Which type of role-based access is most appropriate for this project?

A super user is tasked with creating administrator accounts for three contractors. For compliance purposes, all three contractors will be working with different device-groups m their hierarchy to deploy policies and objects. Which type of role-based access is most appropriate for this project?A . Create a Dynamic Admin with the...

May 28, 2023 No Comments READ MORE +

Why is the AE interface showing down on the passive firewall?

The Aggregate Ethernet interface is showing down on a passive PA-7050 firewall of an active/passive HA pair. The HA Passive Link State is set to "Auto" under Device > High Availability > General > Active/Passive Settings. The AE interface is configured with LACP enabled and is up only on the...

May 28, 2023 No Comments READ MORE +

The following objects and policies are defined in a device group hierarchy

The following objects and policies are defined in a device group hierarchy A. Address Objects -Shared Address1 -Shared Address2 -Branch Address1 Policies -Shared Policy1 -Branch Policy1 B. Address Objects -Shared Address1 -Shared Address2 -Branch Address1 -DC Address1 Policies -Shared Policy1 -Shared Policy2 -Branch Policy1 C. Address Objects -Shared Address 1...

May 28, 2023 No Comments READ MORE +

How can Panorama help with troubleshooting problems such as high CPU or resource exhaustion on a managed firewall?

How can Panorama help with troubleshooting problems such as high CPU or resource exhaustion on a managed firewall?A . Firewalls send SNMP traps to Panorama when resource exhaustion is detected Panorama generates a system log and can send email alerts B. Panorama provides visibility into all the system and traffic...

May 28, 2023 No Comments READ MORE +

Which three use cases are valid reasons for requiring an Active/Active high availability deployment? (Choose three.)

Which three use cases are valid reasons for requiring an Active/Active high availability deployment? (Choose three.)A . The environment requires real, full-time redundancy from both firewalls at all times B. The environment requires Layer 2 interfaces in the deployment C. The environment requires that both firewalls maintain their own routing...

May 27, 2023 No Comments READ MORE +

What best describes the HA Promotion Hold Time?

What best describes the HA Promotion Hold Time?A . the time that is recommended to avoid an HA failover due to the occasional flapping of neighboring devices B. the time that is recommended to avoid a failover when both firewalls experience the same link/path monitor failure simultaneously C. the time...

May 27, 2023 No Comments READ MORE +

What can the administrator do to correct this issue?

An administrator is attempting to create policies for deployment of a device group and template stack. When creating the policies, the zone drop-down list does not include the required zone. What can the administrator do to correct this issue?A . Enable "Share Unused Address and Service Objects with Devices" in...

May 26, 2023 No Comments READ MORE +

Which log type will help the engineer verify whether packet buffer protection was activated?

Which log type will help the engineer verify whether packet buffer protection was activated?A . Data Filtering B. Configuration C. Threat D. TrafficView AnswerAnswer: C Explanation: The log type that will help the engineer verify whether packet buffer protection was activated is Threat Logs. Threat Logs are logs generated by...

May 26, 2023 No Comments READ MORE +

What is the best solution for the customer?

An existing NGFW customer requires direct interne! access offload locally at each site and iPSec connectivity to all branches over public internet. One requirement is mat no new SD-WAN hardware be introduced to the environment. What is the best solution for the customer?A . Configure a remote network on PAN-OS...

May 25, 2023 No Comments READ MORE +

How should those rules be configured to ensure that they are evaluated with a high priority?

An administrator is building Security rules within a device group to block traffic to and from malicious locations How should those rules be configured to ensure that they are evaluated with a high priority?A . Create the appropriate rules with a Block action and apply them at the top of...

May 25, 2023 No Comments READ MORE +