单选题

While investigating a SYN flood attack, the firewall administrator discovers that legitimate traffic is also being dropped by the DoS profile.

If the DoS profile action is set to Random Early Drop, what should the administrator do to limit the drop to only the attacking sessions?

A、

Enable resources protection under the DoS Protection profile.

B、

Change the SYN flood action from Random Early Drop to SYN cookies.

C、

Increase the activate rate for the SYN flood protection.

D、

Change the DoS Protection profile type from aggregate to classified.

下载APP答题
由4l***db提供 分享 举报 纠错

相关试题

单选题 A network administrator troubleshoots a VPN issue and suspects an IKE Crypto mismatch between peers.

Where can the administrator find the corresponding logs after running a test command to initiate the VPN?

A、

Traffic logs

B、

System logs

C、

Tunnel Inspection logs

D、

Configuration logs

单选题 Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management-plane resources are lightly utilized.

Given the size of this environment, which User-ID collection method is sufficient?

A、

Windows-based agent deployed on each domain controller

B、

PAN-OS integrated agent deployed on the firewall

C、

a syslog listener

D、

Citrix terminal server agent deployed on the network

单选题 An administrator is required to create an application-based Security policy rule to allow Evernote. The Evernote application implicitly uses SSL and web browsing.

What is the minimum the administrator needs to configure in the Security rule to allow only Evernote?

A、

Create an Application Override using TCP ports 443 and 80.

B、

Add the HTPP, SSL, and Evernote applications to the same Security policy.

C、

Add the Evernote application to the Security policy rule, then add a second Security policy rule containing both HTTP and SSL.

D、

Add only the Evernote application to the Security policy rule.

单选题 Which CLI command is used to determine how much disk space is allocated to logs?

A、

debug log-receiver show

B、

show system info

C、

show system logdb-quota

D、

show logging-status

单选题 An administrator has configured a pair of firewalls using high availability in Active/Passive mode.

Link and Path Monitoring is enabled with the Failure Condition set to `any`.

There is one link group configured containing member interfaces ethernet1/1 and ethernet1/2 with a Group Failure Condition set to `all`.

Which HA state will the Active firewall go into if ethernet1/1 link goes down due to a failure?

A、

Active

B、

Passive

C、

Active-Secondary

D、

Non-functional

单选题 Which Panorama feature protects logs against data loss if a Panorama server fails?

A、

Panorama Collector Group with Log Redundancy ensures that no logs are lost if a server fails inside the Collector Group.

B、

Panorama Collector Group automatically ensures that no logs are lost if a server fails inside the Collector Group.

C、

Panorama HA with Log Redundancy ensures that no logs are lost if a server fails inside the HA Cluster.

D、

Panorama HA automatically ensures that no logs are lost if a server fails inside the HA Cluster.

单选题 A network administrator configured a site-to-site VPN tunnel where the peer device will act as initiator. None of the peer addresses are known.

What can the administrator configure to establish the VPN connection?

A、

Use the Dynamic IP address type.

B、

Enable Passive Mode.

C、

Set up certificate authentication.

D、

Configure the peer address as an FQDN.

单选题 Which Panorama mode should be used so that all logs are sent to, and only stored in, Cortex Data Lake?

A、

Legacy

B、

Management Only

C、

Log Collector

D、

Panorama