资源描述
Test - PSE: Foundation Exam 7.0Section 1Question 1 of 22.How many different models of hardware-based firewall appliances does Palo Alto Networks sell today?Fewer than 5More than 30Fewer than 20More than 20Mark for follow upQuestion 2 of 22.Which hardware platform should I consider if the customer needs at least 1 Gbps of Threat Prevention throughput and the ability to handle at least 250K sessions?Any PA-3000, PA-5000, or PA-7000 series firewallOnly the PA-3060 firewall and higherAny PA-5000 or PA-7000 series firewallOnly the PA-3050 firewall and higherMark for follow upQuestion 3 of 22.Which hardware firewall platforms include both built-in front-to-back airflow and redundant power supplies?All Palo Alto Networks hardware firewall platformsAll PA-5000 and PA-7000 series firewall platformsThe PA-3060 firewall platformThe PA-7000 series firewall platformsMark for follow upQuestion 4 of 22.When selling a Palo Alto Networks device as an Internet gateway that will be doing threat inspection, which of these components should be included in the Bill of Materials (BoM)? (Select the three correct answers.)A Threat SubscriptionA Support ContractAn M-100A Palo Alto Networks ApplianceA GP-100A Global Protect Portal Mark for follow upSave / Return LaterSummaryNext Test - PSE: Foundation Exam 7.0Section 3Question 5 of 22.TRUE or FALSE: Many customers purchase Palo Alto Networks NGFWs (Next Generation Firewalls) just to gain previously unavailable levels of visibility into their traffic flows.TRUEFALSEMark for follow upQuestion 6 of 22.What are the major families of file types now supported by Wildfire in PAN-OS 7.0?PE files, Microsoft Office, PDF, Java applets, APK, and FlashAll executable files, PDF files, Microsft Office files and Adobe Flash appletsAll executable files, PDF files and Microsft Office filesAll executable files and all files with a MIME typeMark for follow upQuestion 7 of 22.What are the main benefits of WildFire? (Select the three correct answers.)Its a sandboxing environment that can detect malware by observing the behavior of suspicious files.WildFire gathers information from possible threats detected by both NGFWs and Endpoints.By collecting and distributing malware signatures from every major anti-virus vendor, WildFire can provide comprehensive protection.Signatures for malicious files are quickly distributed globally to all Palo Alto Networks customers firewalls.By using Palo Alto Networks proprietary cloud-based architecture, quarantine holds on suspicious files are typically reduced to less than 30 seconds. Mark for follow upQuestion 8 of 22.What are five benefits of Palo Alto Networks NGFWs (Next Generation Firewalls)? (Select the five correct answers.)Seemless integration with the Threat Intelligence CloudIdentical security subscriptions on all modelsComprehensive security platform designed to scale functionality over timeConvenient configuration WizardPredictable throughputEasy-to-use GUI which is the same on all models Mark for follow upQuestion 9 of 22.How quickly are Wildfire updates about previously unknown files now being delivered from the cloud to customers with a WildFire subscription (as of version 6.1)?1 day15 minutes30 minutes5 minutes60 minutesMark for follow upQuestion 10 of 22.What are the five critical places in the network where Palo Alto Networks NGFWs and other software are commonly deployed in order to solve many of todays enterprise security problems? (Select the five correct answers.)Vehicle-Mounted Internet HotspotsVirtual MachineMobile/EndpointBranch OfficeInternet-Connected Home AppliancesCampus EdgeInternet PerimeterVLAN AggregationDatacenter Perimeter Mark for follow upQuestion 11 of 22.What are the major families of threat cloud virtual operating systems now supported by Wildfire in PAN-OS 7.0?Windows XP, Windows 7, and AndroidWindows XP, Windows Vista, and Windows 7Windows XP, Windows Vista, Windows 7 and Windows 8Windows XP, Windows 7, Android, and IOSMark for follow up BackSave / Return LaterSummaryNext Test - PSE: Foundation Exam 7.0Section 4Question 12 of 22.True or False: Antivirus inspection is proxy-based?TrueFalseMark for follow upQuestion 13 of 22.What does App-ID inspect to identify an application?Source IPSource PortTTLData PayloadHashEncryption KeyMark for follow upQuestion 14 of 22.True or False: PAN-DB is a service that aligns URLs with category typesTrueFalseMark for follow upQuestion 15 of 22.True or False: DSRI degrades the performance of a firewall?TrueFalseMark for follow upQuestion 16 of 22.What is Palo Alto Networks Next Generation Security Platform? Choose three answers.UTMNext-Generation FirewallSecurity Certificate AuthorityThreat Intelligence CloudSecurity Product GovernanceAdvanced Endpoint Protection Mark for follow upQuestion 17 of 22.What are the failure areas of legacy security architectures? Choose three answers.Limited VisibilityROILacks CorrelationManual ResponseRequires Headcount Mark for follow upQuestion 18 of 22.Which one of these is not a factor impacting sizing decisions?DecryptionSessionsRedundancyNumber of modelPerformanceNumber of rulesMark for follow upQuestion 19 of 22.The automated correlation engine analyzes:ZonesPortsProtocolsProfilesLogsRulesExceptionsMark for follow up BackSave / Return LaterSummaryNext Test - PSE: Foundation Exam 7.0Section 2Question 20 of 22.What are the three key components of a successful Three Tab Demo? (Select the three correct answers.)After setting match criteria in the Object tab showing how that data is presented in the logsProviding visibility into recently occurring threats and showing how to block those threatsShowing how Palo Alto Networks firewalls provide visibility into applications and control of those applicationsShowing which users are running which applications and provide a method for controlling application access on a by userPresenting the information in the Network and Device tabs Mark for follow upQuestion 21 of 22.What is the URL for the full list of applications recognized by Palo Alto Networks?http:/www.MyApplipedia.comhttp:/applipedia.paloaltonetworks.comhttp:/www.Applipedia.comhttp:/applications.paloaltonetworks.comMark for follow upQuestion 22 of 22.When connecting to PAN-OS using HTTPS for the first time, which Tab will you land on first?ObjectsMonitorManagementDeviceNetworkDashboardSupportACCPoliciesMark for follow up BackSave / Return LaterSummary
展开阅读全文