When is the content inspection performed in the packet flow process?

When is the content inspection performed in the packet flow process?A . after the application has been identifiedB . before session lookupC . before the packet forwarding processD . after the SSL Proxy re-encrypts the packetView AnswerAnswer: A Explanation: Reference: https://live.paloaltonetworks.com/t5/Learning-Articles/Packet-Flow-Sequence-in-PAN-OS/ta-p/56081

April 1, 2021 No Comments READ MORE +

What is the purpose of the firewall decryption broker?

What is the purpose of the firewall decryption broker?A . Decrypt SSL traffic a then send it as cleartext to a security chain of inspection toolsB . Force decryption of previously unknown cipher suitesC . Inspection traffic within IPsec tunnelD . Reduce SSL traffic to a weaker cipher before sending...

February 5, 2020 No Comments READ MORE +

What must the administrator configure so that the PAN-OS® software can be upgraded?

An administrator needs to upgrade a Palo Alto Networks NGFW to the most current version of PAN-OS® software. The firewall has internet connectivity through an Ethernet interface, but no internet connectivity from the management interface. The Security policy has the default security rules and a rule that allows all web-browsing...

February 5, 2020 1 Comment READ MORE +

Based on the image, what caused the commit warning?

Based on the image, what caused the commit warning? A. The CA certificate for FWDtrust has not been imported into the firewall. B. The FWDtrust certificate has not been flagged as Trusted Root CA. C. SSL Forward Proxy requires a public certificate to be imported into the firewall. D. The...

February 5, 2020 No Comments READ MORE +

Which three settings are defined within the Templates object of Panorama? (Choose three.)

Which three settings are defined within the Templates object of Panorama? (Choose three.)A . SetupB . Virtual RoutersC . InterfacesD . SecurityE . Application OverrideView AnswerAnswer: ABC

February 5, 2020 No Comments READ MORE +

Which solution in PAN-OS® software would help in this case?

A global corporate office has a large-scale network with only one User-ID agent, which creates a bottleneck near the User-ID agent server. Which solution in PAN-OS® software would help in this case?A . Application overrideB . Redistribution of user mappingsC . Virtual Wire modeD . Content inspectionView AnswerAnswer: B

February 4, 2020 No Comments READ MORE +

Which option should the administrator investigate as part of triage?

An administrator encountered problems with inbound decryption. Which option should the administrator investigate as part of triage?A . Security policy rule allowing SSL to the target serverB . Firewall connectivity to a CRLC . Root certificate imported into the firewall with “Trust” enabledD . Importation of a certificate from an...

February 4, 2020 No Comments READ MORE +

Which is not a valid reason for receiving a decrypt-cert-validation error?

Which is not a valid reason for receiving a decrypt-cert-validation error?A . Unsupported HSMB . Unknown certificate statusC . Client authenticationD . Untrusted issuerView AnswerAnswer: A

February 2, 2020 No Comments READ MORE +

Which three split tunnel methods are supported by a globalProtect gateway? (Choose three.)

Which three split tunnel methods are supported by a globalProtect gateway? (Choose three.)A . video streaming applicationB . Client Application ProcessC . Destination DomainD . Source DomainE . Destination user/groupF . URL CategoryView AnswerAnswer: A,B,C

February 2, 2020 No Comments READ MORE +

Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?

Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?A . Security policyB . Decryption policyC . Authentication policyD . Application Override policyView AnswerAnswer: C

February 1, 2020 No Comments READ MORE +