Palo Alto Firewall
Palo Alto Network Security Administration involves managing and securing network infrastructure using Palo Alto Networks technologies. It includes tasks such as configuring firewalls, implementing security policies, monitoring network traffic, and preventing cyber threats. Professionals in this role possess expertise in Palo Alto Networks next-generation firewalls and are responsible for ensuring network security and data protection. Palo Alto Network Security Administration requires knowledge of network security best practices, threat intelligence, and the ability to effectively respond to security incidents. Skilled Palo Alto Network Security Administrators play a critical role in safeguarding networks and maintaining a secure digital environment.
Take this assessment to check how good you are in this domain.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
* NyxCoins vary on score
0 of 30 Questions completed
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
0 of 30 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which two are the correct methods to be configured to validate the revocation status of a digital certificate? (Multiple Choice)CorrectIncorrect
Why is the purpose of using firewall decryption broker in NGFW?CorrectIncorrect
Which CLI command will generate simulated traffic going through the firewall and find out which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?CorrectIncorrect
What are the two mandatory options to configure a VLAN interface for a Layer-2 Ethernet port? (Multiple Choice)CorrectIncorrect
Which Security Profile type, in a Palo Alto Networks NGFW, will protect against worms and trojans?CorrectIncorrect
Why will you specify an Authentication Profile, while configuring a GlobalProtect Portal?CorrectIncorrect
Which two virtualization platforms can be officially used to deploy Palo Alto Networks VM- Series firewalls? (Multiple Choice)CorrectIncorrect
Which application and service within the Traffic log will show up for decrypted packets from the website https://www.thinknyx.com?CorrectIncorrect
Which factor will decide if log message will be generated or not, in PAN OS 10.0?CorrectIncorrect
In a Palo Alto Networks NGFW, which action will you configure in a Security policy rule, resulting in traffic being silently rejected?CorrectIncorrect
Which of the below are valid firewall interface types that can be added to a Layer3-type security zone? (Multiple Choice)CorrectIncorrect
Which firewall interface type will you configure to allow passive monitoring of network traffic?CorrectIncorrect
In a Palo Alto Networks NGFW, a user ID and password when configured together, provide which of the following?CorrectIncorrect
When committing changes to a Palo Alto Networks NGFW, what will be the consequence of clicking the Preview Changes link?CorrectIncorrect
Which of the following are the best practices to reduce CPU utilization on the management plane? (Multiple Choice)CorrectIncorrect
Which of the following are mandatory match criteria to be configured in a Palo Alto Networks Security policy rule? (Multiple Choice)CorrectIncorrect
What is the correct authentication method to use if we want to integrate all non-native MFA platforms in PAN-OS® software?CorrectIncorrect
What is the correct way to capture traffic on the management interface of the Palo Alto Networks NGFW?CorrectIncorrect
What does the “incomplete” status of the application mean, for a session in the Traffic log?CorrectIncorrect
Which of the below file types can be forwarded to WildFire for analysis if you are subscribed to the basic WildFire service? (Multiple Choice)CorrectIncorrect
Which of the following will happen, if a security administrator uses an Application Override Policy?CorrectIncorrect
Which PAN-OS feature will prevent the submission of company’s login details into website forms?CorrectIncorrect
If you configure a virtual router in a Palo Alto Networks NGFW, which object will contain all possible routes?CorrectIncorrect
Which option will allow a security administrator to view details about the traffic that is currently active through the Palo Alto Networks NGFW?CorrectIncorrect
Which CLI command allows a firewall administrator to see details about the firewall including uptime of the firewall, PAN-OS® version and serial number of the appliance?CorrectIncorrect
Which option allows a firewall administrator to view trends for traffic over various periods of time, e.g., threats detected in the last 7 days?CorrectIncorrect
Which of the following are the correct and valid states of a firewall? (Multiple Choice)CorrectIncorrect
When firewalls are configured in High Availability, which information is transmitted using the HA data link?CorrectIncorrect
Which is the correct name of DoS protection mechanism used to detect and stop session exhaustion attacks?CorrectIncorrect
Based on WildFire subscription, how many maximum samples per day can be submitted to WildFire?CorrectIncorrect