When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?

When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?A . To enable Gateway authentication to the PortalB . To enable Portal authentication to the GatewayC . To enable user authentication to the PortalD . To enable client machine authentication to the PortalView AnswerAnswer: C Explanation:...

July 13, 2021 No Comments READ MORE +

If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?

If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?A . The settings assigned to the template that is on top of the stack.B . The administrator will be...

July 13, 2021 No Comments READ MORE +

If the firewall has the link monitoring configuration, what will cause a failover?

If the firewall has the link monitoring configuration, what will cause a failover? A . ethernet1/3 and ethernet1/6 going downB . ethernet1/3 going downC . ethernet1/3 or Ethernet1/6 going downD . ethernet1/6 going downView AnswerAnswer: A

July 12, 2021 No Comments READ MORE +

To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate traffic to drop, you can configure.

To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate traffic to drop, you can configure.A . BGP (Border Gateway Protocol)B . PBP (Packet Buffer Protection)C . PGP (Packet Gateway Protocol)D . PBP (Protocol Based Protection)View AnswerAnswer:...

July 12, 2021 No Comments READ MORE +

Which event will happen if an administrator uses an Application Override Policy?

Which event will happen if an administrator uses an Application Override Policy?A . Threat-ID processing time is decreased.B . The Palo Alto Networks NGFW stops App-ID processing at Layer 4.C . The application name assigned to the traffic by the security rule is written to the Traffic log.D . App-ID...

July 12, 2021 No Comments READ MORE +

Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?

Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?A . port mappingB . server monitoringC . client probingD . XFF headersView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-mapping-for-terminal-server-users

July 12, 2021 No Comments READ MORE +

Which feature prevents the submission of corporate login information into website forms?

Which feature prevents the submission of corporate login information into website forms?A . Data filteringB . User-IDC . File blockingD . Credential phishing preventionView AnswerAnswer: D Explanation: Reference: https://www.paloaltonetworks.com/cyberpedia/how-the-next-generation-security-platform-contributes-to-gdpr-compliance “Credential phishing prevention works by scanning username and password submissions to websites and comparing those submissions against valid corporate credentials. You...

July 12, 2021 No Comments READ MORE +

A session in the Traffic log is reporting the application as “incomplete.” What does “incomplete” mean?

A session in the Traffic log is reporting the application as “incomplete.” What does “incomplete” mean?A . The three-way TCP handshake was observed, but the application could not be identified.B . The three-way TCP handshake did not complete.C . The traffic is coming across UDP, and the application could not...

July 11, 2021 No Comments READ MORE +

Which profile is the cause of the missing Policies tab?

An administrator logs in to the Palo Alto Networks NGFW and reports that the WebUI is missing the Policies tab. Which profile is the cause of the missing Policies tab?A . Admin RoleB . WebUIC . AuthenticationD . AuthorizationView AnswerAnswer: A

July 11, 2021 No Comments READ MORE +

Which option is part of the content inspection process?

Which option is part of the content inspection process?A . Packet forwarding processB . SSL Proxy re-encryptC . IPsec tunnel encryptionD . Packet egress processView AnswerAnswer: B Explanation: http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

July 11, 2021 No Comments READ MORE +