What are three important considerations during SD-WAN configuration planning? (Choose three.)
What are three important considerations during SD-WAN configuration planning? (Choose three.)A . branch and hub locationsB . dynamic routingC . link requirementsD . connection throughputE . IP AddressesView AnswerAnswer: ACE
PBF can address which two scenarios? (Choose two.)
PBF can address which two scenarios? (Choose two.)A . providing application connectivity the primary circuit failsB . enabling the firewall to bypass Layer 7 inspectionC . forwarding all traffic by using source port 78249 to a specific egress interfaceD . routing FTP to a backup ISP link to save bandwidth...
What is the best description of the HA4 Keep-alive Threshold (ms)?
What is the best description of the HA4 Keep-alive Threshold (ms)?A . the time that a passive or active-secondary firewall will wait before taking over as the active or active-primary firewallB . the timeframe that the local firewall waits before going to Active state when another cluster member is preventing...
How should you configure the firewall to allow access to any office-suite application?
You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Filter and name it Office Programs, then filter it on the business-systems category.B . Create an Application Group and add...
When an in-band data port is set up to provide access to required services, what is required for an interface that is assigned to service routes?
When an in-band data port is set up to provide access to required services, what is required for an interface that is assigned to service routes?A . You must set the interface to Layer 2, Layer 3, or virtual wire.B . You must enable DoS and zone protection.C . The...
Which two components are required on the firewall to configure certificate-based administrator authentication to the web Ul?
A remote administrator needs firewall access on an untrusted interface. Which two components are required on the firewall to configure certificate-based administrator authentication to the web Ul? (Choose two)A . certificate profileB . server certificateC . client certificateD . certificate authority (CA) certificateView AnswerAnswer: AD
Given this scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
Your company has 10 Active Directory domain controllers spread across multiple WAN links. All users authenticate to Active Directory. Each link has substantial network bandwidth to support all mission-critical applications. The firewall's management plane is highly utilized. Given this scenario, which type of User-ID agent is considered a best practice...
Which statement regarding HA timer settings is true?
Which statement regarding HA timer settings is true?A . Use the Aggressive profile for slower failover timer settings.B . Use the Moderate profile for typical failover timer settings.C . Use the Critical profile for faster failover timer settings.D . Use the Recommended profile for typical failover timer settings.View AnswerAnswer: D
Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?
An administrator cannot see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama? A) B) C) D) A...
How can the issue be corrected?
Refer to the image. An administrator is tasked with correcting an NTP service configuration for firewalls that cannot use the Global template NTP servers. The administrator needs to change the IP address to a preferable server for this template stack but cannot impact other template stacks. How can the issue...