In the following image from Panorama, why are some values shown in red?
In the following image from Panorama, why are some values shown in red? A . sg2 session count is the lowest compared to the other managed devices.B . us3 has a logging rate that deviates from the administrator-configured thresholds.C . uk3 has a logging rate that deviates from the seven-day...
Which three file types can be forwarded to WildFire for analysis as a part of the basic WildFire service? (Choose three.)
Which three file types can be forwarded to WildFire for analysis as a part of the basic WildFire service? (Choose three.)A . dllB . exeC . srcD . apkE . pdfF . jarView AnswerAnswer: ABC Explanation: Reference: https://www.paloaltonetworks.com/documentation/80/wildfire/wf_admin/wildfire-overview/wildfire-file-type-support
Which User-ID mapping solution will map multiple users who are using Citrix to connect to the network and access resources?
An administrator has users accessing network resources through Citrix XenApp 7 x. Which User-ID mapping solution will map multiple users who are using Citrix to connect to the network and access resources?A . Client ProbingB . Terminal Services agentC . GlobalProtectD . Syslog MonitoringView AnswerAnswer: B
Which Captive Portal mode must be configured to support MFA authentication?
Which Captive Portal mode must be configured to support MFA authentication?A . NTLMB . RedirectC . Single Sign-OnD . TransparentView AnswerAnswer: B Explanation: Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/authentication/configure-multi-factor-authentication
Which will be the egress interface if the traffic’s ingress interface is ethernet 1/7 sourcing from 192.168.111.3 and to the destination 10.46.41.113?
Refer to the exhibit. Which will be the egress interface if the traffic’s ingress interface is ethernet 1/7 sourcing from 192.168.111.3 and to the destination 10.46.41.113?A . ethernet1/6B . ethernet1/3C . ethernet1/7D . ethernet1/5View AnswerAnswer: D
Which configuration change should the administrator make?
An administrator needs to determine why users on the trust zone cannot reach certain websites. The only information available is shown on the following image. Which configuration change should the administrator make? A) B) C) D) E) A . Option AB . Option BC . Option CD . Option DE...
If the firewall is configured for credential phishing prevention using the “Domain Credential Filter” method, which login will be detected as credential theft?
If the firewall is configured for credential phishing prevention using the “Domain Credential Filter” method, which login will be detected as credential theft?A . Mapping to the IP address of the logged-in user.B . First four letters of the username matching any valid corporate username.C . Using the same user’s...
Which feature can provide NGFWs with User-ID mapping information?
Which feature can provide NGFWs with User-ID mapping information?A . Web CaptchaB . Native 802.1q authenticationC . GlobalProtectD . Native 802.1x authenticationView AnswerAnswer: C
How can the firewall be configured automatically disable the PBF rule if the next hop goes down?
A user’s traffic traversing a Palo Alto Networks NGFW sometimes can reach http://www.company.com. At other times the session times out. The NGFW has been configured with a PBF rule that the user’s traffic matches when it goes to http://www.company.com. How can the firewall be configured automatically disable the PBF rule...
Based on the information shown in the image, which NAT rule will forward web-browsing traffic correctly?
An administrator wants multiple web servers in the DMZ to receive connections initiated from the internet. Traffic destined for 206.15.22.9 port 80/TCP needs to be forwarded to the server at 10.1.1.22. Based on the information shown in the image, which NAT rule will forward web-browsing traffic correctly? A) B) C)...