Which two configurations should you check on the firewall?

A firewall should be advertising the static route 10.2.0.0/24 Into OSPF. The configuration on the neighbor is correct, but the route is not in the neighbor's routing table. Which two configurations should you check on the firewall? (Choose two.)A . In the OSFP configuration, ensure that the correct redistribution profile...

February 6, 2023 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

February 6, 2023 No Comments READ MORE +

Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?

An administrator can not see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama? A) B) C) D)...

February 6, 2023 No Comments READ MORE +

Which three file types does WildFire inline ML analyze?

An administrator wants to enable WildFire inline machine learning. Which three file types does WildFire inline ML analyze? (Choose three.)A . MS Office B. ELF C. APK D. VBscripts E. Powershell scriptsView AnswerAnswer: C, D, E

February 6, 2023 No Comments READ MORE +

What is a common obstacle for decrypting traffic from guest devices?

An organization wishes to roll out decryption but gets some resistance from engineering leadership regarding the guest network. What is a common obstacle for decrypting traffic from guest devices?A . Guest devices may not trust the CA certificate used for the forward untrust certificate. B. Guests may use operating systems...

February 6, 2023 No Comments READ MORE +

Which approach meets the two customer requirements?

SSL Forward Proxy decryption is configured but the firewall uses Untrusted-CA to sign the website https //www important-website com certificate End-users are receiving me "security certificate is not trusted is warning Without SSL decryption the web browser shows that the website certificate is trusted and signed by a well-known certificate...

February 5, 2023 No Comments READ MORE +

Before you upgrade a Palo Alto Networks NGFW, what must you do?

Before you upgrade a Palo Alto Networks NGFW, what must you do?A . Make sure that the PAN-OS support contract is valid for at least another year B. Export a device state of the firewall C. Make sure that the firewall is running a version of antivirus software and a...

February 5, 2023 No Comments READ MORE +

What is a common obstacle for decrypting traffic from guest devices?

An organization wishes to roll out decryption but gets some resistance from engineering leadership regarding the guest network. What is a common obstacle for decrypting traffic from guest devices?A . Guest devices may not trust the CA certificate used for the forward untrust certificate. B. Guests may use operating systems...

February 5, 2023 No Comments READ MORE +

Where is information about packet buffer protection logged?

Where is information about packet buffer protection logged?A . Alert entries are in the Alarms log. Entries for dropped traffic, discarded sessions, and blocked IP address are in the Threat log B. All entries are in the System log C. Alert entries are in the System log. Entries for dropped...

February 5, 2023 No Comments READ MORE +

When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator would turn on the feature inside which type of SD-WAN profile?

When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator would turn on the feature inside which type of SD-WAN profile?A . Certificate profile B. Path Quality profile C. SD-WAN Interface profile D. Traffic Distribution profileView AnswerAnswer: C

February 4, 2023 No Comments READ MORE +