Match the network device with the correct User-ID technology
DRAG DROP Match the network device with the correct User-ID technology. View AnswerAnswer: Explanation: Microsoft Exchange C Server monitoring Linux authentication C syslog monitoring Windows Client C client probing Citrix client C Terminal Services agent
Which log setting is correct?
An administrator wishes to follow best practices for logging traffic that traverses the firewall Which log setting is correct?A . Disable all logging B. Enable Log at Session End C. Enable Log at Session Start D. Enable Log at both Session Start and EndView AnswerAnswer: B Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC
Which administrative management services can be configured to access a management interface?
Which administrative management services can be configured to access a management interface?A . HTTP, CLI, SNMP, HTTPS B. HTTPS, SSH telnet SNMP C. SSH: telnet HTTP, HTTPS D. HTTPS, HTTP. CLI, APIView AnswerAnswer: D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/management-interfaces You can use the following user interfaces to manage the Palo Alto Networks firewall:...
Which interface type can use virtual routers and routing protocols?
Which interface type can use virtual routers and routing protocols?A . Tap B. Layer3 C. Virtual Wire D. Layer2View AnswerAnswer: B
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?A . Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL B. Configure a frequency schedule to clear group mapping...
If the application s default deny action is reset-both what action does the firewall take*?
An administrator has configured a Security policy where the matching condition includes a single application and the action is deny If the application s default deny action is reset-both what action does the firewall take*?A . It sends a TCP reset to the client-side and server-side devices B. It silently...
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which the app-ID application will you need to allow in your security policy to use facebook-chat?A . facebook-email B. facebook-base C. facebook D. facebook-chatView AnswerAnswer: B,D
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)A . SAML B. TACACS+ C. LDAP D. KerberosView AnswerAnswer: A,B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication.html
Which Security policy rule is blocking the youtube application?
The firewall sends employees an application block page when they try to access Youtube. Which Security policy rule is blocking the youtube application?A . intrazone-default B. Deny Google C. allowed-security services D. interzone-defaultView AnswerAnswer: D
Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?
Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?A . Prisma SaaS B. Panorama C. AutoFocus D. GlobalProtectView AnswerAnswer: B