Place the steps in the WildFire process workflow in their correct order
DRAG DROP Place the steps in the WildFire process workflow in their correct order. View AnswerAnswer: Explanation: Timeline Description automatically generated https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/wildfire-overview/about-wildfire.html
Which two statements correctly describe Session 380280? (Choose two.)
Which two statements correctly describe Session 380280? (Choose two.) A . The session went through SSL decryption processing. B. The session has ended with the end-reason unknown. C. The application has been identified as web-browsing. D. The session did not go through SSL decryption processing.View AnswerAnswer: A,C
Which two actions can be taken on the firewall to allow the dropped traffic permanently?
A network engineer has discovered that asymmetric routing is causing a Palo Alto Networks firewall to drop traffic. The network architecture cannot be changed to correct this. Which two actions can be taken on the firewall to allow the dropped traffic permanently? (Choose two.)A . Navigate to Network > Zone...
What is a common obstacle for decrypting traffic from guest devices?
An organization wishes to roll out decryption but gets some resistance from engineering leadership regarding the guest network. What is a common obstacle for decrypting traffic from guest devices?A . Guest devices may not trust the CA certificate used for the forward untrust certificate. B. Guests may use operating systems...
Which three use cases are valid reasons for requiring an Active/Active high availability deployment? (Choose three.)
Which three use cases are valid reasons for requiring an Active/Active high availability deployment? (Choose three.)A . The environment requires real, full-time redundancy from both firewalls at all times B. The environment requires Layer 2 interfaces in the deployment C. The environment requires that both firewalls maintain their own routing...
Given the size of this environment, which User-ID collection method is sufficient?
Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management-plane resources are lightly utilized. Given the size of this environment, which User-ID collection method is sufficient?A . Citrix terminal server agent deployed on the network B. Windows-based...
Which action and packet-capture setting for items of high severity and critical severity best matches Palo Alto Networks best practice?
The manager of the network security team has asked you to help configure the company's Security Profiles according to Palo Alto Networks best practice As part of that effort, the manager has assigned you the Vulnerability Protection profile for the internet gateway firewall. Which action and packet-capture setting for items...
In the screenshot above which two pieces of information can be determined from the ACC configuration shown? (Choose two)
In the screenshot above which two pieces of information can be determined from the ACC configuration shown? (Choose two) A . The Network Activity tab will display all applications, including FTP. B. Threats with a severity of "high" are always listed at the top of the Threat Name list C....
Which function is handled by the management plane (control plane) of a Palo Alto Networks firewall?
Which function is handled by the management plane (control plane) of a Palo Alto Networks firewall?A . signature matching for content inspection B. IPSec tunnel standup C. Quality of Service D. loggingView AnswerAnswer: D
What are two reasons why the firewall might not use a static route?
An internal system is not functioning. The firewall administrator has determined that the incorrect egress interface is being used. After looking at the configuration, the administrator believes that the firewall is not using a static route. What are two reasons why the firewall might not use a static route? (Choose...