To properly configure DOS protection to limit the number of sessions individually from specific source IPs you would configure a DOS Protection rule with the following characteristics:
A. Action: Protect, Classified Profile with "Resources Protection" configured, and Classified Address with "source-ip-only" configured
B. Action: Deny, Aggregate Profile with "Resources Protection" configured
C. Action: Protect, Aggregate Profile with "Resources Protection" configured
D. Action: Deny, Classified Profile with "Resources Protection" configured, and Classified Address with "source-ip-only" configured
Considering the information in the screenshot above, what is the order of evaluation for this URL Filtering Profile?
A. URL Categories (BrightCloud or PANDB),
B. Custom Categories, Block List, Allow List.
C. Block List, Allow List, URL Categories (BrightCloud or PANDB), Custom Categories.
D. Block List, Allow List, Custom Categories, URL Categories (BrightCloud or PANDB).
E. Allow List, Block List, Custom Categories, URL Categories (BrightCloud or PANDB).
Which of the following is True of an application filter?
A. An application filter automatically adapts when an application moves from one IP address to another.
B. An application filter automatically includes a new application when one of the new application's characteristics are included in the filter.
C. An application filter specifies the users allowed to access an application.
D. An application filter is used by malware to evade detection by firewalls and anti-virus software.
Which local interface cannot be assigned to the IKE gateway?
A. Tunnel
B. L3
C. VLAN
D. Loopback
Which of the following statements is NOT True about Palo Alto Networks firewalls?
A. The Admin account may be disabled.
B. System defaults may be restored by performing a factory reset in Maintenance Mode.
C. The Admin account may not be disabled.
D. Initial configuration may be accomplished thru the MGT interface or the Console port.
Which statement describes a function provided by an Interface Management Profile?
A. It determines which external services are accessible by the firewall.
B. It determines which administrators can manage which interfaces.
C. It determines which firewall services are accessible from external devices.
D. It determines the NetFlow and LLDP interface management settings.
App-ID running on a firewall identifies applications using which three methods? (Choose three.)
A. Application signatures
B. Known protocol decoders
C. WildFire lookups
D. Program heuristics
E. PAN-DB lookups
In an HA configuration, which three components are synchronized between the pair of firewalls? (Choose three.)
A. logs
B. objects
C. policies
D. networks
In Active/Active HA environments, redundancy for the HA3 interface can be achieved by
A. Configuring a corresponding HA4 interface
B. Configuring HA3 as an Aggregate Ethernet bundle
C. Configuring multiple HA3 interfaces
D. Configuring HA3 in a redundant group
Taking into account only the information in the screenshot above, answer the following question. Which applications will be allowed on their standard ports? (Select all correct answers.)
A. BitTorrent
B. Gnutella
C. Skype
D. SSH