A bootstrap USB flash drive has been prepared using a Windows workstation to load the initial configuration of a Palo Alto Networks firewall that was previously being used in a lab. The USB flash drive was formatted using file system FAT32 and the initial configuration is stored in a file named init-cfg txt. The firewall is currently running PAN-OS 10.0 and using a lab config.
A bootstrap USB flash drive has been prepared using a Windows workstation to load the initial configuration of a Palo Alto Networks firewall that was previously being used in a lab. The USB flash drive was formatted using file system FAT32 and the initial configuration is stored in a file...
Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?
Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?A . checkB . findC . testD . simView AnswerAnswer: C Explanation: Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html
What must the administrator configure so that the PAN-OS® software can be upgraded?
An administrator needs to upgrade a Palo Alto Networks NGFW to the most current version of PAN-OS® software. The firewall has internet connectivity through an Ethernet interface, but no internet connectivity from the management interface. The Security policy has the default security rules and a rule that allows all web-browsing...
Which Security Profile type will prevent this attack?
An administrator has been asked to configure a Palo Alto Networks NGFW to provide protection against external hosts attempting to exploit a flaw in an operating system on an internal system. Which Security Profile type will prevent this attack?A . Vulnerability ProtectionB . Anti-SpywareC . URL FilteringD . AntivirusView AnswerAnswer:...
How can the Palo Alto Networks NGFW be configured to specifically protect this server against session floods originating from a single IP address?
A client has a sensitive application server in their data center and is particularly concerned about session flooding because of denial of-service attacks. How can the Palo Alto Networks NGFW be configured to specifically protect this server against session floods originating from a single IP address?A . Define a custom...
Which method does an administrator use to integrate all non-native MFA platforms in PAN-OS® software?
Which method does an administrator use to integrate all non-native MFA platforms in PAN-OS® software?A . OktaB . DUOC . RADIUSD . PingIDView AnswerAnswer: C Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/authentication-types/multi-factor-authentication
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?
When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?A . To enable Gateway authentication to the PortalB . To enable Portal authentication to the GatewayC . To enable user authentication to the PortalD . To enable client machine authentication to the PortalView AnswerAnswer: C Explanation:...
If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?
If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?A . The settings assigned to the template that is on top of the stack.B . The administrator will be...
If the firewall has the link monitoring configuration, what will cause a failover?
If the firewall has the link monitoring configuration, what will cause a failover? A . ethernet1/3 and ethernet1/6 going downB . ethernet1/3 going downC . ethernet1/3 or Ethernet1/6 going downD . ethernet1/6 going downView AnswerAnswer: A
To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate traffic to drop, you can configure.
To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate traffic to drop, you can configure.A . BGP (Border Gateway Protocol)B . PBP (Packet Buffer Protection)C . PGP (Packet Gateway Protocol)D . PBP (Protocol Based Protection)View AnswerAnswer:...