Which path is used to save and load a configuration with a Palo Alto Networks firewall?

Which path is used to save and load a configuration with a Palo Alto Networks firewall?A . Device>Setup>ServicesB . Device>Setup>ManagementC . Device>Setup>OperationsD . Device>Setup>InterfacesView AnswerAnswer: C

March 3, 2022 No Comments READ MORE +

Which two statements are correct about App-ID content updates? (Choose two.)

Which two statements are correct about App-ID content updates? (Choose two.)A . Updated application content may change how security policy rules are enforcedB . After an application content update, new applications must be manually classified prior to useC . Existing security policy rules are not affected by application content updatesD...

March 2, 2022 No Comments READ MORE +

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?A . DoS protectionB . URL filteringC . packet bufferingD . anti-spywareView AnswerAnswer: A

March 2, 2022 No Comments READ MORE +

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None? A . Translation TypeB . InterfaceC . Address TypeD . IP AddressView AnswerAnswer: A

March 2, 2022 No Comments READ MORE +

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option? A . It defines the SSUTLS encryption strength used to protect the management interface.B . It defines the CA certificate used to verify the client's browser.C . It defines the certificate to send to the...

March 2, 2022 No Comments READ MORE +

Access to which feature requires the PAN-OS Filtering license?

Access to which feature requires the PAN-OS Filtering license?A . PAN-DB databaseB . DNS SecurityC . Custom URL categoriesD . URL external dynamic listsView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-andsubscriptions.html

March 1, 2022 No Comments READ MORE +

When is the content inspection performed in the packet flow process?

When is the content inspection performed in the packet flow process?A . after the application has been identifiedB . after the SSL Proxy re-encrypts the packetC . before the packet forwarding processD . before session lookupView AnswerAnswer: A Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0

March 1, 2022 No Comments READ MORE +

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal.B . It removes the 100K limit for DNS entries for the downloaded DNS updates.C . IT eliminates the need for dynamic DNS updates.D...

March 1, 2022 No Comments READ MORE +

What is the main function of the Test Policy Match function?

What is the main function of the Test Policy Match function?A . verify that policy rules from Expedition are validB . confirm that rules meet or exceed the Best Practice Assessment recommendationsC . confirm that policy rules in the configuration are allowing/denying the correct trafficD . ensure that policy rules...

March 1, 2022 No Comments READ MORE +

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)A . GlobalProtectB . PanoramaC . ApertureD . AutoFocusView AnswerAnswer: B,D

February 28, 2022 No Comments READ MORE +