Palo Alto Firewall
Palo Alto Network Security Administration involves managing and securing network infrastructure using Palo Alto Networks technologies. It includes tasks such as configuring firewalls, implementing security policies, monitoring network traffic, and preventing cyber threats. Professionals in this role possess expertise in Palo Alto Networks next-generation firewalls and are responsible for ensuring network security and data protection. Palo Alto Network Security Administration requires knowledge of network security best practices, threat intelligence, and the ability to effectively respond to security incidents. Skilled Palo Alto Network Security Administrators play a critical role in safeguarding networks and maintaining a secure digital environment.
Take this assessment to check how good you are in this domain.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards
300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
Which two are the correct methods to be configured to validate the revocation status of a digital certificate? (Multiple Choice)
CorrectIncorrect -
Question 2 of 30
2. Question
Why is the purpose of using firewall decryption broker in NGFW?
CorrectIncorrect -
Question 3 of 30
3. Question
Which CLI command will generate simulated traffic going through the firewall and find out which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?
CorrectIncorrect -
Question 4 of 30
4. Question
What are the two mandatory options to configure a VLAN interface for a Layer-2 Ethernet port? (Multiple Choice)
CorrectIncorrect -
Question 5 of 30
5. Question
Which Security Profile type, in a Palo Alto Networks NGFW, will protect against worms and trojans?
CorrectIncorrect -
Question 6 of 30
6. Question
Why will you specify an Authentication Profile, while configuring a GlobalProtect Portal?
CorrectIncorrect -
Question 7 of 30
7. Question
Which two virtualization platforms can be officially used to deploy Palo Alto Networks VM- Series firewalls? (Multiple Choice)
CorrectIncorrect -
Question 8 of 30
8. Question
Which application and service within the Traffic log will show up for decrypted packets from the website https://www.thinknyx.com?
CorrectIncorrect -
Question 9 of 30
9. Question
Which factor will decide if log message will be generated or not, in PAN OS 10.0?
CorrectIncorrect -
Question 10 of 30
10. Question
In a Palo Alto Networks NGFW, which action will you configure in a Security policy rule, resulting in traffic being silently rejected?
CorrectIncorrect -
Question 11 of 30
11. Question
Which of the below are valid firewall interface types that can be added to a Layer3-type security zone? (Multiple Choice)
CorrectIncorrect -
Question 12 of 30
12. Question
Which firewall interface type will you configure to allow passive monitoring of network traffic?
CorrectIncorrect -
Question 13 of 30
13. Question
In a Palo Alto Networks NGFW, a user ID and password when configured together, provide which of the following?
CorrectIncorrect -
Question 14 of 30
14. Question
When committing changes to a Palo Alto Networks NGFW, what will be the consequence of clicking the Preview Changes link?
CorrectIncorrect -
Question 15 of 30
15. Question
Which of the following are the best practices to reduce CPU utilization on the management plane? (Multiple Choice)
CorrectIncorrect -
Question 16 of 30
16. Question
Which of the following are mandatory match criteria to be configured in a Palo Alto Networks Security policy rule? (Multiple Choice)
CorrectIncorrect -
Question 17 of 30
17. Question
What is the correct authentication method to use if we want to integrate all non-native MFA platforms in PAN-OS® software?
CorrectIncorrect -
Question 18 of 30
18. Question
What is the correct way to capture traffic on the management interface of the Palo Alto Networks NGFW?
CorrectIncorrect -
Question 19 of 30
19. Question
What does the “incomplete” status of the application mean, for a session in the Traffic log?
CorrectIncorrect -
Question 20 of 30
20. Question
Which of the below file types can be forwarded to WildFire for analysis if you are subscribed to the basic WildFire service? (Multiple Choice)
CorrectIncorrect -
Question 21 of 30
21. Question
Which of the following will happen, if a security administrator uses an Application Override Policy?
CorrectIncorrect -
Question 22 of 30
22. Question
Which PAN-OS feature will prevent the submission of company’s login details into website forms?
CorrectIncorrect -
Question 23 of 30
23. Question
If you configure a virtual router in a Palo Alto Networks NGFW, which object will contain all possible routes?
CorrectIncorrect -
Question 24 of 30
24. Question
Which option will allow a security administrator to view details about the traffic that is currently active through the Palo Alto Networks NGFW?
CorrectIncorrect -
Question 25 of 30
25. Question
Which CLI command allows a firewall administrator to see details about the firewall including uptime of the firewall, PAN-OS® version and serial number of the appliance?
CorrectIncorrect -
Question 26 of 30
26. Question
Which option allows a firewall administrator to view trends for traffic over various periods of time, e.g., threats detected in the last 7 days?
CorrectIncorrect -
Question 27 of 30
27. Question
Which of the following are the correct and valid states of a firewall? (Multiple Choice)
CorrectIncorrect -
Question 28 of 30
28. Question
When firewalls are configured in High Availability, which information is transmitted using the HA data link?
CorrectIncorrect -
Question 29 of 30
29. Question
Which is the correct name of DoS protection mechanism used to detect and stop session exhaustion attacks?
CorrectIncorrect -
Question 30 of 30
30. Question
Based on WildFire subscription, how many maximum samples per day can be submitted to WildFire?
CorrectIncorrect