Which type of role-based access is most appropriate for this project?

A super user is tasked with creating administrator accounts for three contractors. For compliance purposes, all three contractors will be working with different device-groups m their hierarchy to deploy policies and objects. Which type of role-based access is most appropriate for this project?A . Create a Dynamic Admin with the...

July 8, 2023 No Comments READ MORE +

What must be taken into consideration when designing the device group structure?

An engineer is designing a deployment of multi-vsys firewalls. What must be taken into consideration when designing the device group structure?A . Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall must have all its vsys in a single device group. B. Only one...

July 8, 2023 No Comments READ MORE +

Which three items are import considerations during SD-WAN configuration planning? (Choose three.)

Which three items are import considerations during SD-WAN configuration planning? (Choose three.)A . link requirements B. the name of the ISP C. IP Addresses D. branch and hub locationsView AnswerAnswer: A,C,D Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/sd-wan-overview/plan-sd-wan-configuration

July 8, 2023 No Comments READ MORE +

Which two objects are configurable?

An administrator is configuring a Panorama device group Which two objects are configurable? (Choose two)A . DNS Proxy B. Address groups C. SSL/TLS roles D. URL Filtering profilesView AnswerAnswer: B,D Explanation: URL filtering is a feature in Palo Alto Networks firewalls that allows administrators to block access to specific URLs...

June 1, 2023 No Comments READ MORE +

When an in-band data port is set up to provide access to required services, what is required for an interface that is assigned to service routes?

When an in-band data port is set up to provide access to required services, what is required for an interface that is assigned to service routes?A . The interface must be used for traffic to the required services B. You must enable DoS and zone protection C. You must set...

June 1, 2023 No Comments READ MORE +

Which two configurations should you check on the firewall?

A firewall should be advertising the static route 10.2.0.0/24 Into OSPF. The configuration on the neighbor is correct, but the route is not in the neighbor's routing table. Which two configurations should you check on the firewall? (Choose two.)A . In the OSFP configuration, ensure that the correct redistribution profile...

June 1, 2023 No Comments READ MORE +

Where would the administrator go to edit a template variable at the device level?

An administrator needs to assign a specific DNS server to one firewall within a device group. Where would the administrator go to edit a template variable at the device level?A . Variable CSV export under Panorama > templates B. PDF Export under Panorama > templates C. Manage variables under Panorama...

May 31, 2023 No Comments READ MORE +

This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?

In an existing deployment, an administrator with numerous firewalls and Panorama does not see any WildFire logs in Panorama. Each firewall has an active WildFire subscription On each firewall. WildFire togs are available. This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is...

May 31, 2023 No Comments READ MORE +

Which two methods should be used to identify the dependent applications for the respective rule?

An administrator creates an application-based security policy rule and commits the change to the firewall. Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)A . Use the show predefined xpath <value> command and review the output. B. Review the App Dependency application...

May 31, 2023 No Comments READ MORE +

Which of the following statements is a best practice for SSL decryption?

An engineer is planning an SSL decryption implementation Which of the following statements is a best practice for SSL decryption?A . Use the same Forward Trust certificate on all firewalls in the network. B. Obtain a certificate from a publicly trusted root CA for the Forward Trust certificate. C. Obtain...

May 31, 2023 No Comments READ MORE +