Which two components are required to configure certificate based, secure authentication to the web Ul?
An administrator needs firewall access on a trusted interface. Which two components are required to configure certificate based, secure authentication to the web Ul? (Choose two)A . certificate profile B. server certificate C. SSH Service Profile D. SSL/TLS Service ProfileView AnswerAnswer: A,D
In the screenshot above which two pieces of information can be determined from the ACC configuration shown? (Choose two)
In the screenshot above which two pieces of information can be determined from the ACC configuration shown? (Choose two) A . The Network Activity tab will display all applications, including FTP. B. Threats with a severity of "high" are always listed at the top of the Threat Name list C....
What are two reasons why the firewall might not use a static route?
An internal system is not functioning. The firewall administrator has determined that the incorrect egress interface is being used. After looking at the configuration, the administrator believes that the firewall is not using a static route. What are two reasons why the firewall might not use a static route? (Choose...
What procedure should you use so Panorama is fully managing the firewall?
A standalone firewall with local objects and policies needs to be migrated into Panorama. What procedure should you use so Panorama is fully managing the firewall?A . Use the "import Panorama configuration snapshot" operation, then perform a device-group commit push with "include device and network templates" B. Use the "import...
Why did the bootstrap process fail for the VM-Series firewall in Azure?
A network-security engineer attempted to configure a bootstrap package on Microsoft Azure, but the virtual machine provisioning process failed. In reviewing the bootstrap package, the engineer only had the following directories: /config, /license and /software Why did the bootstrap process fail for the VM-Series firewall in Azure?A . All public...
An engineer is bootstrapping a VM-Series Firewall Other than the 'config folder, which three directories are mandatory as part of the bootstrap package directory structure? (Choose three.)
An engineer is bootstrapping a VM-Series Firewall Other than the 'config folder, which three directories are mandatory as part of the bootstrap package directory structure? (Choose three.)A . /software B. /opt C. /license D. /content E. /pluginsView AnswerAnswer: A,D
What is the minimum amount of bandwidth the administrator could configure at the compute location?
An administrator allocates bandwidth to a Prisma Access Remote Networks compute location with three remote networks. What is the minimum amount of bandwidth the administrator could configure at the compute location?A . 90Mbps B. 300 Mbps C. 75Mbps D. 50MbpsView AnswerAnswer: D Explanation: The number you specify for the bandwidth...
Which action and packet-capture setting for items of high severity and critical severity best matches Palo Alto Networks best practice?
The manager of the network security team has asked you to help configure the company's Security Profiles according to Palo Alto Networks best practice As part of that effort, the manager has assigned you the Vulnerability Protection profile for the internet gateway firewall. Which action and packet-capture setting for items...
What is a common obstacle for decrypting traffic from guest devices?
An organization wishes to roll out decryption but gets some resistance from engineering leadership regarding the guest network. What is a common obstacle for decrypting traffic from guest devices?A . Guest devices may not trust the CA certificate used for the forward untrust certificate. B. Guests may use operating systems...
Which combination of service and application, and order of Security policy rules, needs to be configured to allow cJeartext web-browsing traffic to this server on tcp/443?
A web server is hosted in the DMZ and the server is configured to listen for incoming connections on TCP port 443 A Security policies rules allowing access from the Trust zone to the DMZ zone needs to be configured to allow web-browsing access. The web server hosts its contents...