What are two benefits of using an explicit proxy method versus a transparent proxy method?
An organization conducts research on the benefits of leveraging the Web Proxy feature of PAN-OS 11.0. What are two benefits of using an explicit proxy method versus a transparent proxy method? (Choose two.)A . No client configuration is required for explicit proxy, which simplifies the deployment complexity. B. Explicit proxy...
What can be configured on one pair of firewalls to modify the MAC addresses so they are no longer in conflict?
An administrator has two pairs of firewalls within the same subnet. Both pairs of firewalls have been configured to use High Availability mode with Active/Passive. The ARP tables for upstream routes display the same MAC address being shared for some of these firewalls. What can be configured on one pair...
Which three actions can Panorama perform when deploying PAN-OS images to its managed devices? (Choose three.)
Which three actions can Panorama perform when deploying PAN-OS images to its managed devices? (Choose three.)A . upload-only B. upload and install and reboot C. verify and install D. upload and install E. install and rebootView AnswerAnswer: C,D,E
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)A . wildcard server certificate B. enterprise CA certificate C. client certificate D. server certificate E. self-signed CA certificateView AnswerAnswer: B,E Explanation: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-forward-proxy.html
Which dynamic role does the administrator assign to the new-hire colleague?
An administrator wants to grant read-only access to all firewall settings, except administrator accounts, to a new-hire colleague in the IT department. Which dynamic role does the administrator assign to the new-hire colleague?A . Device administrator (read-only) B. System administrator (read-only) C. Firewall administrator (read-only) D. Superuser (read-only)View AnswerAnswer: A
How can the administrator create an exception for this particular file?
An administrator discovers that a file blocked by the WildFire inline ML feature on the firewall is a false-positive action. How can the administrator create an exception for this particular file?A . Add partial hash and filename in the file section of the WildFire inline ML tab of the Antivirus...
II you configured each choice to block the same URL, then which choice would be evaluated last in the processing order to block access to the URL1?
Four configuration choices are listed, and each could be used to block access to a specific URL II you configured each choice to block the same URL, then which choice would be evaluated last in the processing order to block access to the URL1?A . PAN-DB URL category in URL...
What are three supported functions on the VWire interface?
An engineer wants to implement the Palo Alto Networks firewall in VWire mode on the internet gateway and wants to be sure of the functions that are supported on the vwire interface What are three supported functions on the VWire interface? (Choose three)A . NAT B. QoS C. IPSec D....
Which certificate is the best choice to configure as an SSL Forward Trust certificate?
A network security administrator wants to begin inspecting bulk user HTTPS traffic flows egressing out of the internet edge firewall. Which certificate is the best choice to configure as an SSL Forward Trust certificate?A . A self-signed Certificate Authority certificate generated by the firewall B. A Machine Certificate for the...
How should the engineer proceed?
During the process of developing a decryption strategy and evaluating which websites are required for corporate users to access, several sites have been identified that cannot be decrypted due to technical reasons. In this case, the technical reason is unsupported ciphers. Traffic to these sites will therefore be blocked if...