Free ACE Exam Braindumps (page: 8)

Page 7 of 56

The Threat log records events from which three Security Profiles? (Choose three.)

  1. Vulnerability Protection
  2. Antivirus
  3. URL Filtering
  4. WildFire Analysis
  5. File Blocking
  6. Anti-Spyware

Answer(s): B,C,D



When SSL traffic passes through the firewall, which component is evaluated first?

  1. Decryption policy
  2. Decryption Profile
  3. Security policy
  4. Decryption exclusions list

Answer(s): C



SSL Inbound Inspection requires that the firewall be configured with which two components?(Choose two.)

  1. client's digital certificate
  2. client's public key
  3. server's digital certificate
  4. server's private key

Answer(s): A,B



An Interface Management Profile can be attached to which two interface types? (Choose two.)

  1. Loopback
  2. Virtual Wire
  3. Layer 2
  4. Layer 3
  5. Tap

Answer(s): A,B,D






Post your Comments and Discuss Palo Alto Networks ACE exam with other Community members:

ACE Discussions & Posts