When adding an application in a Policy-based Forwarding rule, only a subset of the entire App-ID database is represented. Why would this be?
A. Policy-based forwarding can only indentify certain applications at this stage of the packet flow, as the majority of applications are only identified once the session is created.
B. Policy-based forwarding rules require that a companion Security policy rule, allowing the needed Application traffic, must first be created.
C. The license for the Application ID database is no longer valid.
D. A custom application must first be defined before it can be added to a Policy-based forwarding rule.
When configuring Admin Roles for Web UI access, what are the available access levels?
A. Enable and Disable only
B. None, Superuser, Device Administrator
C. Allow and Deny only
D. Enable, Read-Only and Disable
A "Continue" action can be configured on the following Security Profiles:
A. URL Filtering, File Blocking, and Data Filtering
B. URL Filteringn
C. URL Filtering and Antivirus
D. URL Filtering and File Blocking
Which of the following are necessary components of a GlobalProtect solution?
A. GlobalProtect Gateway, GlobalProtect Agent, GlobalProtect Portal
B. GlobalProtect Gateway, GlobalProtect Agent, GlobalProtect Server
C. GlobalProtect Gateway, GlobalProtect NetConnect, GlobalProtect Agent, GlobalProtect Portal, GlobalProtect Server
D. GlobalProtect NetConnect, GlobalProtect Agent, GlobalProtect Portal, GlobalProtect Server
Which two user mapping methods are supported by the User-ID integrated agent? (Choose two.)
A. LDAP Filters
B. WMI probing
C. NetBIOS Probing
D. Client Probing
In an HA configuration, which two failure detection methods rely on ICMP ping? (Choose two.)
A. hellos
B. link groups
C. path groups
D. heartbeats
The WildFire Portal website supports which three operations? (Choose three.)
A. report incorrect verdicts
B. upload files to WildFire for analysis
C. request firewall WildFire licenses
D. view WildFire verdicts
In a Security Profile, which action does a firewall take when the profiles action is configured as Reset Server? (Choosetwo.)
A. The traffic responder is reset.
B. The client is reset.
C. For UDP sessions, the connection is reset.
D. For UDP sessions, the connection is dropped.
What option should be configured when using User-ID
A. Enable User-ID per zone
B. Enable User-ID per interface
C. Enable User-ID per Security Policy
D. None of the above
Which fields can be altered in the default Vulnerability profile?
A. Severity
B. Category
C. CVE
D. None