Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 7.0 Version
Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 7.0 Version
Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 7.0 Version
ACE Exam
Question 1 of 50.
What will the user experience when attempting to access a blocked hacking website through a translation service such
as Google Translate or Bing Translator?
A “Blocked” page response when the URL filtering policy to block is enforced.
Question 2 of 50.
Palo Alto Networks firewalls support the use of both Dynamic (built-in user roles) and Role-Based (customized user
roles) for Administrator Accounts.
True False
Question 3 of 50.
The "Drive-By Download" protection feature, under File Blocking profiles in Content-ID, provides:
The ability to use Authentication Profiles, in order to protect against unwanted downloads.
Question 4 of 50.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 2 de 13
Considering the information in the screenshot above, what is the order of evaluation for this URL Filtering Profile?
URL Categories (BrightCloud or PAN-DB), Custom Categories, Block List, Allow List.
Block List, Allow List, Custom Categories, URL Categories (BrightCloud or PAN-DB).
Allow List, Block List, Custom Categories, URL Categories (BrightCloud or PAN-DB).
Block List, Allow List, URL Categories (BrightCloud or PAN-DB), Custom Categories.
Question 5 of 50.
An Authentication Profile.
An Authentication Sequence.
Question 6 of 50.
In PAN-OS 6.0 and later, which of these items may be used as match criterion in a Policy-Based Forwarding Rule?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 3 de 13
(Choose 3.)
Destination Zone
Source User
Source Zone
Destination Application
Question 7 of 50.
As a Palo Alto Networks firewall administrator, you have made unwanted changes to the Candidate configuration. These
changes may be undone by Device > Setup > Operations > Configuration Management>....and then what operation?
Question 8 of 50.
Taking into account only the information in the screenshot above, answer the following question. Which applications
will be allowed on their standard ports? (Select all correct answers.)
Gnutella
Skype
BitTorrent
SSH
Question 9 of 50.
Which of the following would be a reason to use the PAN-OS XML API to communicate with a Palo Alto Networks
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 4 de 13
firewall?
To allow the firewall to push User-ID information to a Network Access Control (NAC) device.
Question 10 of 50.
What is the maximum file size of .EXE files uploaded from the firewall to WildFire?
Configurable up to 2 megabytes.
Always 2 megabytes.
Always 10 megabytes.
Configurable up to 10 megabytes.
Question 11 of 50.
When troubleshooting Phase 1 of an IPsec VPN tunnel, which location and log will be most informative?
Question 12 of 50.
The Uplink
Question 13 of 50.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 5 de 13
After the installation of the Threat Prevention license, the firewall must be rebooted.
True False
Question 14 of 50.
Question 15 of 50.
True or False: The WildFire Analysis Profile can only be configured to send unknown files to the WildFire Public Cloud
only.
True False
Question 16 of 50.
Numbers that specify the order in which security policies are evaluated.
Numbers on a scale of 0 to 99 that specify priorities when two or more rules are in conflict.
Numbers created to make it easier for users to discuss a complicated or difficult sequence of rules.
Question 17 of 50.
Question 18 of 50.
Reconnaissance Protection is a feature used to protect the Palo Alto Networks firewall from port scans. To enable this
feature within the GUI go to…
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 6 de 13
Question 19 of 50.
After the installation of a new version of PAN-OS, the firewall must be rebooted.
True False
Question 20 of 50.
Question 21 of 50.
Which of the following CANNOT use the source user as a match criterion?
Anti-virus Profile
Secuirty Policies
QoS
DoS Protection
Question 22 of 50.
When using remote authentication for users (LDAP, RADIUS, Active Directory, etc.), what must be done to allow a user
to authenticate through multiple methods?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 7 de 13
Question 23 of 50.
When configuring a Security Policy Rule based on FQDN Address Objects, which of the following statements is True?
The firewall resolves the FQDN first when the policy is committed, and resolves the FQDN again at DNS TTL expiration.
The firewall resolves the FQDN first when the policy is committed, and resolves the FQDN again each time Security Profiles
are evaluated.
In order to create FQDN-based objects, you need to manually define a list of associated IP addresses.
Question 24 of 50.
When configuring a Decryption Policy rule, which option allows a firewall administrator to control SSHv2 tunneling in
policies by specifying the SSH-tunnel App-ID?
SSH Proxy
Question 25 of 50.
All of the interfaces on a Palo Alto Networks device must be of the same interface type.
True False
Question 26 of 50.
Select the implicit rules that are applied to traffic that fails to match any administrator-defined Security Policies.
(Choose all rules that are correct.)
Intra-zone traffic is allowed
Question 27 of 50.
Using the API in PAN-OS 6.1, WildFire subscribers can upload up to how many samples per day?
500
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 8 de 13
10
50
1000
Question 28 of 50.
WildFire may be used for identifying which of the following types of traffic?
OSPF
DHCP
RIPv2
Malware
Question 29 of 50.
Traffic going to a public IP address is being translated by a Palo Alto Networks firewall to an internal server’s private IP
address. Which IP address should the Security Policy use as the "Destination IP" in order to allow traffic to the server?
Question 30 of 50.
Which of the Dynamic Updates listed below are issued on a daily basis? (Select all correct answers.)
Anti-virus
Applications
Question 31 of 50.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 9 de 13
User-ID must be enabled for the source zone of the traffic that is to be identified.
Question 32 of 50.
Choose the best answer: In PAN-OS, the WildFire Subscription Service allows updates for malware signatures to be
distributed as often as…
Once an hour
Once a day
Once a week
Question 33 of 50.
No-Decrypt
Decrypt
Any
None
Question 34 of 50.
With IKE Phase 1, each device is identified to the other by a Peer ID. In most cases, the Peer ID is just the public IP
address of the device. In situations where the public IP address is not static, the Peer ID can be a text value.
True False
Question 35 of 50.
Which of the following platforms supports the Decryption Port Mirror function?
PA-3000
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 10 de 13
VM-Series 100
PA-2000
PA-4000
Question 36 of 50.
When an interface is in Tap mode and a Policy’s action is set to “block”, the interface will send a TCP reset.
True False
Question 37 of 50.
Which of the following services are enabled on the MGT interface by default? (Select all correct answers.)
HTTPS
SSH
Telnet
HTTP
Question 38 of 50.
In PAN-OS 7.0 which of the available choices serves as an alert warning by defining patterns of suspicious traffic and
network anomalies that may indicate a host has been compromised?
Custom Signatures
Correlation Events
App-ID Signatures
Correlation Objects
Question 39 of 50.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 11 de 13
Question 40 of 50.
When configuring the firewall for User-ID, what is the maximum number of Domain Controllers that can be configured?
10
150
50
100
Question 41 of 50.
Virtual Systems
Virtual Switch
Virtual Router
Question 42 of 50.
What are two sources of information for determining whether the firewall has been successful in communicating with an
external User-ID Agent?
System Logs and the indicator light under the User-ID Agent settings in the firewall.
Question 43 of 50.
True or False: The PAN-DB URL Filtering Service is offered as both a Private Cloud solution and a Public Cloud
solution.
True False
Question 44 of 50.
What is the default DNS sinkhole address used by the Palo Alto Networks Firewall to cut off communication?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 12 de 13
Question 45 of 50.
Besides selecting the Heartbeat Backup option when creating an Active-Passive HA Pair, which of the following also
prevents "Split-Brain"?
Configuring a backup HA2 link that points to the MGT interface of the other device in the pair.
Creating a custom interface under Service Route Configuration, and assigning this interface as the backup HA2 link.
Question 46 of 50.
In order to route traffic between Layer 3 interfaces on the Palo Alto Networks firewall, you need a:
Virtual Router
VLAN
Virtual Wire
Security Profile
Question 47 of 50.
When configuring Admin Roles for Web UI access, what are the available access levels?
Question 48 of 50.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016
Realize Your Potential: paloaltonetworks Página 13 de 13
A specific program detected within an identified stream that can be detected, monitored, and/or blocked.
A combination of port and protocol that can be detected, monitored, and/or blocked.
A file installed on a local machine that can be detected, monitored, and/or blocked.
Web-based traffic from a specific IP address that can be detected, monitored, and/or blocked.
Question 49 of 50.
When using Config Audit, the color yellow indicates which of the following?
Question 50 of 50.
What will be the user experience when the safe search option is NOT enabled for Google search but the firewall has
"Safe Search Enforcement" Enabled?
The Firewall will enforce Safe Search if the URL filtering license is still valid.
The user will be redirected to a different search site that is specified by the firewall administrator.
A block page will be presented with instructions on how to set the strict Safe Search option for the Google search.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=e9d5a4ee-d001-44... 30/07/2016