Test_Accredited-Configuration-Engineer-ACE-Exam-PANOS-8-0-Version.docx

Please download to get full document.

View again

of 12
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information Report
Category:

Documents

Published:

Views: 2 | Pages: 12

Extension: DOCX | Download: 0

Share
Related documents
Description
Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 8.0 Version ACE 8.0 Question 1 of 40. An Interface Management Profile can be attached to which two interface types? (Choose two.) Layer 3 Layer 2 Virtual Wire Tap Loopback Mark for follow up Question 2 of 40. App-ID running on a firewall identifies applications using which three methods? (Choose three.) WildFire lookups Program heuristics
Tags
Transcript
  Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 8.0 Version   ACE 8.0   Question 1 of 40.   An Interface Management Profile can be attached to which two interface types? (Choose two.)   Layer 3   Layer 2   Virtual Wire   Tap   Loopback   Mark for follow up   Question 2 of 40.   App-ID running on a firewall identifies applications using which three methods? (Choose three.)   WildFire lookups   Program heuristics    Application signatures   Known protocol decoders   PAN-DB lookups   Mark for follow up   Question 3 of 40.   Application block pages can be enabled for which applications?   web-based non-TCP/IP MGT port-based any    Mark for follow up   Question 4 of 40.   Because a firewall examines every packet in a session, a firewall can detect application ________?   errors filters groups shifts Mark for follow up   Question 5 of 40.   Finding URLs matched to the not-resolved URL category in the URL Filtering log file might indicate that you should take which action?   Validate your Security policy rules. Re-download the URL seed database. Validate connectivity to the PAN-DB cloud. Reboot the firewall. Mark for follow up   Question 6 of 40.   For which firewall feature should you create forward trust and forward untrust certificates?   SSL forward proxy decryption SSL Inbound Inspection decryption SSL client-side certificate checking SSH decryption Mark for follow up   Question 7 of 40.    If a DNS sinkhole is configured, any sinkhole actions indicating a potentially infected host are recorded in which log type?   Threat Data Filtering WildFire Submissions Traffic Mark for follow up   Question 8 of 40.   In a destination NAT configuration, which option accurately completes the following sentence? A Security policy rule should be written to match the _______.   post-NAT source and destination addresses, and the post-NAT destination zone srcinal pre-NAT source and destination addresses, and the pre-NAT destination zone srcinal pre-NAT source and destination addresses, but the post-NAT destination zone post-NAT source and destination addresses, but the pre-NAT destination zone Mark for follow up   Question 9 of 40.   In a Security Profile, which action does a firewall take when the profileãs action is configured as Reset Server? (Choose two.)   The traffic responder is reset.   For UDP sessions, the connection is reset.   For UDP sessions, the connection is dropped.   The client is reset.   Mark for follow up   Question 10 of 40.   In an HA configuration, which three components are synchronized between the pair of firewalls? (Choose three.)   logs   policies      networks   objects   Mark for follow up   Question 11 of 40.   In an HA configuration, which three functions are associated with the HA1 Control Link? (Choose three.)   exchanging hellos   synchronizing sessions   synchronizing configuration   exchanging heartbeats   Mark for follow up   Question 12 of 40.   In an HA configuration, which two failure detection methods rely on ICMP ping? (Choose two.)   hellos   link groups   path groups   heartbeats   Mark for follow up   Question 13 of 40.   On a firewall that has 32 Ethernet ports and is configured with a dynamic IP and port (DIPP) NAT oversubscription rate of 2x, what is the maximum number of concurrent sessions supported by each available IP address?   32 64K 128K 64 Mark for follow up  
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x