What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted? (Choose two.)

What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted? (Choose two.)A . Rule Usage Hit counter will not be resetB . Highlight Unused Rules will highlight all rules.C . Highlight Unused Rules will highlight zero rules.D . Rule...

July 20, 2021 No Comments READ MORE +

When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?

When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?A . Load named configuration snapshotB . Load configuration versionC . Save candidate configD . Export device stateView AnswerAnswer: D

July 20, 2021 No Comments READ MORE +

Which operation will impact the performance of the management plane?

Which operation will impact the performance of the management plane?A . WildFire SubmissionsB . DoS ProtectionC . decrypting SSL SessionsD . Generating a SaaS Application Report.View AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSvCAK Decrypting SSL Sessions is a dataplane task.DoS Protection is a Dataplane task. Wildfire submissions is a Dataplane task. Generating a...

July 20, 2021 No Comments READ MORE +

Updates to dynamic user group membership are automatic therefore using dynamic user groups instead of static group objects allows you to:

Updates to dynamic user group membership are automatic therefore using dynamic user groups instead of static group objects allows you to:A . respond to changes in user behavior or potential threats using manual policy changesB . respond to changes in user behavior or potential threats without automatic policy changesC ....

July 20, 2021 No Comments READ MORE +

What will be the egress interface if the traffic’s ingress interface is ethernet1/6 sourcing from 192.168.111.3 and to the destination 10.46.41.113 during the time shown in the image?

Exhibit: What will be the egress interface if the traffic’s ingress interface is ethernet1/6 sourcing from 192.168.111.3 and to the destination 10.46.41.113 during the time shown in the image?A . ethernet1/7B . ethernet1/5C . ethernet1/6D . ethernet1/3View AnswerAnswer: D

July 20, 2021 No Comments READ MORE +

Which two formats are correct for naming tunnel interfaces?

A customer wants to set up a site-to-site VPN using tunnel interfaces? Which two formats are correct for naming tunnel interfaces? (Choose two.)A . Vpn-tunnel.1024B . vpn-tunne.1C . tunnel 1025D . tunnel. 1View AnswerAnswer: C,D

July 20, 2021 No Comments READ MORE +

During the packet flow process, which two processes are performed in application identification? (Choose two.)

During the packet flow process, which two processes are performed in application identification? (Choose two.)A . Pattern based application identificationB . Application override policy matchC . Application changed from content inspectionD . Session application identified.View AnswerAnswer: A,B Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0 http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

July 20, 2021 No Comments READ MORE +

In the following image from Panorama, why are some values shown in red?

In the following image from Panorama, why are some values shown in red? A . sg2 session count is the lowest compared to the other managed devices.B . us3 has a logging rate that deviates from the administrator-configured thresholds.C . uk3 has a logging rate that deviates from the seven-day...

July 19, 2021 No Comments READ MORE +

How quickly will the firewall receive back a verdict?

A Palo Alto Networks NGFW just submitted a file to WildFire for analysis. Assume a 5-minute window for analysis. The firewall is configured to check for verdicts every 5 minutes. How quickly will the firewall receive back a verdict?A . More than 15 minutesB . 5 minutesC . 10 to...

July 19, 2021 No Comments READ MORE +

Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?

Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?A . Both SSH keys and SSL certificates must be generated.B . No prerequisites are required.C . SSH keys must be manually generated.D . SSL certificates must be generated.View AnswerAnswer: B Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/decryption/configure-ssh-proxy “In an SSH Proxy configuration,...

July 19, 2021 No Comments READ MORE +