Given the following snippet of a WildFire submission log did the end-user get access to the requested information and why or why not?

Given the following snippet of a WildFire submission log did the end-user get access to the requested information and why or why not? A . Yes, because the action is set to alertB . No, because this is an example from a defeated phishing attackC . No, because the severity...

February 14, 2025 No Comments READ MORE +

Which GlobalProtect gateway selling is required to enable split-tunneling by access route, destination domain, and application?

Which GlobalProtect gateway selling is required to enable split-tunneling by access route, destination domain, and application?A . No Direct Access to local networksB . Tunnel modeC . iPSec modeD . Satellite modeView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-gateways/split-tunnel-traffic-on-globalprotect-gateways/configure-a-split-tunnel-based-on-the-domain-and-application

February 14, 2025 No Comments READ MORE +

Which three parts of a template an engineer can configure?

An engineer is configuring a template in Panorama which will contain settings that need to be applied to all firewalls in production. Which three parts of a template an engineer can configure? (Choose three.)A . NTP Server AddressB . Antivirus ProfileC . Authentication ProfileD . Service Route ConfigurationE . Dynamic...

February 12, 2025 No Comments READ MORE +

Which action should be taken to enable the firewalls to send their pre-existing logs to Panorama?

An administrator is using Panorama to manage multiple firewalls. After upgrading all devices to the latest PAN-OS software, the administrator enables log forwarding from the firewalls to Panorama. However, pre-existing logs from the firewalls are not appearing in Panorama. Which action should be taken to enable the firewalls to send...

February 12, 2025 No Comments READ MORE +

What is the best choice for an SSL Forward Untrust certificate?

A network security administrator wants to inspect HTTPS traffic from users as it egresses through a firewall to the Internet/Untrust zone from trusted network zones. The security admin wishes to ensure that if users are presented with invalid or untrusted security certificates, the user will see an untrusted certificate warning....

February 11, 2025 No Comments READ MORE +

What can the administrator configure to establish the VPN connection?

A network administrator configured a site-to-site VPN tunnel where the peer device will act as initiator None of the peer addresses are known What can the administrator configure to establish the VPN connection?A . Set up certificate authentication.B . Use the Dynamic IP address type.C . Enable Passive ModeD ....

February 11, 2025 No Comments READ MORE +

Which HA firewall state describes the firewall that is experiencing a failure of a monitored path?

An engineer is monitoring an active/active high availability (HA) firewall pair. Which HA firewall state describes the firewall that is experiencing a failure of a monitored path?A . InitialB . TentativeC . PassiveD . Active-secondaryView AnswerAnswer: B Explanation: In an active/active high availability (HA) firewall pair, when a firewall experiences...

February 10, 2025 No Comments READ MORE +

Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?

A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged. Given...

February 9, 2025 No Comments READ MORE +

Which two profiles are needed to complete the configuration?

A company has configured a URL Filtering profile with override action on their firewall. Which two profiles are needed to complete the configuration? (Choose two)A . SSL/TLS ServiceB . HTTP ServerC . DecryptionD . Interface ManagementView AnswerAnswer: A, D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRdCAK https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/configure-url-filtering https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/allow-password-access-to-certain-sites#id7e63ce07-8b30-4506-a1e3-5800303954e8

February 8, 2025 No Comments READ MORE +

Which will be the egress interface if the traffic's ingress interface is ethernet1/7 sourcing from 192.168.111.3 and to the destination 10.46.41.113?

Refer to the exhibit. Which will be the egress interface if the traffic's ingress interface is ethernet1/7 sourcing from 192.168.111.3 and to the destination 10.46.41.113?A . ethernet1/6B . ethernet1/3C . ethernet1/7D . ethernet1/5View AnswerAnswer: D Explanation: In the second image, VW ports mentioned are 1/5 and 1/7. Hence it can...

February 8, 2025 No Comments READ MORE +