Which two statements are true for the DNS Security service? (Choose two.)

Which two statements are true for the DNS Security service? (Choose two.)A . It eliminates the need for dynamic DNS updatesB . It functions like PAN-DB and requires activation through the app portalC . It removes the 100K limit for DNS entries for the downloaded DNS updatesD . It is...

March 16, 2022 No Comments READ MORE +

Which three severity levels should single-packet captures be enabled to meet the Best Practice standard?

You are auditing the work of a co-worker and need to verify that they have matched the Palo Alto Networks Best Practices for Anti-Spyware Profiles. For. Which three severity levels should single-packet captures be enabled to meet the Best Practice standard? (Choose three)A . HighB . MediumC . CriticalD ....

March 16, 2022 No Comments READ MORE +

Which User-ID mapping method should be used in a high-security environment where all IP address-to-user mappings should always be explicitly known?

Which User-ID mapping method should be used in a high-security environment where all IP address-to-user mappings should always be explicitly known?A . PAN-OS integrated User-ID agentB . LDAP Server Profile configurationC . GlobalProtectD . Windows-based User-ID agentView AnswerAnswer: C Explanation: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/user-id-concepts/user-mapping/globalprotect.html Because GlobalProtect users must authenticate to gain access to...

March 15, 2022 No Comments READ MORE +

What is the best solution for the customer?

An existing NGFW customer requires direct interne! access offload locally at each site and iPSec connectivity to all branches over public internet. One requirement is mat no new SD-WAN hardware be introduced to the environment. What is the best solution for the customer?A . Configure a remote network on PAN-OSB...

March 15, 2022 No Comments READ MORE +

What happens when an A P firewall cluster synchronies IPsec tunnel security associations (SAs)?

What happens when an A P firewall cluster synchronies IPsec tunnel security associations (SAs)?A . Phase 2 SAs are synchronized over HA2 finksB . Phase 1 and Phase 2 SAs are synchronized over HA2 linksC . Phase 1 SAs are synchronized over HA1 linksD . Phase 1 and Phase 2...

March 15, 2022 No Comments READ MORE +

During SSL decryption which three factors affect resource consumption1? (Choose three)

During SSL decryption which three factors affect resource consumption1? (Choose three)A . TLS protocol versionB . transaction sizeC . key exchange algorithmD . applications that use non-standard portsE . certificate issuerView AnswerAnswer: A,B,C Explanation: https://docs.paloaltonetworks.com/best-practices/8-1/decryption-best-practices/decryption-best-practices/plan-ssl-decryption-best-practice-deployment.html

March 15, 2022 No Comments READ MORE +

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)A . inherit address-objects from templatesB . define a common standard template configuration for firewallsC . standardize server profiles and authentication configuration across all stacksD . standardize log-forwarding profiles for security polices across all stacksView...

March 14, 2022 No Comments READ MORE +

What must be configured on Prisma Access to provide connectivity to the resources in the datacenter?

A customer is replacing their legacy remote access VPN solution. The current solution is in place to secure internet egress and provide access to resources located in the main datacenter for the connected clients. Prisma Access has been selected to replace the current remote access VPN solution. During onboarding the...

March 14, 2022 No Comments READ MORE +

Which of the following commands would you use to check the total number of the sessions that are currently going through SSL Decryption processing?

Which of the following commands would you use to check the total number of the sessions that are currently going through SSL Decryption processing?A . show session all ssI-decrypt yes count yesB . show session filter ssl-decryption yes total-count yesC . show session all filter ssl-decrypt yes count yesD ....

March 14, 2022 No Comments READ MORE +

What type of address object would be useful for internal devices where the addressing structure assigns meaning to certain bits in the address, as illustrated in the diagram?

What type of address object would be useful for internal devices where the addressing structure assigns meaning to certain bits in the address, as illustrated in the diagram? A . IP NetmaskB . IP Wildcard MaskC . IP AddressD . IP RangeView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/networking-features/wildcard-address

March 14, 2022 No Comments READ MORE +