How should you configure the firewall to allow access to any office-suite application?
You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems to...
What are three valid qualifiers for a Decryption Policy Rule match? (Choose three )
What are three valid qualifiers for a Decryption Policy Rule match? (Choose three )A . Destination ZoneB . App-IDC . Custom URL CategoryD . User-IDE . Source InterfaceView AnswerAnswer: A,C,D
What are three types of Decryption Policy rules? (Choose three.)
What are three types of Decryption Policy rules? (Choose three.)A . SSL Inbound InspectionB . SSH ProxyC . SSL Forward ProxyD . Decryption BrokerE . Decryption MirrorView AnswerAnswer: A,B,C Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/define-traffic-to-decrypt/create-a-decryption-policy-rule
Where would you configure this setting?
A customer wants to spin their session load equally across two SD-WAN-enabled interfaces. Where would you configure this setting?A . Path Quality profileB . ECMP setting on virtual routerC . Traffic Dtstnbution profileD . SD-WAN Interface profileView AnswerAnswer: C
This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?
An administrator with 84 firewalls and Panorama does not see any WildFire logs in Panorama. All 84 firewalls have an active WildFire subscription On each firewall WildFire logs are available. This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?A . System...
Which server OS platforms can be used for server monitoring with User-ID?
An engineer is in the planning stages of deploying User-ID in a diverse directory services environment. Which server OS platforms can be used for server monitoring with User-ID?A . Microsoft Terminal Server, Red Hat Linux, and Microsoft Active DirectoryB . Microsoft Active Directory, Red Hat Linux, and Microsoft ExchangeC ....
While troubleshooting an SSL Forward Proxy decryption issue which PAN-OS CLI command would you use to check the details of the end-entity certificate that is signed by the Forward Trust Certificate or Forward Untrust Certificate?
While troubleshooting an SSL Forward Proxy decryption issue which PAN-OS CLI command would you use to check the details of the end-entity certificate that is signed by the Forward Trust Certificate or Forward Untrust Certificate?A . show system setting ssl-decrypt certsB . show systea setting ssl-decrypt certificate-cacheC . show systen...
Given the following configuration, which route is used for destination 10.10.0.4?
Given the following configuration, which route is used for destination 10.10.0.4? A . Route 4B . Route 3C . Route 1D . Route 3View AnswerAnswer: A
Before doing so, what must the administrator consider?
An administrator wants to enable zone protection Before doing so, what must the administrator consider?A . Activate a zone protection subscription.B . To increase bandwidth no more than one firewall interface should be connected to a zoneC . Security policy rules do not prevent lateral movement of traffic between zonesD...
Place the steps in the WildFire process workflow in their correct order
DRAG DROP Place the steps in the WildFire process workflow in their correct order. View AnswerAnswer: Explanation: Timeline Description automatically generated https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/wildfire-overview/about-wildfire.html