PaloAltoPSE认证考试题库及答案.docx

上传人:h**** 文档编号:1562391 上传时间:2019-03-05 格式:DOCX 页数:11 大小:152.47KB
下载 相关 举报
PaloAltoPSE认证考试题库及答案.docx_第1页
第1页 / 共11页
PaloAltoPSE认证考试题库及答案.docx_第2页
第2页 / 共11页
PaloAltoPSE认证考试题库及答案.docx_第3页
第3页 / 共11页
PaloAltoPSE认证考试题库及答案.docx_第4页
第4页 / 共11页
PaloAltoPSE认证考试题库及答案.docx_第5页
第5页 / 共11页
点击查看更多>>
资源描述

1、Test - PSE: Foundation Exam 7.0Section 1 Question 1 of 22. How many different models of hardware-based firewall appliances does Palo Alto Networks sell today?Fewer than 5 More than 30 Fewer than 20 More than 20 Mark for follow upQuestion 2 of 22. Which hardware platform should I consider if the cust

2、omer needs at least 1 Gbps of Threat Prevention throughput and the ability to handle at least 250K sessions?Any PA-3000, PA-5000, or PA-7000 series firewall Only the PA-3060 firewall and higher Any PA-5000 or PA-7000 series firewall Only the PA-3050 firewall and higher Mark for follow upQuestion 3 o

3、f 22. Which hardware firewall platforms include both built-in front-to-back airflow and redundant power supplies?All Palo Alto Networks hardware firewall platforms All PA-5000 and PA-7000 series firewall platforms The PA-3060 firewall platform The PA-7000 series firewall platforms Mark for follow up

4、Question 4 of 22. When selling a Palo Alto Networks device as an Internet gateway that will be doing threat inspection, which of these components should be included in the Bill of Materials (BoM)? (Select the three correct answers.)A Threat Subscription A Support Contract An M-100 A Palo Alto Networ

5、ks Appliance A GP-100 A Global Protect Portal Mark for follow upSave / Return LaterSummaryNext Test - PSE: Foundation Exam 7.0Section 3 Question 5 of 22. TRUE or FALSE: Many customers purchase Palo Alto Networks NGFWs (Next Generation Firewalls) just to gain previously unavailable levels of visibili

6、ty into their traffic flows.TRUE FALSE Mark for follow upQuestion 6 of 22. What are the major families of file types now supported by Wildfire in PAN-OS 7.0?PE files, Microsoft Office, PDF, Java applets, APK, and Flash All executable files, PDF files, Microsft Office files and Adobe Flash applets Al

7、l executable files, PDF files and Microsft Office files All executable files and all files with a MIME type Mark for follow upQuestion 7 of 22. What are the main benefits of WildFire? (Select the three correct answers.)Its a sandboxing environment that can detect malware by observing the behavior of

8、 suspicious files. WildFire gathers information from possible threats detected by both NGFWs and Endpoints. By collecting and distributing malware signatures from every major anti-virus vendor, WildFire can provide comprehensive protection. Signatures for malicious files are quickly distributed glob

9、ally to all Palo Alto Networks customers firewalls. By using Palo Alto Networks proprietary cloud-based architecture, quarantine holds on suspicious files are typically reduced to less than 30 seconds. Mark for follow upQuestion 8 of 22. What are five benefits of Palo Alto Networks NGFWs (Next Gener

10、ation Firewalls)? (Select the five correct answers.)Seemless integration with the Threat Intelligence Cloud Identical security subscriptions on all models Comprehensive security platform designed to scale functionality over time Convenient configuration Wizard Predictable throughput Easy-to-use GUI

11、which is the same on all models Mark for follow upQuestion 9 of 22. How quickly are Wildfire updates about previously unknown files now being delivered from the cloud to customers with a WildFire subscription (as of version 6.1)?1 day 15 minutes 30 minutes 5 minutes 60 minutes Mark for follow upQues

12、tion 10 of 22. What are the five critical places in the network where Palo Alto Networks NGFWs and other software are commonly deployed in order to solve many of todays enterprise security problems? (Select the five correct answers.)Vehicle-Mounted Internet Hotspots Virtual Machine Mobile/Endpoint B

13、ranch Office Internet-Connected Home Appliances Campus Edge Internet Perimeter VLAN Aggregation Datacenter Perimeter Mark for follow upQuestion 11 of 22. What are the major families of threat cloud virtual operating systems now supported by Wildfire in PAN-OS 7.0?Windows XP, Windows 7, and Android W

14、indows XP, Windows Vista, and Windows 7 Windows XP, Windows Vista, Windows 7 and Windows 8 Windows XP, Windows 7, Android, and IOS Mark for follow up BackSave / Return LaterSummaryNext Test - PSE: Foundation Exam 7.0Section 4 Question 12 of 22. True or False: Antivirus inspection is proxy-based?True

15、 FalseMark for follow upQuestion 13 of 22. What does App-ID inspect to identify an application?Source IP Source Port TTL Data Payload Hash Encryption Key Mark for follow upQuestion 14 of 22. True or False: PAN-DB is a service that aligns URLs with category typesTrue FalseMark for follow upQuestion 1

16、5 of 22. True or False: DSRI degrades the performance of a firewall?True FalseMark for follow upQuestion 16 of 22. What is Palo Alto Networks Next Generation Security Platform? Choose three answers.UTM Next-Generation Firewall Security Certificate Authority Threat Intelligence Cloud Security Product

17、 Governance Advanced Endpoint Protection Mark for follow upQuestion 17 of 22. What are the failure areas of legacy security architectures? Choose three answers.Limited Visibility ROI Lacks Correlation Manual Response Requires Headcount Mark for follow upQuestion 18 of 22. Which one of these is not a

18、 factor impacting sizing decisions?Decryption Sessions Redundancy Number of model Performance Number of rules Mark for follow upQuestion 19 of 22. The automated correlation engine analyzes:Zones Ports Protocols Profiles Logs Rules Exceptions Mark for follow up BackSave / Return LaterSummaryNext Test

19、 - PSE: Foundation Exam 7.0Section 2 Question 20 of 22. What are the three key components of a successful Three Tab Demo? (Select the three correct answers.)After setting match criteria in the Object tab showing how that data is presented in the logs Providing visibility into recently occurring thre

20、ats and showing how to block those threats Showing how Palo Alto Networks firewalls provide visibility into applications and control of those applications Showing which users are running which applications and provide a method for controlling application access on a by user Presenting the information in the Network and Device tabs Mark for follow upQuestion 21 of 22. What is the URL for the full list of applications recognized by Palo Alto Networks?http:/www.MyA

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育教学资料库 > 试题真题

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。