Which two actions are available for antivirus security profiles? (Choose two.)
A. continue
B. allow
C. block IP
D. alert - ✔✔B. allow
D. alert
Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.)
A. User‐Agent
B. Safe Search
C. URL redirection
D. X‐Forward‐For - ✔✔A. User‐Agent
D. X‐Forward‐For
What are the two components of Denial‐of‐Service Protection? (Choose two.)
A. zone protection profile
B. DoS protection profile and policy rules
C. flood protection
D. reconnaissance protection - ✔✔A. zone protection profile
B. DoS protection profile and policy rules
,Which two types of attacks does the PAN‐DB prevent? (Choose two.)
A. phishing sites
B. HTTP based command‐and‐control
C. infected JavaScript
D. flood attacks - ✔✔A. phishing sites
B. HTTP based command‐and‐control
Which two valid URLs can be used in a custom URL category? (Choose two.)
A. ww.youtube.**
B. www.**.com
C. www.youtube.com
D. *.youtube.com - ✔✔C. www.youtube.com
D. *.youtube.com
What are three methods of mapping usernames to IP addresses? (Choose three.)
A. Server Monitoring
B. Traps
C. Minemeld
D. syslog
E. AutoFocus
F. port mapping - ✔✔A. Server Monitoring
D. syslog
F. port mapping
Which type of server profile is used to create group mappings?
,A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP - ✔✔D. LDAP
The Server Monitoring user mapping method can monitor which three types of
servers? (Choose three.)
A. RADIUS
B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers - ✔✔B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers
The Port Mapping user mapping method can monitor which two types of
environments? (Choose two.)
A. Citrix
B. Microsoft terminal servers
C. Exchange Servers
D. Linux servers - ✔✔A. Citrix
B. Microsoft terminal servers
The Windows User‐ID Agent can be installed on which two operating systems?
(Choose two.)
A. Linux
, B. Server 2016
C. XP
D. Server 2008 - ✔✔B. Server 2016
D. Server 2008
A Heatmap provides an adoption rate for which three features? (Choose three.)
A. WildFire
B. Traps
C. File Blocking
D. User‐ID
E. SSL certificates
F. authentication profiles - ✔✔A. WildFire
C. File Blocking
D. User‐ID
What are three Best Practice Assessment tool primary categories? (Choose
three.)
A. User‐ID
B. Logging
C. Vulnerability Protection
D. Security
E. Decryption
F. DoS Protection - ✔✔D. Security
E. Decryption
F. DoS Protection