What file type upload is supported as part of the basic WildFire service?
What file type upload is supported as part of the basic WildFire service?A . PEB . BATC . VBSD . ELFView AnswerAnswer: A
If an administrator wants to decrypt SMTP traffic and possesses the server’s certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?
If an administrator wants to decrypt SMTP traffic and possesses the server’s certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?A . TLS Bidirectional InspectionB . SSL Inbound InspectionC . SSH Forward ProxyD . SMTP Inbound DecryptionView AnswerAnswer: B Explanation: Reference:...
Which event will happen if an administrator uses an Application Override Policy?
Which event will happen if an administrator uses an Application Override Policy?A . Threat-ID processing time is decreased.B . The Palo Alto Networks NGFW stops App-ID processing at Layer 4.C . The application name assigned to the traffic by the security rule is written to the Traffic log.D . App-ID...
Where can an administrator see both the management plane and data plane CPU utilization in the WebUI?
Where can an administrator see both the management plane and data plane CPU utilization in the WebUI?A . System logB . CPU Utilization widgetC . Resources widgetD . System Utilization logView AnswerAnswer: C Explanation: System Resources (widget)Displays the Management CPU usage, Data Plane usage, and the Session Count (the number...
Which certificates can be used as a Forwarded Trust certificate?
Refer to the exhibit. Which certificates can be used as a Forwarded Trust certificate?A . Certificate from Default Trust Certificate AuthoritiesB . Domain Sub-CAC . Forward_TrustD . Domain-Root-CertView AnswerAnswer: B
Which logs enable a firewall administrator to determine whether a session was decrypted?
Which logs enable a firewall administrator to determine whether a session was decrypted?A . Correlated EventB . TrafficC . DecryptionD . Security PolicyView AnswerAnswer: B
Which configuration setting or step will allow the firewall to get automatic application signature updates?
An administrator has configured the Palo Alto Networks NGFW’s management interface to connect to the internet through a dedicated path that does not traverse back through the NGFW itself. Which configuration setting or step will allow the firewall to get automatic application signature updates?A . A scheduler will need to...
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?A . Both SSH keys and SSL certificates must be generated.B . No prerequisites are required.C . SSH keys must be manually generated.D . SSL certificates must be generated.View AnswerAnswer: B Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/decryption/configure-ssh-proxy “In an SSH Proxy configuration,...
When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?
When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?A . Load named configuration snapshotB . Load configuration versionC . Save candidate configD . Export device stateView AnswerAnswer: D
How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all existing monitoring/ security platforms?
Refer to exhibit. An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported excessive traffic on the corporate WAN. How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all existing monitoring/ security...