Using the above screenshot of the ACC, what is the best method to set a global filter, narrow down Blocked User Activity, and locate the user(s) that could be compromised by a botnet?
Refer to the exhibit. Using the above screenshot of the ACC, what is the best method to set a global filter, narrow down Blocked User Activity, and locate the user(s) that could be compromised by a botnet?A . Click the hyperlink for the Zero Access.Gen threat.B . Click the left...
Which type of zone will allow different virtual systems to communicate with each other?
Which type of zone will allow different virtual systems to communicate with each other?A . TapB . ExternalC . Virtual WireD . TunnelView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/virtual-systems/communication-between-virtual-systems/inter-vsys-traffic-that-remains-within-the-firewall/external-zone
Why would a traffic log list an application as "not-applicable”?
Why would a traffic log list an application as "not-applicable”?A . The firewall denied the traffic before the application match could be performed.B . The TCP connection terminated without identifying any application dataC . There was not enough application data after the TCP connection was establishedD . The application is...
Which action should be taken to enable the firewalls to send their pre-existing logs to Panorama?
An administrator is using Panorama to manage multiple firewalls. After upgrading all devices to the latest PAN-OS software, the administrator enables log forwarding from the firewalls to Panorama. However, pre-existing logs from the firewalls are not appearing in Panorama. Which action should be taken to enable the firewalls to send...
From the Monitor tab of the firewall GUI, how can the administrator identify which NAT policy is in use for a traffic flow?
An administrator needs to identify which NAT policy is being used for internet traffic. From the Monitor tab of the firewall GUI, how can the administrator identify which NAT policy is in use for a traffic flow?A . Click Session Browser and review the session details.B . Click Traffic view...
Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port?
Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port? A . The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-1.B . The firewall will allow HTTP Telnet, HTTPS,...
Given the following snippet of a WildFire submission log did the end-user get access to the requested information and why or why not?
Given the following snippet of a WildFire submission log did the end-user get access to the requested information and why or why not? A . Yes, because the action is set to alertB . No, because this is an example from a defeated phishing attackC . No, because the severity...
Which log type will help the engineer verify whether packet buffer protection was activated?
An administrator troubleshoots an issue that causes packet drops. Which log type will help the engineer verify whether packet buffer protection was activated?A . Data FilteringB . ConfigurationC . ThreatD . TrafficView AnswerAnswer: C Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PNGFCA4
What can be used as an Action when creating a Policy-Based Forwarding (PBF) policy?
What can be used as an Action when creating a Policy-Based Forwarding (PBF) policy?A . DenyB . DiscardC . AllowD . Next VRView AnswerAnswer: B Explanation: Set the Action to take when matching a packet: Forward―Directs the packet to the specified Egress Interface. Forward to VSYS (On a firewall enabled...
Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?
During the implementation of SSL Forward Proxy decryption, an administrator imports the company's Enterprise Root CA and Intermediate CA certificates onto the firewall. The company's Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise...