What are two best practices for incorporating new and modified App-IDs? (Choose two)
What are two best practices for incorporating new and modified App-IDs? (Choose two)A . Configure a security policy rule to allow new App-lDs that might have network-wide impact B. Study the release notes and install new App-IDs if they are determined to have low impact C. Perform a Best Practice...
Which data flow describes redistribution of user mappings?
Which data flow describes redistribution of user mappings?A . User-ID agent to firewall B. firewall to firewall C. Domain Controller to User-ID agent D. User-ID agent to PanoramaView AnswerAnswer: B Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/configure-firewalls-to-redistribute-user-mapping-information https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/deploy-user-id-in-a-large-scale-network/redistribute-user-mappings-and-authentication-timestamps/firewall-deployment-for-user-id-redistribution.html#ide3661b46-4722-4936-bb9b-181679306809
Which option will help the customer?
A client wants to detect the use of weak and manufacturer-default passwords for loT devices. Which option will help the customer?A . Configure a Data Filtering profile with alert mode. B. Configure an Antivirus profile with alert mode. C. Configure a Vulnerability Protection profile with alert mode D. Configure an...
If Panorama pushes the configuration of a dynamic update schedule to managed firewalls, but the configuration does not appear, what is the root cause?
An administrator has 750 firewalls. The administrator's central-management Panorama instance deploys dynamic updates to the firewalls. The administrator notices that the dynamic updates from Panorama do not appear on some of the firewalls. If Panorama pushes the configuration of a dynamic update schedule to managed firewalls, but the configuration does...
Which three firewall multi-factor authentication factors are supported by PAN-OS? (Choose three)
Which three firewall multi-factor authentication factors are supported by PAN-OS? (Choose three)A . SSH key B. User logon C. Short message service D. One-Time Password E. PushView AnswerAnswer: D
Which statement is correct about the configuration of the interfaces assigned to an aggregate interface group?
An engineer wants to configure aggregate interfaces to increase bandwidth and redundancy between the firewall and switch. Which statement is correct about the configuration of the interfaces assigned to an aggregate interface group?A . They can have a different bandwidth. B. They can have a different interface type such as...
How does adding the WildFire subscription improve the security posture of the organization1?
An administrator has a PA-820 firewall with an active Threat Prevention subscription The administrator is considering adding a WildFire subscription. How does adding the WildFire subscription improve the security posture of the organization1?A . Protection against unknown malware can be provided in near real-time B. WildFire and Threat Prevention combine...
What is the function of a service route?
What is the function of a service route?A . The service route is the method required to use the firewall's management plane to provide services to applications B. The service packets enter the firewall on the port assigned from the external service. The server sends its response to the configured...
What is the best description of the HA4 Keep-Alive Threshold (ms)?
What is the best description of the HA4 Keep-Alive Threshold (ms)?A . the maximum interval between hello packets that are sent to verify that the HA functionality on the other firewall is operational. B. The time that a passive or active-secondary firewall will wait before taking over as the active...
What is a common obstacle for decrypting traffic from guest devices?
An organization wishes to roll out decryption but gets some resistance from engineering leadership regarding the guest network. What is a common obstacle for decrypting traffic from guest devices?A . Guest devices may not trust the CA certificate used for the forward untrust certificate. B. Guests may use operating systems...