How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the office-suite applications of their choice . How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems...

March 17, 2022 No Comments READ MORE +

When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?

When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?A . Disable HAB . Disable the HA2 linkC . Disable config syncD . Set the passive link state to 'shutdown.-View AnswerAnswer: C Explanation: Updated reference: https://docs.paloaltonetworks.com/panorama/10-1/panorama-admin/manage-firewalls/transition-a-firewall-to-panorama-management/migrate-a-firewall-ha-pair-to-panorama-management.html Step 2 is...

March 17, 2022 No Comments READ MORE +

If the firewall has the displayed link monitoring configuration what will cause a failover?

Use the image below. If the firewall has the displayed link monitoring configuration what will cause a failover?A . ethernet1/3 and ethernet1/6 going downB . ethernet1/3 going downC . ethernet1/6 going downD . ethernet1/3 or ethernet1/6 going downView AnswerAnswer: A Explanation: Link Monitoring Failure Condition is All / Link Group...

March 17, 2022 No Comments READ MORE +

Which interface type would support this business requirement?

An administrator needs to implement an NGFW between their DMZ and Core network EIGRP Routing between the two environments is required. Which interface type would support this business requirement?A . Layer 3 interfaces but configuring EIGRP on the attached virtual routerB . Virtual Wire interfaces to permit EIGRP routing to...

March 17, 2022 No Comments READ MORE +

Before doing so, what must the administrator consider?

An administrator wants to enable zone protection Before doing so, what must the administrator consider?A . Activate a zone protection subscription.B . To increase bandwidth no more than one firewall interface should be connected to a zoneC . Security policy rules do not prevent lateral movement of traffic between zonesD...

March 17, 2022 No Comments READ MORE +

Which method can capture IP-to-user mapping information for users on the Linux machines?

Users within an enterprise have been given laptops that are joined to the corporate domain. In some cases, IT has also deployed Linux-based OS systems with a graphical desktop. Information Security needs IP-to-user mapping, which it will use in group-based policies that will limit internet access for the Linux desktop...

March 17, 2022 No Comments READ MORE +

What are three valid qualifiers for a Decryption Policy Rule match? (Choose three)

What are three valid qualifiers for a Decryption Policy Rule match? (Choose three)A . Destination ZoneB . App-IDC . Custom URL CategoryD . User-IDE . Source InterfaceView AnswerAnswer: A,C,D

March 17, 2022 No Comments READ MORE +

Where does the administrator view the desired data?

An administrator needs to gather information about the CPU utilization on both the management plane and the data plane Where does the administrator view the desired data?A . Monitor > UtilizationB . Resources Widget on the DashboardC . Support > ResourcesD . Application Command and Control CenterView AnswerAnswer: A

March 17, 2022 No Comments READ MORE +

What are two common reasons to use a "No Decrypt" action to exclude traffic from SSL decryption? (Choose two.)

What are two common reasons to use a "No Decrypt" action to exclude traffic from SSL decryption? (Choose two.)A . the website matches a category that is not allowed for most usersB . the website matches a high-risk categoryC . the web server requires mutual authenticationD . the website matches...

March 17, 2022 No Comments READ MORE +

Which two statements are true for the DNS Security service? (Choose two.)

Which two statements are true for the DNS Security service? (Choose two.)A . It eliminates the need for dynamic DNS updatesB . It functions like PAN-DB and requires activation through the app portalC . It removes the 100K limit for DNS entries for the downloaded DNS updatesD . It is...

March 16, 2022 No Comments READ MORE +