Which three dynamic routing protocols support BFD?
An engineer manages a high availability network and requires fast failover of the routing protocols. The engineer decides to implement BFD. Which three dynamic routing protocols support BFD? (Choose three.)A . OSPFB . RIPC . BGPD . IGRPE . OSPFv3 virtual linkView AnswerAnswer: A, B, C Explanation: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-networking-admin/bfd/bfd-overview/bfd-for-dynamic-routing-protocols
Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?
Refer to Exhibit: An administrator can not see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama? A)...
Given the screenshot below, where should the administrator navigate to view this information?
An administrator would like to determine which action the firewall will take for a specific CVE. Given the screenshot below, where should the administrator navigate to view this information?A . The profile rule actionB . CVE columnC . Exceptions labD . The profile rule threat nameView AnswerAnswer: C Explanation: The...
To ensure that a Security policy has the highest priority, how should an administrator configure a Security policy in the device group hierarchy?
To ensure that a Security policy has the highest priority, how should an administrator configure a Security policy in the device group hierarchy?A . Add the policy to the target device group and apply a master device to the device group.B . Reference the targeted device's templates in the target...
Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port?
Refer to the exhibit. Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port?A . The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-1.B . The firewall will allow...
What are three valid methods of collecting User-ID information in a network?
A network security administrator has been tasked with deploying User-ID in their organization. What are three valid methods of collecting User-ID information in a network? (Choose three.)A . Windows User-ID agentB . GlobalProtectC . XMLAPID . External dynamic listE . Dynamic user groupsView AnswerAnswer: ABC Explanation: User-ID is a feature...
Which protocol is supported by GlobalProtect Clientless VPN?
Which protocol is supported by GlobalProtect Clientless VPN?A . FTPB . RDPC . SSHD . HTTPSView AnswerAnswer: D Explanation: Virtual Desktop Infrastructure (VDI) and Virtual Machine (VM) environments, such as Citrix XenApp and XenDesktop or VMWare Horizon and Vcenter, support access natively through HTML5. You can RDP, VNC, or SSH...
How can Information Security extract and learn iP-to-user mapping information from authentication events for VPN and wireless users?
Information Security is enforcing group-based policies by using security-event monitoring on Windows User-ID agents for IP-to-User mapping in the network. During the rollout, Information Security identified a gap for users authenticating to their VPN and wireless networks. Root cause analysis showed that users were authenticating via RADIUS and that authentication...
If this traffic does not match any QoS classes, what default class is assigned?
An administrator is troubleshooting why video traffic is not being properly classified. If this traffic does not match any QoS classes, what default class is assigned?A . 1B . 2C . 3D . 4View AnswerAnswer: D Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/quality-of-service/qos-concepts/qos- classes
Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)
Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)A . Log IngestionB . HTTPC . Log ForwardingD . LDAPView AnswerAnswer: BC Explanation: >Threat logs, create a log forwarding profile to define how you want the firewall or Panorama to handle...