In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)
Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)
All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.
Complete the empty field in the Security policy using an application object to permit only this type of access.
Source Zone: Internal -
Destination Zone: DMZ Zone -
Application: __________
Service: application-default -
Action: allow
What two actions can be taken when implementing an exception to an External Dynamic List? (Choose two.)
Review the Screenshot:
Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the
SERVER zone to the DMZ on SSH only.
Which rule group enables the required traffic?
A)
B)
C)
D)
An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)
An administrator is reviewing the Security policy rules shown in the screenshot below.
Which statement is correct about the information displayed?
Which type of address object is www.paloaltonetworks.com?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Paloalto Networks Free Exams |
---|
![]() |