Which administrative authentication method supports authorization by an external service?
Which administrative authentication method supports authorization by an external service?A . CertificatesB . LDAPC . RADIUSD . SSH keysView AnswerAnswer: C
Which application should be used to identify traffic traversing the NGFW?
An administrator creates a custom application containing Layer 7 signatures. The latest application and threat dynamic update is downloaded to the same NGFW. The update contains an application that matches the same traffic signatures as the custom application. Which application should be used to identify traffic traversing the NGFW?A ....
How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?
How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?A . Use the debug dataplane packet-diag set capture stage firewall file command.B . Enable all four stages of traffic capture (TX, RX, DROP, Firewall).C . Use the debug dataplane packet-diag set capture stage management...
What should an administrator consider when planning to revert Panorama to a pre-PAN-OS®8.1 version?
What should an administrator consider when planning to revert Panorama to a pre-PAN-OS®8.1 version?A . Panorama cannot be reverted to an earlier PAN-OS®release if variables are used in templates or template stacks.B . An administrator must use the Expedition tool to adapt the configuration to the pre-PAN-OS®8.1 state.C . When...
Which two actions should you perform?
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth...
Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?
Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?A . Security policyB . Decryption policyC . Authentication policyD . Application Override policyView AnswerAnswer: C
Which version of GlobalProtect supports split tunneling based on destination domain, client process, and HTTP/HTTPS video streaming application?
Which version of GlobalProtect supports split tunneling based on destination domain, client process, and HTTP/HTTPS video streaming application?A . GlobalProtect version 4.0 with PAN-OS®8.1B . GlobalProtect version 4.1 with PAN-OS®8.1C . GlobalProtect version 4.1 with PAN-OS®8.0D . GlobalProtect version 4.0 with PAN-OS®8.0View AnswerAnswer: B
In a virtual router, which object contains all potential routes?
In a virtual router, which object contains all potential routes?A . MIBB . RIBC . SIPD . FIBView AnswerAnswer: B Explanation: Reference: https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0ahUKEwiOkbfYzPzXAhVnEJoKHcwVCg4QFghiMAk &url=https%3A%2F% 2Flive.paloaltonetworks.com%2Ftwzvq79624%2Fattachments%2Ftwzvq79624%2Fdocumentation_tk b%2F487%2F1%2FRoute% 2520Redistribution%2520and%2520Filtering%2520TechNote%2520-%2520Rev% 2520B. pdf&usg=AOvVaw0H9qgaJK0oI2xjIJBNo1Km
Which two mandatory options are used to configure a VLAN interface?
A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. Which two mandatory options are used to configure a VLAN interface? (Choose two.)A . Virtual routerB . Security zoneC . ARP entriesD . Netflow ProfileView AnswerAnswer: AB Explanation: Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/network/network-interfaces/pa-7000-series- layer-2-interface#idd2bcaacc-54b9-4ec9-a1dd-8064499f5b9d
Which three settings are defined within the Templates object of Panorama? (Choose three.)
Which three settings are defined within the Templates object of Panorama? (Choose three.)A . SetupB . Virtual RoutersC . InterfacesD . SecurityE . Application OverrideView AnswerAnswer: ADE