Which NGFW receives the configuration from Panorama?
An administrator pushes a new configuration from Panorama to a pair of firewalls that are configured as an active/passive HA pair. Which NGFW receives the configuration from Panorama? A. The Passive firewall, which then synchronizes to the active firewall B. The active firewall, which then synchronizes to the passive firewall C. Both the active and […]
Which priority is correct for the passive firewall?
An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall. Which priority is correct for the passive firewall? A. 0 B. 99 C. 1 D. 255 Reference: https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/framemaker/71/pan-os/pan-os/section_5.pdf (page 9)
Which VPN configuration would adapt to changes when deployed to the future site?
A company needs to preconfigure firewalls to be sent to remote sites with the least amount of reconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers. Which VPN configuration would adapt to changes when deployed to the future site? A. Preconfigured GlobalProtect […]
Which Security Profile type will protect against worms and trojans?
An administrator has been asked to configure a Palo Alto Networks NGFW to provide protection against worms and trojans. Which Security Profile type will protect against worms and trojans? A. Anti-Spyware B. Instruction Prevention C. File Blocking D. Antivirus Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/antivirus-profiles
Which two mandatory options are used to configure a VLAN interface?
A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. Which two mandatory options are used to configure a VLAN interface? (Choose two.) A. Virtual router B. Security zone C. ARP entries D. Netflow Profile Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/network/network-interfaces/pa-7000-series-layer-2-interface#idd2bcaacc-54b9-4ec9-a1dd-8064499f5b9d
How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all exist
Refer to exhibit. An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported excessive traffic on the corporate WAN. How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all existing monitoring platforms? A. Forward logs from firewalls […]
Which CLI command is used to simulate traffic going through the firewall and determine which Security policy r
Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic? A. check B. find C. test D. sim Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Window
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory? A. Windows session monitoring via a domain controller B. passive server monitoring using the Windows-based agent C. Captive Portal D. passive server monitoring using a PAN-OS integrated User-ID agent
Which two statements are correct about App-ID content updates?
Which two statements are correct about App-ID content updates? (Choose two.) A. Updated application content may change how security policy rules are enforced B. After an application content update, new applications must be manually classified prior to use C. Existing security policy rules are not affected by application content updates D. After an application content […]
Actions can be set for which two items in a URL filtering security profile?
Actions can be set for which two items in a URL filtering security profile? (Choose two.) A. Block List B. Custom URL Categories C. PAN-DB URL Categories D. Allow List