Which tool provides an administrator the ability to see trends in traffic over periods of time, such as threats detected in the last 30 days?

Which tool provides an administrator the ability to see trends in traffic over periods of time, such as threats detected in the last 30 days?A . Session BrowserB . Application Command CenterC . TCP DumpD . Packet CaptureView AnswerAnswer: B Explanation: Reference: https://live.paloaltonetworks.com/t5/Management-Articles/Tips-amp-Tricks-How-to-Use-the-Application-Command-Center- ACC/ta-p/67342

September 19, 2021 No Comments READ MORE +

Which two virtualization platforms officially support the deployment of Palo Alto Networks VM-Series firewalls? (Choose two.)

Which two virtualization platforms officially support the deployment of Palo Alto Networks VM-Series firewalls? (Choose two.)A . Red Hat Enterprise Virtualization (RHEV)B . Kernel Virtualization Module (KVM)C . Boot Strap Virtualization Module (BSVM)D . Microsoft Hyper-VView AnswerAnswer: B,D Explanation: Reference: https://www.paloaltonetworks.com/products/secure-the-network/virtualized-next-generation-firewall/vm-series docs.paloaltonetworks.com/vm-series/8-0/vm-series-deployment/about-the-vm-series-firewall/vm-series-deployments

September 19, 2021 No Comments READ MORE +

What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure an SSL/TLS connection?

What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure an SSL/TLS connection?A . link stateB . stateful firewall connectionC . certificatesD . profilesView AnswerAnswer: C Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-overview.html#:~:text=SSL%20decryption%20(both%20forward%20proxy,secure%20an%2 0SSL%2FTLS%20connection.

September 19, 2021 No Comments READ MORE +

Given the following configuration, which route is used for destination 10.10.0.4?

Given the following configuration, which route is used for destination 10.10.0.4? A . Route 4B . Route 3C . Route 1D . Route 3View AnswerAnswer: A

September 19, 2021 1 Comment READ MORE +

Which certificate authority (CA) certificate will be used to sign the untrusted webserver certificate?

The SSL Forward Proxy decryption policy is configured. The following four certificate authority (CA) certificates are installed on the firewall. An end-user visits the untrusted website https //www firewall-do-not-trust-website com Which certificate authority (CA) certificate will be used to sign the untrusted webserver certificate?A . Forward-Untrust-CertificateB . Forward-Trust-CertificateC . Firewall-CAD...

September 19, 2021 No Comments READ MORE +

Which feature must you configure to prevent users form accidentally submitting their corporate credentials to a phishing website?

Which feature must you configure to prevent users form accidentally submitting their corporate credentials to a phishing website?A . URL Filtering profileB . Zone Protection profileC . Anti-Spyware profileD . Vulnerability Protection profileView AnswerAnswer: A Explanation: Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/threat-prevention/prevent-credential-phishing

September 19, 2021 No Comments READ MORE +

To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate traffic to drop, you can configure.

To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate traffic to drop, you can configure.A . BGP (Border Gateway Protocol)B . PBP (Packet Buffer Protection)C . PGP (Packet Gateway Protocol)D . PBP (Protocol Based Protection)View AnswerAnswer:...

September 19, 2021 1 Comment READ MORE +

During the packet flow process, which two processes are performed in application identification? (Choose two.)

During the packet flow process, which two processes are performed in application identification? (Choose two.)A . Pattern based application identificationB . Application override policy matchC . Application changed from content inspectionD . Session application identified.View AnswerAnswer: A,B Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0 http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

September 19, 2021 No Comments READ MORE +

connected through a terminal server?

Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?A . port mappingB . server monitoringC . client probingD . XFF headersView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-mapping-for-terminal-server-users

September 18, 2021 No Comments READ MORE +

How does adding the WildFire subscription improve the security posture of the organization1?

An administrator has a PA-820 firewall with an active Threat Prevention subscription. The administrator is considering adding a WildFire subscription How does adding the WildFire subscription improve the security posture of the organization1?A . Protection against unknown malware can be provided in near real-timeB . WildFire and Threat Prevention combine...

September 18, 2021 No Comments READ MORE +