32 days ✔️Ans How long will a new website be categorized as a new -
registered - domain ?
30 ✔️Ans What is the maximum number of EDLS supported by the
firewall ?
Outbound ✔️Ans What is the most important traffic direction on
which to configure a URL Filtering Profile ?
Threat ✔️Ans If a DNS Sinkhole is configured , any sinkhole actions
that indicate a potentially infected host are recorded in which log type ?
•Traffic is allowed by a Security policy rule.
•The matching Security policy rule must enable logging. ✔️Ans Which
two items describe configuration conditions that enable the firewall to
generate Traffic log entries ? ( Choose two . )
•SYN cookie protection
•Flood protection ✔️Ans Which two capabilities are included in DoS
protection ?
Protect ✔️Ans Which DoS Protection policy action must you
configure to ensure that the firewall consults a DoS Protection Profile ?
•Enabled or disabled per firewall
•Protects against single - session DoS attacks
•Applied per zone ✔️Ans Which three options describe
characteristics of packet buffer protection ?
Protects ingress ports of an assigned zone ✔️Ans Which option
describes a characteristic of a Zone Protection Profile ?
ICMP Flood ✔️Ans Which DoS flood attack sends spoofed packets that
ping every computer on the network ?
, Validate connectivity to the PAN - DB cloud ✔️Ans Finding URLs
matched to the not - resolved URL category in the URL Filtering log file
might indicate that you should take which action ?
application shifts ✔️Ans Because it examines very packet in a
session , what can a firewall detect ?
Web - based ✔️Ans Application block pages can be enabled for which
applications ?
•Program heuristics
•Application signatures
•Known protocol decoders ✔️Ans App - ID running on a firewall
identifies applications using which three methods ? ( Choose three . )
Identification by the App - ID Engine ✔️Ans Which firewall operation
is skipped when network traffic matches an Application Override policy
rule ?
•Protocol decoders .
•Custom application signatures
•Standard application signatures ✔️Ans Which three items are used
by the firewall's App - ID Engine to identify the application in network
traffic ? ( Choose three . )
Policy Optimizer ✔️Ans Which tool is available in the management
web interface to help you migrate from port - based policy rules to
application - based policy rules ?
•web - browsing
•ssl ✔️Ans By default , which two application names might App - ID
assign to a custom , web - based application running in your environment ?
( Choose two . )
Once per month ✔️Ans When are brand - new application signatures
released by Palo Alto Networks ?
✔Antivirus
✔Anti - Spyware