Which configuration setting or step will allow the firewall to get automatic application signature updates?

An administrator has configured the Palo Alto Networks NGFW’s management interface to connect to the internet through a dedicated path that does not traverse back through the NGFW itself. Which configuration setting or step will allow the firewall to get automatic application signature updates?A . A scheduler will need to...

April 2, 2021 No Comments READ MORE +

Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?

Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?A . Both SSH keys and SSL certificates must be generated.B . No prerequisites are required.C . SSH keys must be manually generated.D . SSL certificates must be generated.View AnswerAnswer: B Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/decryption/configure-ssh-proxy “In an SSH Proxy configuration,...

April 2, 2021 No Comments READ MORE +

When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?

When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?A . Load named configuration snapshotB . Load configuration versionC . Save candidate configD . Export device stateView AnswerAnswer: D

April 2, 2021 No Comments READ MORE +

How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all existing monitoring/ security platforms?

Refer to exhibit. An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported excessive traffic on the corporate WAN. How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all existing monitoring/ security...

April 2, 2021 No Comments READ MORE +

Which tool provides an administrator the ability to see trends in traffic over periods of time, such as threats detected in the last 30 days?

Which tool provides an administrator the ability to see trends in traffic over periods of time, such as threats detected in the last 30 days?A . Session BrowserB . Application Command CenterC . TCP DumpD . Packet CaptureView AnswerAnswer: B Explanation: Reference: https://live.paloaltonetworks.com/t5/Management-Articles/Tips-amp-Tricks-How-to-Use-the-Application-Command-Center- ACC/ta-p/67342

April 2, 2021 No Comments READ MORE +

How can an administrator configure the NGFW to automatically quarantine a device using GlobalProtect?

How can an administrator configure the NGFW to automatically quarantine a device using GlobalProtect?A . by adding the device's Host ID to a quarantine list and configure GlobalProtect to prevent users from connecting to the GlobalProtect gateway from a quarantined deviceB . by using secunty policies, log forwarding profiles, and...

April 2, 2021 No Comments READ MORE +

QoS natively integrates with which feature to provide service quality?

An administrator needs to optimize traffic to prefer business-critical applications over non-critical applications. QoS natively integrates with which feature to provide service quality?A . Port InspectionB . Certificate revocationC . Content-IDD . App-IDView AnswerAnswer: D Explanation: Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/quality-of-service/qos-for-applications-and-users

April 2, 2021 No Comments READ MORE +

Which three user authentication services can be modified to provide the Palo Alto Networks NGFW with both usernames and role names? (Choose three.)

Which three user authentication services can be modified to provide the Palo Alto Networks NGFW with both usernames and role names? (Choose three.)A . TACACS+B . KerberosC . PAPD . LDAPE . SAMLF . RADIUSView AnswerAnswer: B,D,E Explanation: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication

April 1, 2021 No Comments READ MORE +

Which solution in PAN-OS® software would help in this case?

A global corporate office has a large-scale network with only one User-ID agent, which creates a bottleneck near the User-ID agent server. Which solution in PAN-OS® software would help in this case?A . application overrideB . Virtual Wire modeC . content inspectionD . redistribution of user mappingsView AnswerAnswer: D Explanation:...

April 1, 2021 No Comments READ MORE +

Which two benefits come from assigning a Decryption Profile to a Decryption policy rule with a “No Decrypt” action? (Choose two.)

Which two benefits come from assigning a Decryption Profile to a Decryption policy rule with a “No Decrypt” action? (Choose two.)A . Block sessions with expired certificatesB . Block sessions with client authenticationC . Block sessions with unsupported cipher suitesD . Block sessions with untrusted issuersE . Block credential phishingView...

April 1, 2021 No Comments READ MORE +