Drag and Drop Question
Drag and Drop Question Place the following steps in the packet processing order of operations from first to last. View AnswerAnswer: Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
Which three types of entries can be excluded from an external dynamic list? (Choose three.)
Which three types of entries can be excluded from an external dynamic list? (Choose three.)A . IP addresses B. Applications C. User-ID D. Domains E. URLsView AnswerAnswer: ADE Explanation: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/view-external-dynamic-list-entries
What are two predefined AntiSpyware profiles? (Choose two.)
What are two predefined AntiSpyware profiles? (Choose two.)A . Default B. Standard C. Secure D. StrictView AnswerAnswer: AD
Which policy is required to enable source NAT on the firewall?
An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . post-NAT policy with external source and any destination address B. NAT policy with no source of destination zone selected C. NAT policy with...
Which statement is true regarding NAT rules?
Which statement is true regarding NAT rules?A . Static NAT rules have precedence over other forms of NAT. B. Translation of the IP address and port occurs before security processing. C. NAT rules are processed in order from top to bottom. D. Firewall supports NAT on Layer 3 interfaces only.View...
Where does a user assign a tag group to a policy rule in the policy creation window?
Where does a user assign a tag group to a policy rule in the policy creation window?A . General tab B. Usage tab C. Application tab D. Actions tabView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/use-tags-to-group-and-visually-distinguish-objects/view-rules-by-tag-group
To enable DNS sinkholing, which two addresses should be reserved? (Choose two.)
To enable DNS sinkholing, which two addresses should be reserved? (Choose two.)A . MAC B. IPv6 C. Email D. IPv4View AnswerAnswer: BD Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0
What are two valid selections within an Anti-Spyware profile? (Choose two.)
What are two valid selections within an Anti-Spyware profile? (Choose two.)A . Random early drop B. Drop C. Deny D. DefaultView AnswerAnswer: BD
What is considered best practice with regards to committing configuration changes?
What is considered best practice with regards to committing configuration changes? A. Wait until all running and pending jobs are finished before committing. B. Export configuration after each single configuration change performed. C. Validate configuration changes prior to committing. A. D. Disable the automatic commit feature that prioritizes content database...
Which statement is true regarding NAT rules?
Which statement is true regarding NAT rules?A . Static NAT rules have precedence over other forms of NAT. B. Translation of the IP address and port occurs before security processing. C. NAT rules are processed in order from top to bottom. D. Firewall supports NAT on Layer 3 interfaces only.View...