How can a candidate or running configuration be copied to a host external from Panorama?

How can a candidate or running configuration be copied to a host external from Panorama?A . Commit a running configuration.B . Save a configuration snapshot.C . Save a candidate configuration.D . Export a named configuration snapshot.View AnswerAnswer: D Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/panorama/panorama_adminguide/administer-panorama/back-up- panorama-and-firewall-configurations

April 5, 2021 No Comments READ MORE +

Which GlobalProtect Client connect method requires the distribution and use of machine certificates?

Which GlobalProtect Client connect method requires the distribution and use of machine certificates?A . User-logon (Always on)B . At-bootC . On-demandD . Pre-logonView AnswerAnswer: D

April 5, 2021 No Comments READ MORE +

In the following image from Panorama, why are some values shown in red?

In the following image from Panorama, why are some values shown in red? A . sg2 session count is the lowest compared to the other managed devices.B . us3 has a logging rate that deviates from the administrator-configured thresholds.C . uk3 has a logging rate that deviates from the seven-day...

April 5, 2021 No Comments READ MORE +

Starling with PAN-OS version 9.1, GlobalProtect logging information is now recorded in which firewall log?

Starling with PAN-OS version 9.1, GlobalProtect logging information is now recorded in which firewall log?A . ConfigurationB . GlobalProtectC . AuthenticationD . SystemView AnswerAnswer: C

April 5, 2021 No Comments READ MORE +

How can the Palo Alto Networks NGFW be configured to specifically protect this server against session floods originating from a single IP address?

A client has a sensitive application server in their data center and is particularly concerned about session flooding because of denial of-service attacks. How can the Palo Alto Networks NGFW be configured to specifically protect this server against session floods originating from a single IP address?A . Define a custom...

April 5, 2021 No Comments READ MORE +

What is the purpose of this configuration?

View the GlobalProtect configuration screen capture. What is the purpose of this configuration?A . It configures the tunnel address of all internal clients to an IP address range starting at 192.168.10.1.B . It forces an internal client to connect to an internal gateway at IP address 192.168.10.1.C . It enables...

April 4, 2021 No Comments READ MORE +

A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on TCP port 8080. A Security policy rule allowing access from the Trust zone to the DMZ zone need to be configured to enable we browsing access to the server.

A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on TCP port 8080. A Security policy rule allowing access from the Trust zone to the DMZ zone need to be configured to enable we browsing access to the server. Which...

April 4, 2021 No Comments READ MORE +

Import the certificate.

Import the certificate. 3 Select Import Private Key 4 Click Generate to generate the new certificate B. 1 Select Device > Certificates 2 Select Certificate Profile 3 Generate the certificate 4 Select Block Private Key Export. C. 1 Select Device > Certificates 2 Select Certificate Profile. 3 Generate the certificate...

April 4, 2021 No Comments READ MORE +

Which two subscriptions are available when configuring panorama to push dynamic updates to connected devices? (Choose two.)

Which two subscriptions are available when configuring panorama to push dynamic updates to connected devices? (Choose two.)A . Content-IDB . User-IDC . Applications and ThreatsD . AntivirusView AnswerAnswer: C,D Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/device/device-dynamic-updates

April 4, 2021 No Comments READ MORE +

Which log file can be used to identify SSL decryption failures?

Which log file can be used to identify SSL decryption failures?A . ConfigurationB . ThreatsC . ACCD . TrafficView AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClboCAC

April 4, 2021 No Comments READ MORE +