Which solution in PAN-OS® software would help in this case?
A global corporate office has a large-scale network with only one User-ID agent, which creates a bottleneck near the User-ID agent server. Which solution in PAN-OS® software would help in this case?A . application overrideB . Virtual Wire modeC . content inspectionD . redistribution of user mappingsView AnswerAnswer: D Explanation:...
If an administrator wants to decrypt SMTP traffic and possesses the server’s certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?
If an administrator wants to decrypt SMTP traffic and possesses the server’s certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?A . TLS Bidirectional InspectionB . SSL Inbound InspectionC . SSH Forward ProxyD . SMTP Inbound DecryptionView AnswerAnswer: B Explanation: Reference:...
How would an administrator configure the interface to 1Gbps?
A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the switch port which it connects. How would an administrator configure the interface to 1Gbps?A . set deviceconfig interface speed-duplex 1Gbps-full-duplexB . set deviceconfig system speed-duplex 1Gbps-duplexC . set deviceconfig system speed-duplex 1Gbps-full-duplexD . set deviceconfig Interface...
Which one is the correct configuration?
To more easily reuse templates and template slacks, you can create term plate variables in place of firewall-specific and appliance-specific IP literals in your configurations Which one is the correct configuration?A . @PanoramaB . #PancramaC . &PanoramaD . $PanoramaView AnswerAnswer: D
Which logs enable a firewall administrator to determine whether a session was decrypted?
Which logs enable a firewall administrator to determine whether a session was decrypted?A . Correlated EventB . TrafficC . DecryptionD . Security PolicyView AnswerAnswer: B
Which CLI command enables an administrator to view details about the firewall including uptime, PAN-OS® version, and serial number?
Which CLI command enables an administrator to view details about the firewall including uptime, PAN-OS® version, and serial number?A . debug system detailsB . show session infoC . show system infoD . show system detailsView AnswerAnswer: C Explanation: Reference: https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/pan-os-60/PAN-OS-6.0- CLI-ref.pdf
Which log file can be used to identify SSL decryption failures?
Which log file can be used to identify SSL decryption failures?A . ConfigurationB . ThreatsC . ACCD . TrafficView AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClboCAC
Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?
Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?A . Security policyB . Decryption policyC . Authentication policyD . Application Override policyView AnswerAnswer: C
Which protection feature is available only in a Zone Protection Profile?
Which protection feature is available only in a Zone Protection Profile?A . SYN Flood Protection using SYN Flood CookiesB . ICMP Flood ProtectionC . Port Scan ProtectionD . UDP Flood ProtectionsView AnswerAnswer: C Explanation: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/network/network-network-profiles-zone-protection
Which two features does PAN-OS® software use to identify applications? (Choose two)
Which two features does PAN-OS® software use to identify applications? (Choose two)A . port numberB . session numberC . transaction characteristicsD . application layer payloadView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/app-id/application-level-gateways#