How would an administrator configure the interface to 1Gbps?

A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the switch port which it connects. How would an administrator configure the interface to 1Gbps?A . set deviceconfig interface speed-duplex 1Gbps-full-duplexB . set deviceconfig system speed-duplex 1Gbps-duplexC . set deviceconfig system speed-duplex 1Gbps-full-duplexD . set deviceconfig Interface...

October 18, 2019 No Comments READ MORE +

If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?

If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?A . The settings assigned to the template that is on top of the stack.B . The administrator will be...

October 17, 2019 No Comments READ MORE +

Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?

Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?A . checkB . findC . testD . simView AnswerAnswer: C Explanation: Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html

October 17, 2019 No Comments READ MORE +

Which certificates can be used as a Forwarded Trust certificate?

Refer to the exhibit. Which certificates can be used as a Forwarded Trust certificate?A . Certificate from Default Trust Certificate AuthoritiesB . Domain Sub-CAC . Forward_TrustD . Domain-Root-CertView AnswerAnswer: A

October 16, 2019 No Comments READ MORE +

Which administrative authentication method supports authorization by an external service?

Which administrative authentication method supports authorization by an external service?A . CertificatesB . LDAPC . RADIUSD . SSH keysView AnswerAnswer: C

October 16, 2019 No Comments READ MORE +

Which application should be used to identify traffic traversing the NGFW?

An administrator creates a custom application containing Layer 7 signatures. The latest application and threat dynamic update is downloaded to the same NGFW. The update contains an application that matches the same traffic signatures as the custom application. Which application should be used to identify traffic traversing the NGFW?A ....

October 15, 2019 No Comments READ MORE +

How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?

How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?A . Use the debug dataplane packet-diag set capture stage firewall file command.B . Enable all four stages of traffic capture (TX, RX, DROP, Firewall).C . Use the debug dataplane packet-diag set capture stage management...

October 15, 2019 No Comments READ MORE +

What should an administrator consider when planning to revert Panorama to a pre-PAN-OS®8.1 version?

What should an administrator consider when planning to revert Panorama to a pre-PAN-OS®8.1 version?A . Panorama cannot be reverted to an earlier PAN-OS®release if variables are used in templates or template stacks.B . An administrator must use the Expedition tool to adapt the configuration to the pre-PAN-OS®8.1 state.C . When...

October 15, 2019 No Comments READ MORE +

Which two actions should you perform?

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth...

October 15, 2019 No Comments READ MORE +

Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?

Which PAN-OS® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?A . Security policyB . Decryption policyC . Authentication policyD . Application Override policyView AnswerAnswer: C

October 14, 2019 No Comments READ MORE +