What are the next steps to migrate configuration from the firewalls to Panorama?

A company with already deployed Palo Alto firewalls has purchased their first Panorama server. The security team has already configured all firewalls with the Panorama IP address and added all the firewall serial numbers in Panorama. What are the next steps to migrate configuration from the firewalls to Panorama?A ....

January 13, 2023 No Comments READ MORE +

Which configuration setting or step will allow the firewall to get automatic application signature updates?

An administrator has configured the Palo Alto Networks NGFW’s management interface to connect to the internet through a dedicated path that does not traverse back through the NGFW itself. Which configuration setting or step will allow the firewall to get automatic application signature updates?A . A scheduler will need to...

January 13, 2023 No Comments READ MORE +

Which strategy is consistent with decryption best practices to ensure consistent performance?

A network security engineer wants to prevent resource-consumption issues on the firewall. Which strategy is consistent with decryption best practices to ensure consistent performance?A . Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic B. Use PFS in a...

January 12, 2023 No Comments READ MORE +

Which combination of service and application, and order of Security policy rules, needs to be configured to allow cJeartext web-browsing traffic to this server on tcp/443?

A web server is hosted in the DMZ and the server is configured to listen for incoming connections on TCP port 443 A Security policies rules allowing access from the Trust zone to the DMZ zone needs to be configured to allow web-browsing access. The web server hosts its contents...

January 12, 2023 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

January 12, 2023 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

January 12, 2023 No Comments READ MORE +

An engineer is configuring Packet Buffer Protection on ingress zones to protect from single-session DoS attacks Which sessions does Packet Buffer Protection apply to?

An engineer is configuring Packet Buffer Protection on ingress zones to protect from single-session DoS attacks Which sessions does Packet Buffer Protection apply to?A . It applies to existing sessions and is not global B. It applies to new sessions and is global C. It applies to new sessions and...

January 11, 2023 No Comments READ MORE +

Without changing the existing access to the management interface, how can the engineer fulfill this request?

An engineer needs to permit XML API access to a firewall for automation on a network segment that is routed through a Layer 3 subinterface on a Palo Alto Networks firewall. However, this network segment cannot access the dedicated management interface due to the Security policy. Without changing the existing...

January 11, 2023 No Comments READ MORE +

What command should be used?

An engineer needs to see how many existing SSL decryption sessions are traversing a firewall What command should be used?A . show dataplane pool statistics I match proxy B. debug dataplane pool statistics I match proxy C. debug sessions I match proxy D. show sessions allView AnswerAnswer: B

January 11, 2023 No Comments READ MORE +

Which approach meets the two customer requirements?

SSL Forward Proxy decryption is configured but the firewall uses Untrusted-CA to sign the website https //www important-website com certificate End-users are receiving me "security certificate is not trusted is warning Without SSL decryption the web browser shows that the website certificate is trusted and signed by a well-known certificate...

January 11, 2023 No Comments READ MORE +