Vcehome > Palo Alto Networks > ACE > ACE > ACE Online Practice Questions and Answers

ACE Online Practice Questions and Answers

Questions 4

Which of the following represents HTTP traffic events that can be used to identify potential Botnets?

A. Traffic from users that browse to IP addresses instead of fully-qualified domain names, downloading W32.Welchia.Worm from a Windows share, traffic to domains that have been registered in the last 30 days, downloading executable files from unknown URL's

B. Traffic from users that browse to IP addresses instead of fully-qualified domain names, traffic to domains that have been registered in the last 60 days, downloading executable files from unknown URL's

C. Traffic from users that browse to IP addresses instead of fully-qualified domain names, traffic to domains that have been registered in the last 60 days, downloading executable files from unknown URL's, IRC-based Command and Control traffic

D. Traffic from users that browse to IP addresses instead of fully-qualified domain names, traffic to domains that have been registered in the last 30 days.

Browse 222 Q&As
Questions 5

Which of the following are accurate statements describing the HA3 link in an Active-Active HA deployment?

A. HA3 is used for session synchronization

B. The HA3 link is used to transfer Layer 7 information

C. HA3 is used to handle asymmetric routing

D. HA3 is the control link

Browse 222 Q&As
Questions 6

A "Continue" action can be configured on the following Security Profiles:

A. URL Filtering, File Blocking, and Data Filtering

B. URL Filteringn

C. URL Filtering and Antivirus

D. URL Filtering and File Blocking

Browse 222 Q&As
Questions 7

When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunneling in policies by specifying the SSHtunnel AppID?

A. SSH Proxy

B. SSL Forward Proxy

C. SSL Inbound Inspection

D. SSL Reverse Proxy

Browse 222 Q&As
Questions 8

To allow the PAN device to resolve internal and external DNS host names for reporting and for security policies, an administrator can do the following:

A. Create a DNS Proxy Object with a default DNS Server for external resolution and a DNS server for internal domain. Then, in the device settings, point to this proxy object for DNS resolution.

B. In the device settings define internal hosts via a static list.

C. In the device settings set the Primary DNS server to an external server and the secondary to an internal server.

D. Create a DNS Proxy Object with a default DNS Server for external resolution and a DNS server for internal domain. Then, in the device settings, select the proxy object as the Primary DNS and create a custom security rule which references that object for

Browse 222 Q&As
Questions 9

Which two file types can be sent to WildFire for analysis if a firewall has only a standard subscription service? (Choosetwo.)

A. .jar

B. .exe

C. .dll

D. .pdf

Browse 222 Q&As
Questions 10

Which type of content update does NOT have to be scheduled for download on the firewall?

A. dynamic update threat signatures

B. dynamic update antivirus signatures

C. WildFire antivirus signatures

D. PAN-DB updates

Browse 222 Q&As
Questions 11

The "Drive-By Download" protection feature, under File Blocking profiles in Content-ID, provides:

A. Increased speed on downloads of file types that are explicitly enabled.

B. The ability to use Authentication Profiles, in order to protect against unwanted downloads.

C. Password-protected access to specific file downloads for authorized users.

D. Protection against unwanted downloads by showing the user a response page indicating that a file is going to be downloaded.

Browse 222 Q&As
Questions 12

What happens at the point of Threat Prevention license expiration?

A. Threat Prevention no longer updated; existing database still effective

B. Threat Prevention is no longer used; applicable traffic is allowed

C. Threat Prevention no longer used; applicable traffic is blocked

D. Threat Prevention no longer used; traffic is allowed or blocked by configuration per Security Rule

Browse 222 Q&As
Questions 13

Which fields can be altered in the default Vulnerability Protection Profile?

A. Category

B. Severity

C. None

Browse 222 Q&As
Exam Code: ACE
Exam Name: Accredited Configuration Engineer (ACE) PAN-OS 8.0
Last Update: May 11, 2024
Questions: 222 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99