Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)A . Include all traffic types in decryption policyB . Inability to access websitesC . Exclude certain types of traffic in decryption policyD . Deploy decryption setting all at one timeE . Ensure throughput...
Match the functions to the appropriate processing engine within the dataplane
DRAG DROP Match the functions to the appropriate processing engine within the dataplane. View AnswerAnswer:
What are two valid reasons for deploying Panorama in High Availability?
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer. The customer already has multiple M-100s set up as a log collector group . What are two valid reasons for deploying Panorama in High Availability? (Choose two.)A . Control of post rulesB...
When having a customer pre-sales call, which aspects of the NGFW should be covered?
When having a customer pre-sales call, which aspects of the NGFW should be covered?A . The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networksB . The Palo Alto Networks-developed URL...
When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?
When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?A . 1500 to 2500 bytesB . 10MB to 30 MBC . 1MB to 5 MBD . 100MB to 200 MBView AnswerAnswer: D
What are two advantages of the DNS Sinkholing feature? (Choose two.)
What are two advantages of the DNS Sinkholing feature? (Choose two.)A . It forges DNS replies to known malicious domains.B . It monitors DNS requests passively for malware domains.C . It can be deployed independently of an Anti-Spyware Profile.D . It can work upstream from the internal DNS server.View AnswerAnswer:...
Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)
Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)A . Network TabB . Policies TabC . Device TabD . Objects TabView AnswerAnswer: A,C Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/panorama-web-interface/panorama-templates/template-stacks
What are three considerations when deploying User-ID? (Choose three.)
What are three considerations when deploying User-ID? (Choose three.)A . Specify included and excluded networks when configuring User-IDB . Only enable User-ID on trusted zonesC . Use a dedicated service account for User-ID services with the minimal permissions necessaryD . User-ID can support a maximum of 15 hopsE . Enable...
What action would address the sub-optimal traffic path shown in the figure?
What action would address the sub-optimal traffic path shown in the figure? Key: RN - Remote Network SC - Service Connection MU GW - Mobile User GatewayA . Onboard a Service Connection in the Americas regionB . Remove the Service Connection in the EMEA regionC . Onboard a Service Connection...
Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.
Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.A . 5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YRB ....