Which data flow best describes redistribution of user mappings?
An engineer needs to redistribute User-ID mappings from multiple data centers. Which data flow best describes redistribution of user mappings?A . Domain Controller to User-ID agent B. User-ID agent to Panorama C. User-ID agent to firewall D. firewall to firewallView AnswerAnswer: D
Which log type would provide information about traffic blocked by a Zone Protection profile?
Which log type would provide information about traffic blocked by a Zone Protection profile?A . Data Filtering B. IP-Tag C. Traffic D. ThreatView AnswerAnswer: C
What procedure should you use so Panorama is fully managing the firewall?
A standalone firewall with local objects and policies needs to be migrated into Panorama. What procedure should you use so Panorama is fully managing the firewall?A . Use the "import Panorama configuration snapshot" operation, then perform a device-group commit push with "include device and network templates" B. Use the "import...
Why did the bootstrap process fail for the VM-Series firewall in Azure?
A network-security engineer attempted to configure a bootstrap package on Microsoft Azure, but the virtual machine provisioning process failed. In reviewing the bootstrap package, the engineer only had the following directories: /config, /license and /software Why did the bootstrap process fail for the VM-Series firewall in Azure?A . All public...
Which three items are import considerations during SD-WAN configuration planning? (Choose three.)
Which three items are import considerations during SD-WAN configuration planning? (Choose three.)A . link requirements B. the name of the ISP C. IP Addresses D. branch and hub locationsView AnswerAnswer: A,C,D Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/sd-wan-overview/plan-sd-wan-configuration
What command could the engineer run to see the current state of the BGP state between the two devices?
A network security engineer is attempting to peer a virtual router on a PAN-OS firewall with an external router using the BGP protocol. The peer relationship is not establishing. What command could the engineer run to see the current state of the BGP state between the two devices?A . show...
Which two components are required to configure certificate based, secure authentication to the web Ul?
An administrator needs firewall access on a trusted interface. Which two components are required to configure certificate based, secure authentication to the web Ul? (Choose two)A . certificate profile B. server certificate C. SSH Service Profile D. SSL/TLS Service ProfileView AnswerAnswer: A,D
While analyzing the Traffic log, you see that some entries show "unknown-tcp" in the Application column What best explains these occurrences?
While analyzing the Traffic log, you see that some entries show "unknown-tcp" in the Application column What best explains these occurrences?A . A handshake took place, but no data packets were sent prior to the timeout. B. A handshake took place; however, there were not enough packets to identify the...
What is the minimum amount of bandwidth the administrator could configure at the compute location?
An administrator allocates bandwidth to a Prisma Access Remote Networks compute location with three remote networks. What is the minimum amount of bandwidth the administrator could configure at the compute location?A . 90Mbps B. 300 Mbps C. 75Mbps D. 50MbpsView AnswerAnswer: D Explanation: The number you specify for the bandwidth...
How will the rule order populate once pushed to the firewall?
the firewall's device group as post-rules How will the rule order populate once pushed to the firewall?A . shared device group policies, firewall device group policies. local policies. B. firewall device group policies, local policies. shared device group policies C. shared device group policies. local policies, firewall device group policies...