A firewall administrator has configured User-ID and deployed GlobalProtect, but there is no User-ID showing in the traffic logs.
How can the administrator ensure that User-IDs are populated in the traffic logs?
A. Add the users to the proper Dynamic User Group.
B. Enable Captive Portal on the expected source interfaces.
C. Enable User-ID on the expected trusted zones.
D. Create a Group Mapping for the GlobalProtect Group.
正解:C
質問 2:
An administrator configures a preemptive active-passive high availability (HA) pair of firewalls and configures the HA election settings on firewall-02 with a device priority value of 100, and firewall-01 with a device priority value of 90.
When firewall-01 is rebooted, is there any action taken by the firewalls?
A. Yes - Firewall-02 takes over as the active-primary firewall; firewall-02 remains the active-primary member after firewall-01 becomes functional.
B. No - Neither firewall takes any action because firewall-01 cannot be rebooted when configured with device priority of 90.
C. No - Neither firewall takes any action because firewall-02 is already the active-primary member.
D. Yes - Firewall-02 takes over as the active-primary firewall; firewall-01 takes over as the active-primary member after it becomes functional.
正解:D
質問 3:
After configuring an IPSec tunnel, how should a firewall administrator initiate the IKE phase 1 to see if it will come up?
A. show vpn ipsec-sa tunnel <tunnel_name>
B. test vpn ike-sa gateway <gateway_name>
C. debug ike stat
D. test vpn ipsec-sa tunnel <tunnel_name>
正解:B
質問 4:
If an administrator wants to apply QoS to traffic based on source, what must be specified in a QoS policy rule?
A. Pre-NAT source address
B. Pre-NAT destination address
C. Post-NAT destination address
D. Post-NAT source address
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
What must be taken into consideration when preparing a log forwarding design for all of a customer's deployed Palo Alto Networks firewalls?
A. Traffic and threat logs will not be forwarded unless the relevant Log Forwarding profile is attached to the security rules
B. Traffic and threat logs will not be forwarded unless the relevant Log Forwarding profile is selected in
"Logging and Reporting Settings"
C. App-ID engine will not identify any application traffic unless the "Enable enhanced application logging" option is selected
D. The logs will not contain the names of the identified applications unless the "Enable enhanced application logging" option is selected
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
久保** -
独学で合格できました。嬉しくて泣きそうです。
Pass4Testさん、大変お世話になりました。ありがとうございました!