Which two configuration options can be used to correctly categorize their custom database application?
A customer has an application that is being identified as unknown-top for one of their custom PostgreSQL database connections. Which two configuration options can be used to correctly categorize their custom database application? (Choose two.)A . Application Override policy.B . Security policy to identify the custom application.C . Custom application.D...
Which two options could the administrator use to verify the progress or success of that commit task?
An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.) A . Exhibit AB . Exhibit BC . Exhibit CD . Exhibit DView AnswerAnswer: A, D
If the firewall is configured for credential phishing prevention using the “Domain Credential Filter” method, which login will be detected as credential theft?
If the firewall is configured for credential phishing prevention using the “Domain Credential Filter” method, which login will be detected as credential theft?A . Mapping to the IP address of the logged-in user.B . First four letters of the username matching any valid corporate username.C . Using the same user’s...
Which User-ID mapping solution will map multiple users who are using Citrix to connect to the network and access resources?
An administrator has users accessing network resources through Citrix XenApp 7 x. Which User-ID mapping solution will map multiple users who are using Citrix to connect to the network and access resources?A . Client ProbingB . Terminal Services agentC . GlobalProtectD . Syslog MonitoringView AnswerAnswer: B
SAML SLO is supported for which two firewall features? (Choose two.)
SAML SLO is supported for which two firewall features? (Choose two.)A . GlobalProtect PortalB . CaptivePortalC . WebUID . CLIView AnswerAnswer: A,B
Which configuration will enable this HA scenario?
An administrator has been asked to configure active/active HA for a pair of Palo Alto Networks NGFWs. The firewall use Layer 3 interfaces to send traffic to a single gateway IP for the pair. Which configuration will enable this HA scenario? A. The two firewalls will share a single floating...
What is the purpose of the firewall decryption broker?
What is the purpose of the firewall decryption broker?A . Decrypt SSL traffic a then send it as cleartext to a security chain of inspection toolsB . Force decryption of previously unknown cipher suitesC . Inspection traffic within IPsec tunnelD . Reduce SSL traffic to a weaker cipher before sending...
Which three authentication services can administrator use to authenticate admins into the Palo Alto Networks NGFW without defining a corresponding admin account on the local firewall? (Choose three.)
Which three authentication services can administrator use to authenticate admins into the Palo Alto Networks NGFW without defining a corresponding admin account on the local firewall? (Choose three.)A . KerberosB . PAPC . SAMLD . TACACS+E . RADIUSF . LDAPView AnswerAnswer: DEF
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?A . To enable Gateway authentication to the PortalB . To enable Portal authentication to the GatewayC . To enable user authentication to the PortalD . To enable client machine authentication to the PortalView AnswerAnswer: C Explanation:...
Which method does an administrator use to integrate all non-native MFA platforms in PAN-OS® software?
Which method does an administrator use to integrate all non-native MFA platforms in PAN-OS® software?A . OktaB . DUOC . RADIUSD . PingIDView AnswerAnswer: C