Default Antivirus Profile protocols - ✔✔-smtp
-smb
-ftp
-imap
-pop3
-http/2
Antivirus profile actions - ✔✔-allow
-allert (Default)
-drop
-reset client
-reset server
-reset both
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will
find in Rule Usage tab? - ✔✔-Basics
-Applications
-Activity
-Traffic
A Virtual Wire object is capable of blocking or allowing traffic based on? - ✔✔802.1Q VLAN tag values
When new applications are added to the App-ID database, application groups are always automatically
updated ? - ✔✔No!
, After updating an application group, you need to issue a firewall commit.
Application groups allow you to create a logical group of applications that can be added to the policy
rules of Security and QoS.
When you want to treat a set of applications similarly in a policy, an application group is used.
Ultimately, application groups simplify the administration of the rule bases.
Instead of applying multiple rules to the same list of applications, you can create an application group
and apply multiple rules to that group.
In a TCP exchange how many packets does it take to identify the application? - ✔✔Four or five
What are the methods of managing the Palo Alto firewall ? - ✔✔-Web interface
-Panorama
-SSH/Console CLI
-Rest XML API
The first classification of network traffic is based on its IP and port address.
The Security Policy is consulted by the firewall to decide whether to allow or block traffic based on the IP
address and port.
What is application set to during this initial Security Policy check? - ✔✔ANY .
The application is set to "any" during this initial Security Policy check.
If traffic is allowed, a session is generated and the App-ID then looks for a signature for the application.
Which are all the security profiles ? - ✔✔▪ Antivirus: Detects infected files being transferred with the
application
▪ Anti-Spyware: Detect downloads of spyware and traffic from spyware already installed
▪ Vulnerability Protection: Detects attempts at exploiting known vulnerabilities in applications