True False Mark for follow up Question 16 of 22. What is Palo Alto Networks’ Next Generation Security Platform? Choose three answers. UTM Next-Generation Firewall Security Certificate Authority Threat Intelligence Cloud Security Product Governance Advanced Endpoint Protection Mark for follow up Question 17 of 22. What are the failure areas of legacy security architectures? Choose three answers. Limited Visibility ROI Lacks Correlation Manual Response Requires Headcount Mark for follow up Question 18 of 22. Which one of these is not a factor impacting sizing decisions? Decryption Sessions Redundancy Number of model Performance Number of rules Mark for follow up Question 19 of 22. The automated correlation engine analyzes: Zones Ports Protocols Profiles Logs Rules Exceptions Mark for follow up Back Save / Return Later Summary Next Test - PSE: Foundation Exam 7.0 Section 2 Question 20 of 22. What are the three key components of a successful Three Tab Demo? (Select the three correct answers.) After setting match criteria in the Object tab showing how that data is presented in the logs Providing visibility into recently occurring threats and showing how to block those threats Showing how Palo Alto Networks firewalls provide visibility into applications and control of those applications Showing which users are running which applications and provide a method for controlling application access on a by user Presenting the information in the Network and Device tabs Mark for follow up Question 21 of 22. What is the URL for the full list of applications recognized by Palo Alto Networks? http://www.MyApplipedia.com http://applipedia.paloaltonetworks.com http://www.Applipedia.com http://applications.paloaltonetworks.com Mark for follow up Question 22 of 22. When connecting to PAN-OS using HTTPS for the first time, which Tab will you land on first? Objects Monitor Management Device Network Dashboard Support ACC Policies Mark for follow up Back Save / Return Later Summary- 1.請(qǐng)仔細(xì)閱讀文檔,確保文檔完整性,對(duì)于不預(yù)覽、不比對(duì)內(nèi)容而直接下載帶來(lái)的問(wèn)題本站不予受理。
- 2.下載的文檔,不會(huì)出現(xiàn)我們的網(wǎng)址水印。
- 3、該文檔所得收入(下載+內(nèi)容+預(yù)覽)歸上傳者、原創(chuàng)作者;如果您是本文檔原作者,請(qǐng)點(diǎn)此認(rèn)領(lǐng)!既往收益都?xì)w您。
下載文檔到電腦,查找使用更方便
5 積分
下載 |
- 配套講稿:
如PPT文件的首頁(yè)顯示word圖標(biāo),表示該P(yáng)PT已包含配套word講稿。雙擊word圖標(biāo)可打開word文檔。
- 特殊限制:
部分文檔作品中含有的國(guó)旗、國(guó)徽等圖片,僅作為作品整體效果示例展示,禁止商用。設(shè)計(jì)者僅對(duì)作品中獨(dú)創(chuàng)性部分享有著作權(quán)。
- 關(guān) 鍵 詞:
- PaloAltoPSE 認(rèn)證 考試 題庫(kù) 答案
鏈接地址:http://kudomayuko.com/p-12766919.html