Which two methods should be used to identify the dependent applications for the respective rule?

An administrator creates an application-based security policy rule and commits the change to the firewall. Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)A . Use the show predefined xpath <value> command and review the output. B. Review the App Dependency application...

March 19, 2023 No Comments READ MORE +

Four configuration choices are listed, and each could be used to block access to a specific URL II you configured each choice to block the same URL, then which choice would be evaluated last in the processing order to block access to the URL1?

Four configuration choices are listed, and each could be used to block access to a specific URL II you configured each choice to block the same URL, then which choice would be evaluated last in the processing order to block access to the URL1?A . PAN-DB URL category in URL...

March 18, 2023 No Comments READ MORE +

WildFire will submit for analysis blocked files that match which profile settings?

WildFire will submit for analysis blocked files that match which profile settings?A . files matching Anti-Spyware signatures B. files that are blocked by URL filtering C. files that are blocked by a File Blocking profile D. files matching Anti-Virus signaturesView AnswerAnswer: D

March 18, 2023 No Comments READ MORE +

Given the screenshot, how did the firewall handle the traffic?

Given the screenshot, how did the firewall handle the traffic? A . Traffic was allowed by profile but denied by policy as a threat B. Traffic was allowed by policy but denied by profile as.. C. Traffic was allowed by policy but denied by profile as .. D. Traffic was...

March 17, 2023 No Comments READ MORE +

Which configuration is backed up using the Scheduled Config Export feature in Panorama?

Which configuration is backed up using the Scheduled Config Export feature in Panorama?A . Panorama running configuration B. Panorama candidate configuration C. Panorama candidate configuration and candidate configuration of all managed devices D. Panorama running configuration and running configuration of all managed devicesView AnswerAnswer: D

March 17, 2023 No Comments READ MORE +

Place the steps in the WildFire process workflow in their correct order

DRAG DROP Place the steps in the WildFire process workflow in their correct order. View AnswerAnswer: Explanation: Timeline Description automatically generated https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/wildfire-overview/about-wildfire.html

March 16, 2023 No Comments READ MORE +

What two attributes should a forward trust certificate have?

A network administrator wants to deploy SSL Forward Proxy decryption. What two attributes should a forward trust certificate have? (Choose two.)A . A subject alternative name B. A private key C. A server certificate D. A certificate authority (CA) certificateView AnswerAnswer: A,C Explanation: When deploying SSL Forward Proxy decryption, a...

March 16, 2023 No Comments READ MORE +

Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?

A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged. Given...

March 16, 2023 No Comments READ MORE +

Which GlobalProtect component must be configured to enable Clientless VPN?

Which GlobalProtect component must be configured to enable Clientless VPN?A . GlobalProtect satellite B. GlobalProtect app C. GlobalProtect portal D. GlobalProtect gatewayView AnswerAnswer: C Explanation: Creating the GlobalProtect portal is as simple as letting it know if you have accessed it already. A new gateway for accessing the GlobalProtect portal...

March 16, 2023 No Comments READ MORE +

How should those rules be configured to ensure that they are evaluated with a high priority?

An administrator is building Security rules within a device group to block traffic to and from malicious locations How should those rules be configured to ensure that they are evaluated with a high priority?A . Create the appropriate rules with a Block action and apply them at the top of...

March 16, 2023 No Comments READ MORE +