Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
An administrator wants to enable WildFire inline machine learning.Which three file types does WildFire inline ML analyze?
An administrator has users accessing network resources through Citrix XenApp 7.x.Which User-ID mapping solution will map multiple users who are using Citrix to connect to the network and access resources?
VPN traffic intended for an administrator's firewall is being maliciously intercepted and retransmitted by the interceptor.When creating a VPN tunnel, which protection profile can be enabled to prevent this malicious behavior?
The firewall identifies a popular application as an unknown-tcp. Which two options are available to identify the application?
What can you use with GlobalProtect to assign user-specific client certificates to each GlobalProtect user?
Which detection method leverages the type of exposure and confidence levels to reduce incidents?
Which Security policy rule will allow an admin to block facebook chat but allow Facebook in general?
Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?
Which User-ID method maps IP addresses to usernames for users connecting through a web proxy that has already authenticated the user?
If an administrator wants to decrypt SMTP traffic and possesses the server's certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?
An organization wishes to roll out decryption but gets some resistance from engineering leadership regarding the guest network.What is a common obstacle for decrypting traffic from guest devices?
Which is the maximum number of samples that can be submitted to WildFire per day, based on a WildFire subscription?
An administrator creates a custom application containing Layer 7 signatures. The latest application and threat dynamic update is downloaded to the same NGFW.The update contains an application that matches the same traffic signatures as the custom application.Which application should be used to identify traffic traversing the NGFW?
Starting with PAN-OS version 9.1, GlobalProtect logging information is now recorded in which firewall log?
An administrator needs to optimize traffic to prefer business-critical applications over non-critical applications.QoS natively integrates with which feature to provide service quality?
An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall.Which priority is correct for the passive firewall?
Which PAN-OSֲ® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?
Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OSֲ® software?
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?
An administrator encountered problems with inbound decryption. Which option should the administrator investigate as part of triage?
