Which event will happen if an administrator uses an Application Override Policy?
Which event will happen if an administrator uses an Application Override Policy?A . Threat-ID processing time is decreased.B . The Palo Alto Networks NGFW stops App-ID processing at Layer 4.C . The application name assigned to the traffic by the security rule is written to the Traffic log.D . App-ID...
What are two benefits of nested device groups in Panorama? (Choose two.)
What are two benefits of nested device groups in Panorama? (Choose two.)A . Reuse of the existing Security policy rules and objectsB . Requires configuring both function and location for every deviceC . All device groups inherit settings form the Shared groupD . Overwrites local firewall configurationView AnswerAnswer: AC
Which administrative authentication method supports authorization by an external service?
Which administrative authentication method supports authorization by an external service?A . CertificatesB . LDAPC . RADIUSD . SSH keysView AnswerAnswer: C
Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OS® software?
Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OS® software?A . XML APIB . Port MappingC . Client ProbingD . Server MonitoringView AnswerAnswer: A Explanation: Captive Portal and the other standard user mapping methods might...
What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted? (Choose two.)
What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted? (Choose two.)A . Rule Usage Hit counter will not be resetB . Highlight Unused Rules will highlight all rules.C . Highlight Unused Rules will highlight zero rules.D . Rule...
Which two security policy rules will accomplish this configuration?
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and HOST B (10.1.1.101) receives SSH traffic.) Which two security policy rules...
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?A . To enable Gateway authentication to the PortalB . To enable Portal authentication to the GatewayC . To enable user authentication to the PortalD . To enable client machine authentication to the PortalView AnswerAnswer: C Explanation:...
Which Palo Alto Networks VM-Series firewall is valid?
Which Palo Alto Networks VM-Series firewall is valid?A . VM-25B . VM-800C . VM-50D . VM-400View AnswerAnswer: C Explanation: Reference: https://www.paloaltonetworks.com/products/secure-the-network/virtualized-next-generation-firewall/vm-series
Which action will this cause configuration on the matched traffic?
A Security policy rule is configured with a Vulnerability Protection Profile and an action of ‘Deny”. Which action will this cause configuration on the matched traffic?A . The configuration is invalid. The Profile Settings section will be grayed out when the Action is set to “Deny”.B . The configuration will...
SAML SLO is supported for which two firewall features? (Choose two.)
SAML SLO is supported for which two firewall features? (Choose two.)A . GlobalProtect PortalB . CaptivePortalC . WebUID . CLIView AnswerAnswer: A,B