Which two actions are available for antivirus security profiles? (Choose two.) A. continue B. allow C. block IP D. alert - answerB. allow D. alert Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) A. User‐Agent B. Safe Search C. URL redirection D. X‐Forward‐For - answerA. User‐Agent D. X‐Forward‐For What are the two components of Denial‐of‐Service Protection? (Choose two.) A. zone protection profile B. DoS protection profile and policy rules C. flood protection D. reconnaissance protection - answerA. zone protection profile B. DoS protection profile and policy rules Which two types of attacks does the PAN‐DB prevent? (Choose two.) A. phishing sites B. HTTP based command‐and‐control C. infected JavaScript D. flood attacks - answerA. phishing sites B. HTTP based command‐and‐control Which two valid URLs can be used in a custom URL category? (Choose two.) A. ww.youtube.** B. www.**.com C. www.youtube.com D. *.youtube.com - answerC. www.youtube.com D. *.youtube.com What are three methods of mapping usernames to IP addresses? (Choose three.) A. Server Monitoring B. Traps C. Minemeld D. syslog E. AutoFocus F. port mapping - answerA. Server Monitoring D. syslog F. port mapping Which type of server profile is used to create group mappings? A. RADIUS B. TACACS+
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |