What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted? (Choose two.)
What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted? (Choose two.)A . Rule Usage Hit counter will not be resetB . Highlight Unused Rules will highlight all rules.C . Highlight Unused Rules will highlight zero rules.D . Rule...
When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?
When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?A . Load named configuration snapshotB . Load configuration versionC . Save candidate configD . Export device stateView AnswerAnswer: D
Which operation will impact the performance of the management plane?
Which operation will impact the performance of the management plane?A . WildFire SubmissionsB . DoS ProtectionC . decrypting SSL SessionsD . Generating a SaaS Application Report.View AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSvCAK Decrypting SSL Sessions is a dataplane task.DoS Protection is a Dataplane task. Wildfire submissions is a Dataplane task. Generating a...
Updates to dynamic user group membership are automatic therefore using dynamic user groups instead of static group objects allows you to:
Updates to dynamic user group membership are automatic therefore using dynamic user groups instead of static group objects allows you to:A . respond to changes in user behavior or potential threats using manual policy changesB . respond to changes in user behavior or potential threats without automatic policy changesC ....
What will be the egress interface if the traffic’s ingress interface is ethernet1/6 sourcing from 192.168.111.3 and to the destination 10.46.41.113 during the time shown in the image?
Exhibit: What will be the egress interface if the traffic’s ingress interface is ethernet1/6 sourcing from 192.168.111.3 and to the destination 10.46.41.113 during the time shown in the image?A . ethernet1/7B . ethernet1/5C . ethernet1/6D . ethernet1/3View AnswerAnswer: D
Which two formats are correct for naming tunnel interfaces?
A customer wants to set up a site-to-site VPN using tunnel interfaces? Which two formats are correct for naming tunnel interfaces? (Choose two.)A . Vpn-tunnel.1024B . vpn-tunne.1C . tunnel 1025D . tunnel. 1View AnswerAnswer: C,D
During the packet flow process, which two processes are performed in application identification? (Choose two.)
During the packet flow process, which two processes are performed in application identification? (Choose two.)A . Pattern based application identificationB . Application override policy matchC . Application changed from content inspectionD . Session application identified.View AnswerAnswer: A,B Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0 http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
In the following image from Panorama, why are some values shown in red?
In the following image from Panorama, why are some values shown in red? A . sg2 session count is the lowest compared to the other managed devices.B . us3 has a logging rate that deviates from the administrator-configured thresholds.C . uk3 has a logging rate that deviates from the seven-day...
How quickly will the firewall receive back a verdict?
A Palo Alto Networks NGFW just submitted a file to WildFire for analysis. Assume a 5-minute window for analysis. The firewall is configured to check for verdicts every 5 minutes. How quickly will the firewall receive back a verdict?A . More than 15 minutesB . 5 minutesC . 10 to...
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?A . Both SSH keys and SSL certificates must be generated.B . No prerequisites are required.C . SSH keys must be manually generated.D . SSL certificates must be generated.View AnswerAnswer: B Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/decryption/configure-ssh-proxy “In an SSH Proxy configuration,...