Which CLI command can be used to export the tcpdump capture?

Which CLI command can be used to export the tcpdump capture?A . scp export tcpdump from mgmt.pcap to <username@host:path>B . scp extract mgmt-pcap from mgmt.pcap to <username@host:path>C . scp export mgmt-pcap from mgmt.pcap to <username@host:path>D . download mgmt.-pcapView AnswerAnswer: C Explanation: Reference: https://live.paloaltonetworks.com/t5/Management-Articles/How-To-Packet-Capture-tcpdump-On-Management-Interface/ta- p/55415

October 24, 2019 No Comments READ MORE +

Which action will this cause configuration on the matched traffic?

A Security policy rule is configured with a Vulnerability Protection Profile and an action of ‘Deny”. Which action will this cause configuration on the matched traffic?A . The configuration is invalid. The Profile Settings section will be grayed out when the Action is set to “Deny”.B . The configuration will...

October 24, 2019 No Comments READ MORE +

Which option will protect the individual servers?

A client is concerned about resource exhaustion because of denial-of-service attacks against their DNS servers. Which option will protect the individual servers?A . Enable packet buffer protection on the Zone Protection Profile.B . Apply an Anti-Spyware Profile with DNS sinkholing.C . Use the DNS App-ID with application-default.D . Apply a...

October 24, 2019 1 Comment READ MORE +

Which VPN configuration would adapt to changes when deployed to the future site?

A company needs to preconfigure firewalls to be sent to remote sites with the least amount of reconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers. Which VPN configuration would adapt to changes when deployed to the...

October 23, 2019 No Comments READ MORE +

When creating a VPN tunnel, which protection profile can be enabled to prevent this malicious behavior?

VPN traffic intended for an administrator’s Palo Alto Networks NGFW is being maliciously intercepted and retransmitted by the interceptor. When creating a VPN tunnel, which protection profile can be enabled to prevent this malicious behavior?A . Zone ProtectionB . DoS ProtectionC . Web ApplicationD . ReplayView AnswerAnswer: A

October 23, 2019 No Comments READ MORE +

Which feature prevents the submission of corporate login information into website forms?

Which feature prevents the submission of corporate login information into website forms?A . Data filteringB . User-IDC . File blockingD . Credential phishing preventionView AnswerAnswer: D Explanation: Reference: https://www.paloaltonetworks.com/cyberpedia/how-the-next-generation-security-platform-contributes-to-gdpr-compliance

October 23, 2019 No Comments READ MORE +

Which configuration setting or step will allow the firewall to get automatic application signature updates?

An administrator has configured the Palo Alto Networks NGFW’s management interface to connect to the internet through a dedicated path that does not traverse back through the NGFW itself. Which configuration setting or step will allow the firewall to get automatic application signature updates?A . A scheduler will need to...

October 22, 2019 1 Comment READ MORE +

Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?

Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?A . web-browsing and 443B . SSL and 80C . SSL and 443D . web-browsing and 80View AnswerAnswer: A

October 22, 2019 No Comments READ MORE +

What must the administrator configure so that the PAN-OS® software can be upgraded?

An administrator needs to upgrade a Palo Alto Networks NGFW to the most current version of PAN-OS® software. The firewall has internet connectivity through an Ethernet interface, but no internet connectivity from the management interface. The Security policy has the default security rules and a rule that allows all web-browsing...

October 22, 2019 No Comments READ MORE +

Which protection feature is available only in a Zone Protection Profile?

Which protection feature is available only in a Zone Protection Profile?A . SYN Flood Protection using SYN Flood CookiesB . ICMP Flood ProtectionC . Port Scan ProtectionD . UDP Flood ProtectionsView AnswerAnswer: A

October 22, 2019 No Comments READ MORE +