Given the following configuration, which route is used for destination 10.10.0.4?
Given the following configuration, which route is used for destination 10.10.0.4? A . Route 4B . Route 3C . Route 1D . Route 3View AnswerAnswer: A
What are three types of Decryption Policy rules? (Choose three.)
What are three types of Decryption Policy rules? (Choose three.)A . SSL Inbound InspectionB . SSH ProxyC . SSL Forward ProxyD . Decryption BrokerE . Decryption MirrorView AnswerAnswer: A,B,C Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/define-traffic-to-decrypt/create-a-decryption-policy-rule
This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?
An administrator with 84 firewalls and Panorama does not see any WildFire logs in Panorama. All 84 firewalls have an active WildFire subscription On each firewall WildFire logs are available. This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?A . System...
As a best practice, which URL category should you target first for SSL decryption*?
As a best practice, which URL category should you target first for SSL decryption*?A . Online Storage and BackupB . High RiskC . Health and MedicineD . Financial ServicesView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/best-practices/10-0/decryption-best-practices/decryption-best-practices/plan-ssl-decryption-best-practice-deployment.html Phase in decryption. Plan to decrypt the riskiest traffic first (URL Categories most likely to harbor malicious...
How can packet butter protection be configured?
How can packet butter protection be configured?A . at me device level (globally to protect firewall resources and ingress zones, but not at the zone levelB . at the device level (globally) and it enabled globally, at the zone levelC . at the interlace level to protect firewall resourcesD ....
Which three options would you configure on an interface Management profile lo secure management access?
A remote administrator needs access to the firewall on an untrust interlace . Which three options would you configure on an interface Management profile lo secure management access? (Choose three)A . HTTPB . User-IDC . SSHD . HTTPSE . Permitted IP AddressesView AnswerAnswer: B,C,D Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/configure-interfaces/use-interface-management-profiles-to-restrict-access.html
When three settings are required on an SSI/TVS Service Profile to provide secure Wet) Ui authentication?
A security engineer needs firewall management access on a Inside interface. When three settings are required on an SSI/TVS Service Profile to provide secure Wet) Ui authentication? (Choose three.)A . Maximum TLS versionB . Minimum TLV versionC . Encryption AlgorithmD . CertificateE . Authentication AlgorithmView AnswerAnswer: A,B,D
While troubleshooting an SSL Forward Proxy decryption issue which PAN-OS CLI command would you use to check the details of the end-entity certificate that is signed by the Forward Trust Certificate or Forward Untrust Certificate?
While troubleshooting an SSL Forward Proxy decryption issue which PAN-OS CLI command would you use to check the details of the end-entity certificate that is signed by the Forward Trust Certificate or Forward Untrust Certificate?A . show system setting ssl-decrypt certsB . show systea setting ssl-decrypt certificate-cacheC . show systen...
Which rule type controls end user SSL traffic to external websites?
Which rule type controls end user SSL traffic to external websites?A . SSL Outbound Proxyless InspectionB . SSL Forward ProxyC . SSL Inbound InspectionD . SSH ProxyView AnswerAnswer: C
Which type of interface does a firewall use to forward decrypted traffic to a security chain for inspection?
Which type of interface does a firewall use to forward decrypted traffic to a security chain for inspection?A . Layer 2B . TapC . Layer 3D . Decryption MirrorView AnswerAnswer: C Explanation: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/network-packet-broker/configure-routed-layer-3-security-chains Configure security chain devices with Layer 3 interfaces to connect to the security chain network. These Layer...