Free ACE Exam Braindumps (page: 8)

Page 8 of 56

Which two User-ID methods are used to verify known IP address-to-user mappings? (Choosetwo.)

  1. Client Probing
  2. Server Monitoring
  3. Session Monitoring
  4. Captive Portal

Answer(s): A,B



For which firewall feature should you create forward trust and forward untrust certificates?

  1. SSH decryption
  2. SSL client-side certificate checking
  3. SSL Inbound Inspection decryption
  4. SSL forward proxy decryption

Answer(s): D



If a DNS sinkhole is configured, any sinkhole actions indicating a potentially infected host are recorded in which log type?

  1. Traffic
  2. WildFire Submissions
  3. Data Filtering
  4. Threat

Answer(s): D



Which feature is a dynamic grouping of applications used in Security policy rules?

  1. implicit applications
  2. dependent applications
  3. application group
  4. application filter

Answer(s): C



Page 8 of 56



Post your Comments and Discuss Palo Alto Networks ACE exam with other Community members:

Anonimous commented on December 01, 2023
No experience yet
SPAIN
upvote

Paulie D commented on November 05, 2018
Access to the test materials was simple and fast! Thanks Braindumps.com!
UNITED STATES
upvote