A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on TCP port 8080. A Security policy rule allowing access from the Trust zone to the DMZ zone need to be configured to enable we browsing access to the server.
A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on TCP port 8080. A Security policy rule allowing access from the Trust zone to the DMZ zone need to be configured to enable we browsing access to the server. Which...
Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?
Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?A . web-browsing and 443B . SSL and 80C . SSL and 443D . web-browsing and 80View AnswerAnswer: A
Which three functions are performed by the dataplane?
An administrator has left a firewall to use the default port for all management services. Which three functions are performed by the dataplane? (Choose three.)A . WildFire updatesB . NATC . NTPD . antivirusE . File blockingView AnswerAnswer: BDE
Which two options could the administrator use to verify the progress or success of that commit task?
An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.) A . Exhibit AB . Exhibit BC . Exhibit CD . Exhibit DView AnswerAnswer: A, D
If the firewall has the link monitoring configuration, what will cause a failover?
If the firewall has the link monitoring configuration, what will cause a failover? A . ethernet1/3 and ethernet1/6 going downB . ethernet1/3 going downC . ethernet1/3 or Ethernet1/6 going downD . ethernet1/6 going downView AnswerAnswer: A
Which method will dynamically register tags on the Palo Alto Networks NGFW?
Which method will dynamically register tags on the Palo Alto Networks NGFW?A . Restful API or the VMWare API on the firewall or on the User-ID agent or the read-only domain controller (RODC)B . Restful API or the VMware API on the firewall or on the User-ID agentC . XML-API...
Which event will happen if an administrator uses an Application Override Policy?
Which event will happen if an administrator uses an Application Override Policy?A . Threat-ID processing time is decreased.B . The Palo Alto Networks NGFW stops App-ID processing at Layer 4.C . The application name assigned to the traffic by the security rule is written to the Traffic log.D . App-ID...
What are two benefits of nested device groups in Panorama? (Choose two.)
What are two benefits of nested device groups in Panorama? (Choose two.)A . Reuse of the existing Security policy rules and objectsB . Requires configuring both function and location for every deviceC . All device groups inherit settings form the Shared groupD . Overwrites local firewall configurationView AnswerAnswer: AC
Which administrative authentication method supports authorization by an external service?
Which administrative authentication method supports authorization by an external service?A . CertificatesB . LDAPC . RADIUSD . SSH keysView AnswerAnswer: C
Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OS® software?
Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OSĀ® software?A . XML APIB . Port MappingC . Client ProbingD . Server MonitoringView AnswerAnswer: A Explanation: Captive Portal and the other standard user mapping methods might...