PrepAway - Latest Free Exam Questions & Answers

Category: Palo Alto ACE

Exam Palo Alto ACE: Accredited Configuration Engineer (ACE)

When configuring UserID on a Palo Alto Networks firewall, what is the proper procedure to limit User mappings

When configuring UserID on a Palo Alto Networks firewall, what is the proper procedure to limit User mappings to a particular DHCP scope? A. In the zone in which User Identification is enabled, create a User Identification ACL Include List using the same IP ranges as those allocated in the DHCP scope. B. Under the […]

What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for t

What Security Profile type must be configured to send files to the WildFire cloud, and with what choices for the action setting? A. A File Blocking profile with possible actions of “Forward” or “Continue and Forward”. B. A Data Filtering profile with possible actions of “Forward” or “Continue and Forward”. C. A Vulnerability Protection profile […]

What are two sources of information for determining whether the firewall has been successful in communicating

What are two sources of information for determining whether the firewall has been successful in communicating with an external UserID Agent? A. System Logs and the indicator light under the UserID B. Agent settings in the firewall. C. Traffic Logs and Authentication Logs. D. System Logs and an indicator light on the chassis. E. System […]

As the Palo Alto Networks Administrator responsible for UserID, you need to enable mapping of network users th

As the Palo Alto Networks Administrator responsible for UserID, you need to enable mapping of network users that do not signin using LDAP. Which information source would allow for reliable UserID mapping while requiring the least effort to configure? A. Active Directory Security Logs B. WMI Query C. Captive Portal D. Exchange CAS Security logs

When you have created a Security Policy Rule that allows Facebook, what must you do to block all other webbrow

When you have created a Security Policy Rule that allows Facebook, what must you do to block all other webbrowsing traffic? A. Create an additional rule that blocks all other traffic. B. When creating the policy, ensure that webbrowsing is included in the same rule. C. Ensure that the Service column is defined as “applicationdefault” […]


Page 2 of 3123