Which three actions can Panorama perform when deploying PAN-OS images to its managed devices? (Choose three.)

Which three actions can Panorama perform when deploying PAN-OS images to its managed devices? (Choose three.)A . upload-only B. upload and install and reboot C. verify and install D. upload and install E. install and rebootView AnswerAnswer: A B C

November 18, 2022 No Comments READ MORE +

What can an engineer use with GlobalProtect to distribute user-specific client certificates to each GlobalProtect user?

What can an engineer use with GlobalProtect to distribute user-specific client certificates to each GlobalProtect user?A . Certificate profile B. SSL/TLS Service profile C. OCSP Responder D. SCEPView AnswerAnswer: D

November 18, 2022 No Comments READ MORE +

Which three use cases are valid reasons for requiring an Active/Active high availability deployment? (Choose three.)

Which three use cases are valid reasons for requiring an Active/Active high availability deployment? (Choose three.)A . The environment requires real, full-time redundancy from both firewalls at all times B. The environment requires Layer 2 interfaces in the deployment C. The environment requires that both firewalls maintain their own routing...

November 17, 2022 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre Office B. Create an Application Group and add business-systems to...

November 17, 2022 No Comments READ MORE +

How will the rule order populate once pushed to the firewall?

the firewall's device group as post-rules How will the rule order populate once pushed to the firewall?A . shared device group policies, firewall device group policies. local policies. B. firewall device group policies, local policies. shared device group policies C. shared device group policies. local policies, firewall device group policies...

November 17, 2022 No Comments READ MORE +

Which combination of service and application, and order of Security policy rules, needs to be configured to allow cJeartext web-browsing traffic to this server on tcp/443?

A web server is hosted in the DMZ and the server is configured to listen for incoming connections on TCP port 443 A Security policies rules allowing access from the Trust zone to the DMZ zone needs to be configured to allow web-browsing access. The web server hosts its contents...

November 16, 2022 No Comments READ MORE +

How should those rules be configured to ensure that they are evaluated with a high priority?

An administrator is building Security rules within a device group to block traffic to and from malicious locations How should those rules be configured to ensure that they are evaluated with a high priority?A . Create the appropriate rules with a Block action and apply them at the top of...

November 16, 2022 No Comments READ MORE +

Which strategy is consistent with decryption best practices to ensure consistent performance?

A network security engineer wants to prevent resource-consumption issues on the firewall. Which strategy is consistent with decryption best practices to ensure consistent performance?A . Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic B. Use PFS in a...

November 16, 2022 No Comments READ MORE +

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)A . inherit address-objects from templates B. define a common standard template configuration for firewalls C. standardize server profiles and authentication configuration across all stacks D. standardize log-forwarding profiles for security polices across all stacksView...

November 16, 2022 No Comments READ MORE +

A bootstrap USB flash drive has been prepared using a Windows workstation to load the initial configuration of a Palo Alto Networks firewall that was previously being used in a lab. The USB flash drive was formatted using file system FAT32 and the initial configuration is stored in a file named init-cfg txt. The firewall is currently running PAN-OS 10.0 and using a lab config.

A bootstrap USB flash drive has been prepared using a Windows workstation to load the initial configuration of a Palo Alto Networks firewall that was previously being used in a lab. The USB flash drive was formatted using file system FAT32 and the initial configuration is stored in a file...

November 16, 2022 No Comments READ MORE +