Which configuration task is best for reducing load on the management plane?

Which configuration task is best for reducing load on the management plane?A . Disable logging on the default deny rule B. Enable session logging at start C. Disable pre-defined reports D. Set the URL filtering action to send alertsView AnswerAnswer: C Explanation: Report generation can also consume considerable resources, while...

July 22, 2023 No Comments READ MORE +

Based on the graphic which statement accurately describes the output shown in the Server Monitoring panel?

Based on the graphic which statement accurately describes the output shown in the Server Monitoring panel? A. The User-ID agent is connected to a domain controller labeled lab-client B. The host lab-client has been found by a domain controller C. The host lab-client has been found by the User-ID agent....

July 22, 2023 No Comments READ MORE +

What are two explanations for this type of issue?

After configuring HA in Active/Passive mode on a pair of firewalls the administrator gets a failed commit with the following details. What are two explanations for this type of issue? (Choose two)A . The peer IP is not included in the permit list on Management Interface Settings B. The Backup...

July 21, 2023 No Comments READ MORE +

Which profile or certificate is required before any traffic that matches an SSL decryption rule is decrypted?

An engineer must configure a new SSL decryption deployment. Which profile or certificate is required before any traffic that matches an SSL decryption rule is decrypted?A . There must be a certificate with both the Forward Trust option and Forward Untrust option selected. B. A Decryption profile must be attached...

July 21, 2023 No Comments READ MORE +

How can an administrator use the Panorama device-deployment option to update the apps and threat version of an HA pair of managed firewalls?

How can an administrator use the Panorama device-deployment option to update the apps and threat version of an HA pair of managed firewalls?A . Configure the firewall's assigned template to download the content updates. B. Choose the download and install action for both members of the HA pair in the...

July 21, 2023 No Comments READ MORE +

Which log type would provide information about traffic blocked by a Zone Protection profile?

Which log type would provide information about traffic blocked by a Zone Protection profile?A . Data Filtering B. IP-Tag C. Traffic D. ThreatView AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clm9CAC Zone Protection profile is a set of security policies that you can apply to an interface or zone to protect it from reconnaissance,...

July 21, 2023 No Comments READ MORE +

Which three types of interfaces support SSL Forward Proxy?

An engineer configures SSL decryption in order to have more visibility to the internal users' traffic when it is regressing the firewall. Which three types of interfaces support SSL Forward Proxy? (Choose three.)A . High availability (HA) B. Layer 2 C. Virtual Wire D. Tap E. Layer 3View AnswerAnswer: A,C,E

July 21, 2023 No Comments READ MORE +

Which statement accurately describes service routes and virtual systems?

Which statement accurately describes service routes and virtual systems?A . Virtual systems that do not have specific service routes configured inherit the global service and service route settings for the firewall. B. Virtual systems can only use one interface for all global service and service routes of the firewall. C....

July 21, 2023 No Comments READ MORE +

Which three items are import considerations during SD-WAN configuration planning? (Choose three.)

Which three items are import considerations during SD-WAN configuration planning? (Choose three.)A . link requirements B. the name of the ISP C. IP Addresses D. branch and hub locationsView AnswerAnswer: A,C,D Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/sd-wan-overview/plan-sd-wan-configuration

July 21, 2023 No Comments READ MORE +

Which Decryption Broker security chain supports bi-directional traffic flow?

An engineer must configure the Decryption Broker feature Which Decryption Broker security chain supports bi-directional traffic flow?A . Layer 2 security chain B. Layer 3 security chain C. Transparent Bridge security chain D. Transparent Proxy security chainView AnswerAnswer: B Explanation: Together, the primary and secondary interfaces form a pair of...

July 20, 2023 No Comments READ MORE +