1.
A network administrator needs to view the default action for a specific spyware signature. The administrator follows the tabs and menus through Objects > Security Profiles > Anti-Spyware and selects the default profile.
What should be done next?
2.
How is the Forward Untrust Certificate used?
3.
Which command can be used to validate a Captive Portal policy?
4.
Which setting will allow a DoS protection profile to limit the maximum concurrent sessions from a source IP address?
5.
A company has a pair of Palo Alto Networks firewalls configured as an Active/Passive High Availability (HA) pair. What allows the firewall administrator to determine the last date a failover event occurred?
6.
Which Public Key Infrastructure component is used to authenticate users for GlobalProtect when the Connect Method is set to pre-logon?
7.
A critical US-CERT notification is published regarding a newly discovered botnet. The malware is very evasive and is not reliably detected by endpoint antivirus software. Furthermore, SSL is used to tunnel malicious traffic to command-and-control servers on the Internet and SSL Forward Proxy Decryption is not enabled.
Which component, once enabled on a perimeter firewall, will allow the identification of existing infected hosts in an environment?
8.
An administrator is configuring an IPSec VPN to a Cisco ASA at the administrator's home and experiencing issues completing the connection. The following is the output from the command:
What could be the cause of this problem?
9.
How does Panorama handle incoming logs when it reaches the maximum storage capacity?
10.
Which client software can be used to connect remote Linux clients into a Palo Alto Networks infrastructure without sacrificing the ability to scan traffic and protect against threats?