Which statement is true regarding a Best Practice Assessment?

Which statement is true regarding a Best Practice Assessment?A . It runs only on firewalls.B . It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.C . When guided by an authorized sales engineer, it helps determine the areas...

April 25, 2022 No Comments READ MORE +

In the screenshot above, which two pieces of information can be determined from the ACC configuration shown? (Choose two.)

In the screenshot above, which two pieces of information can be determined from the ACC configuration shown? (Choose two.) A . Threats with a severity of "high" are always listed at the top of the Threat Name list.B . The ACC has been filtered to only show the FTP application.C...

April 24, 2022 No Comments READ MORE +

Which configuration task is best for reducing load on the management plane?

Which configuration task is best for reducing load on the management plane?A . Set the URL filtering action to send alerts.B . Enable session logging at start.C . Disable pre-defined reports.D . Disable logging on the default deny rule.View AnswerAnswer: C

April 24, 2022 No Comments READ MORE +

Where can they find this information?

A firewall administrator is trying to identify active routes learned via BGP in the virtual router runtime stats within the GUI. Where can they find this information?A . under the BGP Summary tabB . routes listed in the routing table with flags A?BC . routes listed in the forwarding table...

April 24, 2022 No Comments READ MORE +

Given the following snippet of a WildFire submission log, did the end-user get access to the requested information and why or why not?

Given the following snippet of a WildFire submission log, did the end-user get access to the requested information and why or why not? A . Yes. because the action is set to "allow ''B . No because WildFire classified the seventy as "high."C . Yes because the action is set...

April 23, 2022 No Comments READ MORE +

A bootstrap USB flash drive has been prepared using a Windows workstation to load the initial configuration of a Palo Alto Networks firewall that was previously being used in a lab. The USB flash drive was formatted using file system FAT32 and the initial configuration is stored in a file named init-cfg txt. The firewall is currently running PAN-OS 10.0 and using a lab config.

A bootstrap USB flash drive has been prepared using a Windows workstation to load the initial configuration of a Palo Alto Networks firewall that was previously being used in a lab. The USB flash drive was formatted using file system FAT32 and the initial configuration is stored in a file...

April 23, 2022 No Comments READ MORE +

SAML SLO is supported for which two firewall features? (Choose two.)

SAML SLO is supported for which two firewall features? (Choose two.)A . WebUIB . CLIC . GlobalProtectPortalD . CaptivePortalView AnswerAnswer: AC

April 22, 2022 No Comments READ MORE +

Which statement is correct given the following message from the PanGPA.log on the GlobalProtect app?

Which statement is correct given the following message from the PanGPA.log on the GlobalProtect app? Failed to connect to server at port: 4767 A. The GlobalProtect app failed to connect to the GlobalProtect Portal on port 4767. B. The PanGPS process failed to connect to the PanGPA process on port...

April 22, 2022 No Comments READ MORE +

Which three file types does WildFire inline ML analyze?

An administrator wants to enable WildFire inline machine learning. Which three file types does WildFire inline ML analyze? (Choose three.)A . APKB . VBscriptsC . MS OfficeD . ELFE . Powershell scriptsView AnswerAnswer: CDE

April 20, 2022 No Comments READ MORE +

What would allow a network security administrator to authenticate and identify a user with a new BYOD-type device that is not joined to the corporate domain?

What would allow a network security administrator to authenticate and identify a user with a new BYOD-type device that is not joined to the corporate domain?A . a Security policy with "known-user” selected in the Source User fieldB . an Authentication policy with "known-user” selected in the Source User fieldC...

April 20, 2022 No Comments READ MORE +