What can be configured on one pair of firewalls to modify the MAC addresses so they are no longer in conflict?

An administrator has two pairs of firewalls within the same subnet. Both pairs of firewalls have been configured to use High Availability mode with Active/Passive. The ARP tables for upstream routes display the same MAC address being shared for some of these firewalls. What can be configured on one pair...

July 14, 2023 No Comments READ MORE +

Which data flow describes redistribution of user mappings?

Which data flow describes redistribution of user mappings?A . User-ID agent to firewall B. firewall to firewall C. Domain Controller to User-ID agent D. User-ID agent to PanoramaView AnswerAnswer: B Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/configure-firewalls-to-redistribute-user-mapping-information https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/deploy-user-id-in-a-large-scale-network/redistribute-user-mappings-and-authentication-timestamps/firewall-deployment-for-user-id-redistribution.html#ide3661b46-4722-4936-bb9b-181679306809

July 14, 2023 No Comments READ MORE +

What are two best practices for incorporating new and modified App-IDs? (Choose two)

What are two best practices for incorporating new and modified App-IDs? (Choose two)A . Configure a security policy rule to allow new App-lDs that might have network-wide impact B. Study the release notes and install new App-IDs if they are determined to have low impact C. Perform a Best Practice...

July 14, 2023 No Comments READ MORE +

Which dynamic role does the administrator assign to the new-hire colleague?

An administrator wants to grant read-only access to all firewall settings, except administrator accounts, to a new-hire colleague in the IT department. Which dynamic role does the administrator assign to the new-hire colleague?A . Device administrator (read-only) B. System administrator (read-only) C. Firewall administrator (read-only) D. Superuser (read-only)View AnswerAnswer: A...

July 14, 2023 No Comments READ MORE +

What should you recommend?

When planning to configure SSL Froward Proxy on a PA 5260, a user asks how SSL decryption can be implemented using phased approach in alignment with Palo Alto Networks best practices What should you recommend?A . Enable SSL decryption for known malicious source IP addresses B. Enable SSL decryption for...

July 14, 2023 No Comments READ MORE +

Which feature of Panorama allows an administrator to create a single network configuration that can be reused repeatedly for large-scale deployments even if values of configured objects, such as routes and interface addresses, change?

Which feature of Panorama allows an administrator to create a single network configuration that can be reused repeatedly for large-scale deployments even if values of configured objects, such as routes and interface addresses, change?A . Template stacks B. Template variables C. The Shared device group D. A device groupView AnswerAnswer:...

July 14, 2023 No Comments READ MORE +

How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?

How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?A . Use the debug dataplane packet-diag set capture stage firewall file command. B. Enable all four stages of traffic capture (TX, RX, DROP, Firewall). C. Use the debug dataplane packet-diag set capture stage management...

July 14, 2023 No Comments READ MORE +

Where is Palo Alto Networks Device Telemetry data stored on a firewall with a device certificate installed?

Where is Palo Alto Networks Device Telemetry data stored on a firewall with a device certificate installed?A . Cortex Data Lake B. Panorama C. On Palo Alto Networks Update Servers D. M600 Log CollectorsView AnswerAnswer: A Explanation: The Device Telemetry data is stored on Cortex Data Lake3, which is a...

July 14, 2023 No Comments READ MORE +

When using SSH keys for CLI authentication for firewall administration, which method is used for authorization?

When using SSH keys for CLI authentication for firewall administration, which method is used for authorization?A . Local B. LDAP C. Kerberos D. RadiusView AnswerAnswer: A Explanation: When using SSH keys for CLI authentication for firewall administration, the method used for authorization is local. This is described in the Palo...

July 13, 2023 No Comments READ MORE +

When creating a new rule, what is needed to allow the application to resolve dependencies?

A firewall engineer reviews the PAN-OS GlobalProtect application and sees that it implicitly uses web-browsing and depends on SSL. When creating a new rule, what is needed to allow the application to resolve dependencies?A . Add SSL and web-browsing applications to the same rule. B. Add web-browsing application to the...

July 13, 2023 No Comments READ MORE +