How should those rules be configured to ensure that they are evaluated with a high priority?
An administrator is building Security rules within a device group to block traffic to and from malicious locations How should those rules be configured to ensure that they are evaluated with a high priority?A . Create the appropriate rules with a Block action and apply them at the top of...
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)A . wildcard server certificate B. enterprise CA certificate C. client certificate D. server certificate E. self-signed CA certificateView AnswerAnswer: B,E Explanation: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-forward-proxy.html
Which statement regarding HA timer settings is true?
Which statement regarding HA timer settings is true?A . Use the Recommended profile for typical failover timer settings B. Use the Moderate profile for typical failover timer settings C. Use the Aggressive profile for slower failover timer settings. D. Use the Critical profile for faster failover timer settings.View AnswerAnswer: A
When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator would turn on the feature inside which type of SD-WAN profile?
When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator would turn on the feature inside which type of SD-WAN profile?A . Certificate profile B. Path Quality profile C. SD-WAN Interface profile D. Traffic Distribution profileView AnswerAnswer: C
When using certificate authentication for firewall administration, which method is used for authorization?
When using certificate authentication for firewall administration, which method is used for authorization?A . Radius B. LDAP C. Kerberos D. LocalView AnswerAnswer: A
Which HA state will the Active firewall go into if ethernet1/1 link goes down due to a failure?
An administrator has configured a pair of firewalls using high availability in Active/Passive mode. Link and Path Monitoring Is enabled with the Failure Condition set to "any." There is one link group configured containing member interfaces ethernet1/1 and ethernet1/2 with a Group Failure Condition set to "all." Which HA state...
What should the enterprise do to use PAN-OS MFA1?
An enterprise information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems However a recent phisning campaign against the organization has prompted Information Security to look for more controls that can secure access to critical assets For users that need to access...
Why did the bootstrap process fail for the VM-Series firewall in Azure?
A network-security engineer attempted to configure a bootstrap package on Microsoft Azure, but the virtual machine provisioning process failed. In reviewing the bootstrap package, the engineer only had the following directories: /config, /license and /software Why did the bootstrap process fail for the VM-Series firewall in Azure?A . All public...
Which setting can the administrator configure on the firewall to log grayware verdicts?
Cortex XDR notifies an administrator about grayware on the endpoints. There are no entries about grayware in any of the logs of the corresponding firewall. Which setting can the administrator configure on the firewall to log grayware verdicts?A . within the log forwarding profile attached to the Security policy rule...
Which three file types does WildFire inline ML analyze?
An administrator wants to enable WildFire inline machine learning. Which three file types does WildFire inline ML analyze? (Choose three.)A . MS Office B. ELF C. APK D. VBscripts E. Powershell scriptsView AnswerAnswer: C, D, E