What helps avoid split brain in active / passive high availability (HA) pair deployment?
What helps avoid split brain in active / passive high availability (HA) pair deployment?A . Enable preemption on both firewalls in the HA pair. B. Use a standard traffic interface as the HA3 link. C. Use the management interface as the HA1 backup link D. Use a standard traffic interface...
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?A . X-Forwarded-For B. HTTP method C. HTTP response status code D. Content typeView AnswerAnswer: A
Which three script types can be analyzed in WildFire? (Choose three)
Which three script types can be analyzed in WildFire? (Choose three)A . PythonScript B. MonoSenpt C. JScript D. PowerShell Script E. VBScriptView AnswerAnswer: A,C,E
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)A . Add the user to an external dynamic list (EDL). B. Tag the user using Panorama or the Web Ul of the firewall. C. Tag the user through the firewalls XML API. D....
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)A . operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR) B. improved revenue due to more efficient network traffic throughput C. Increased security due to scalable...
Which Security profile is used to configure Domain Name Security (DNS) to Identity and block previously unknown DGA-based threats in real time?
A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS). Which Security profile is used to configure Domain Name Security (DNS) to Identity and block previously unknown DGA-based threats in real time?A . URL Filtering profile B. WildFire Analysis profile...
How should the site be made available?
Access to a business site is blocked by URL Filtering inline machine learning (ML) and considered as a false-positive. How should the site be made available?A . Disable URL Filtering inline ML B. Create a custom URL category and add it to the Security policy C. Create a custom URL...
Which capability of PAN-OS would address the customer's lack of visibility?
A prospective customer currently uses a firewall that provides only Layer 4 inspection and protections. The customer sees traffic going to an external destination, port 53, but cannot determine what Layer 7 application traffic is going over that port. Which capability of PAN-OS would address the customer's lack of visibility?A...
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?A . Step 3: Architect a Zero Trust Network B. Step 5. Monitor and Maintain the Network C. Step 4: Create the Zero Trust Policy D. Step 1: Define the Protect Surface E....
The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?
The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?A . Directory Sync and Cloud Authentication Service that support IdP ung SAML 2.0 and OAuth2 B. Cloud Authentication Service that supports IdP using SAML 2.0 and OAuth2 C. Directory Sync and Cloud Authentication Service...