Given the size of this environment, which User-ID collection method is sufficient?

Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management-plane resources are lightly utilized. Given the size of this environment, which User-ID collection method is sufficient?A . Citrix terminal server agent deployed on the network B. Windows-based...

February 11, 2023 No Comments READ MORE +

Based on the screenshots above what is the correct order in which the various rules are deployed to firewalls inside the DATACENTER_DG device group?

Refer to the exhibit. Based on the screenshots above what is the correct order in which the various rules are deployed to firewalls inside the DATACENTER_DG device group?A . shared pre-rules DATACENTER DG pre rules rules configured locally on the firewall shared post-rules DATACENTER_DG post-rules DATACENTER.DG default rules B. shared...

February 11, 2023 No Comments READ MORE +

A company wants to install a PA-3060 firewall between two core switches on a VLAN trunk link. They need to assign each VLAN to its own zone and to assign untagged (native) traffic to its own zone which options differentiates multiple VLAN into separate zones?

A company wants to install a PA-3060 firewall between two core switches on a VLAN trunk link. They need to assign each VLAN to its own zone and to assign untagged (native) traffic to its own zone which options differentiates multiple VLAN into separate zones? A. Create V-Wire objects with...

February 10, 2023 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

February 10, 2023 No Comments READ MORE +

What is the minimum the administrator needs to configure in the Security rule to allow only Evernote?

An administrator is required to create an application-based Security policy rule to allow Evernote. The Evernote application implicitly uses SSL and web browsing. What is the minimum the administrator needs to configure in the Security rule to allow only Evernote?A . Add the Evernote application to the Security policy rule,...

February 10, 2023 No Comments READ MORE +

Which statement is true regarding a Best Practice Assessment?

Which statement is true regarding a Best Practice Assessment?A . It shows how your current configuration compares to Palo Alto Networks recommendations B. It runs only on firewalls C. When guided by an authorized sales engineer, it helps determine the areas of greatest risk where you should focus prevention activities....

February 10, 2023 No Comments READ MORE +

Which log type would provide information about traffic blocked by a Zone Protection profile?

Which log type would provide information about traffic blocked by a Zone Protection profile?A . Data Filtering B. IP-Tag C. Traffic D. ThreatView AnswerAnswer: C

February 10, 2023 No Comments READ MORE +

Which two statements correctly describe Session 380280? (Choose two.)

Which two statements correctly describe Session 380280? (Choose two.) A . The session went through SSL decryption processing. B. The session has ended with the end-reason unknown. C. The application has been identified as web-browsing. D. The session did not go through SSL decryption processing.View AnswerAnswer: A,C

February 9, 2023 No Comments READ MORE +

Why is the AE interface showing down on the passive firewall?

The Aggregate Ethernet interface is showing down on a passive PA-7050 firewall of an active/passive HA pair. The HA Passive Link State is set to "Auto" under Device > High Availability > General > Active/Passive Settings. The AE interface is configured with LACP enabled and is up only on the...

February 9, 2023 No Comments READ MORE +

Which three items are import considerations during SD-WAN configuration planning? (Choose three.)

Which three items are import considerations during SD-WAN configuration planning? (Choose three.)A . link requirements B. the name of the ISP C. IP Addresses D. branch and hub locationsView AnswerAnswer: A,C,D Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/sd-wan-overview/plan-sd-wan-configuration

February 9, 2023 No Comments READ MORE +