Where does the administrator view the desired data?
An administrator needs to gather information about the CPU utilization on both the management plane and the data plane Where does the administrator view the desired data?A . Monitor > UtilizationB . Resources Widget on the DashboardC . Support > ResourcesD . Application Command and Control CenterView AnswerAnswer: A
When deploying PAN-OS SD-WAN, which routing protocol can you use to build a routing overlay?
When deploying PAN-OS SD-WAN, which routing protocol can you use to build a routing overlay?A . OSPFv3B . BGPC . OSPFD . RIPView AnswerAnswer: C
As a best practice, which URL category should you target first for SSL decryption*?
As a best practice, which URL category should you target first for SSL decryption*?A . Online Storage and BackupB . High RiskC . Health and MedicineD . Financial ServicesView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/best-practices/10-0/decryption-best-practices/decryption-best-practices/plan-ssl-decryption-best-practice-deployment.html Phase in decryption. Plan to decrypt the riskiest traffic first (URL Categories most likely to harbor malicious...
Which three options would you configure on an interface Management profile lo secure management access?
A remote administrator needs access to the firewall on an untrust interlace. Which three options would you configure on an interface Management profile lo secure management access? (Choose three)A . HTTPB . User-IDC . SSHD . HTTPSE . Permitted IP AddressesView AnswerAnswer: B,C,D Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/configure-interfaces/use-interface-management-profiles-to-restrict-access.html
What are three reasons why an installed session can be identified with the application incomplete" tag? (Choose three.)
What are three reasons why an installed session can be identified with the application incomplete" tag? (Choose three.)A . The TCP connection was terminated without identifying any application dataB . The client sent a TCP segment with the PUSH flag setC . There is not enough application data after the...
How can packet butter protection be configured?
How can packet butter protection be configured?A . at me device level (globally to protect firewall resources and ingress zones, but not at the zone levelB . at the device level (globally) and it enabled globally, at the zone levelC . at the interlace level to protect firewall resourcesD ....
Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?
An administrator cannot see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama? A) B) C) D) A...
What is the correct setting?
A firewall administrator requires an A/P HA pair to fail over more quickly due to critical business application uptime requirements. What is the correct setting?A . Change the HA timer profile to "user-defined" and manually set the timers.B . Change the HA timer profile to "fast".C . Change the HA...
When you configure a Layer 3 interface what is one mandatory step?
When you configure a Layer 3 interface what is one mandatory step?A . Configure Security profiles, which need to be attached to each Layer 3 interfaceB . Configure Interface Management profiles which need to be attached to each Layer 3 interfaceC . Configure virtual routers to route the traffic for...
Based on the graphic, which statement accurately describes the output shown in the Server Monitoring panel?
Based on the graphic, which statement accurately describes the output shown in the Server Monitoring panel? A . The User-ID agent is connected to a domain controller labeled lab-client.B . The host lab-client has been found by the User-ID agent.C . The host lab-client has been found by a domain...