Please match the terms to their corresponding definitions

DRAG DROP Please match the terms to their corresponding definitions. View AnswerAnswer: Explanation: Graphical user interface Description automatically generated with medium confidence

March 9, 2022 No Comments READ MORE +

What procedure should you use so Panorama is fully managing the firewall?

A standalone firewall with local objects and policies needs to be migrated into Panorama . What procedure should you use so Panorama is fully managing the firewall?A . Use the "import Panorama configuration snapshot" operation, then perform a device-group commit push with "include device and network templates"B . Use the...

March 9, 2022 No Comments READ MORE +

When you configure an active/active high availability pair which two links can you use? (Choose two)

When you configure an active/active high availability pair which two links can you use? (Choose two)A . HA2 backupB . HA3C . Console BackupD . HSCI-CView AnswerAnswer: A,B

March 8, 2022 No Comments READ MORE +

What are two valid deployment options for Decryption Broker? (Choose two)

What are two valid deployment options for Decryption Broker? (Choose two)A . Transparent Bridge Security ChainB . Layer 3 Security ChainC . Layer 2 Security ChainD . Transparent Mirror Security ChainView AnswerAnswer: A,B Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-broker

March 8, 2022 No Comments READ MORE +

To install the certificate and key for an endpoint, which three components are required?

A network administrator wants to deploy GlobalProtect with pre-logon for Windows 10 endpoints and follow Palo Alto Networks best practices. To install the certificate and key for an endpoint, which three components are required? (Choose three.)A . server certificateB . local computer storeC . private keyD . self-signed certificateE ....

March 7, 2022 No Comments READ MORE +

Match each SD-WAN configuration element to the description of that element

DRAG DROP Match each SD-WAN configuration element to the description of that element. View AnswerAnswer: Explanation: ✑ An SD-WAN Interface Profile specifies the Tag that you apply to the physical interface, and also specifies the type of Link that interface is (ADSL/DSL, cable modem, Ethernet, fiber, LTE/3G/4G/5G, MPLS, microwave/radio, satellite,...

March 7, 2022 No Comments READ MORE +

Where is the best place to validate if the firewall is blocking the user's TAR file?

A network security engineer has applied a File Blocking profile to a rule with the action of Block. The user of a Linux CLI operating system has opened a ticket. The ticket states that the user is being blocked by the firewall when trying to download a TAR file. The...

March 7, 2022 No Comments READ MORE +

Before you upgrade a Palo Alto Networks NGFW, what must you do?

Before you upgrade a Palo Alto Networks NGFW, what must you do?A . Make sure that the PAN-OS support contract is valid for at least another yearB . Export a device state of the firewallC . Make sure that the firewall is running a version of antivirus software and a...

March 7, 2022 No Comments READ MORE +

Which two statements are true about DoS Protection and Zone Protection Profiles? (Choose two).

Which two statements are true about DoS Protection and Zone Protection Profiles? (Choose two).A . Zone Protection Profiles protect ingress zonesB . Zone Protection Profiles protect egress zonesC . DoS Protection Profiles are packet-based, not signature-basedD . DoS Protection Profiles are linked to Security policy rulesView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense/zone-protection-profiles

March 7, 2022 No Comments READ MORE +

In a firewall, which three decryption methods are valid? (Choose three)

In a firewall, which three decryption methods are valid? (Choose three)A . SSL Inbound InspectionB . SSL Outbound Proxyless InspectionC . SSL Inbound ProxyD . Decryption MirrorE . SSH ProxyView AnswerAnswer: A,D,E Explanation: You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution...

March 6, 2022 No Comments READ MORE +