What is the dependency for users to access services that require authentication?

What is the dependency for users to access services that require authentication?A . An Authentication profile that includes those services B. Disabling the authentication timeout C. An authentication sequence that includes those services D. A Security policy allowing users to access those servicesView AnswerAnswer: D

March 16, 2023 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

March 15, 2023 No Comments READ MORE +

Which action will this configuration cause on the matched traffic?

A Security policy rule is configured with a Vulnerability Protection Profile and an action of "Deny." Which action will this configuration cause on the matched traffic?A . The Profile Settings section will be grayed out when the Action is set to "Deny" B. It will cause the firewall to skip...

March 15, 2023 No Comments READ MORE +

Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?

An administrator can not see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama? A) B) C) D)...

March 15, 2023 No Comments READ MORE +

Which steps should an engineer take to forward system logs to email?

Which steps should an engineer take to forward system logs to email?A . Create a new email profile under Device > server profiles; then navigate to Objects > Log Forwarding profile > set log type to system and the add email profile. B. Enable log forwarding under the email profile...

March 15, 2023 No Comments READ MORE +

Which benefit do policy rule UUlDs provide?

Which benefit do policy rule UUlDs provide?A . An audit trail across a policy's lifespan B. Functionality for scheduling policy actions C. The use of user IP mapping and groups in policies D. Cloning of policies between device-groupsView AnswerAnswer: A

March 15, 2023 No Comments READ MORE +

What are three valid parameters of an SSL Decryption policy?

An engineer is tasked with enabling SSL decryption across the environment. What are three valid parameters of an SSL Decryption policy? (Choose three.)A . URL categories B. source users C. source and destination IP addresses D. App-ID E. GlobalProtect HIPView AnswerAnswer: A,B,C

March 15, 2023 No Comments READ MORE +

What can be used to create dynamic address groups?

What can be used to create dynamic address groups?A . dynamic address B. region objects C. tags D. FODN addressesView AnswerAnswer: C

March 15, 2023 No Comments READ MORE +

What two methods can be used to pull this data from third party proxies?

An engineer needs to collect User-ID mappings from the company's existing proxies. What two methods can be used to pull this data from third party proxies? (Choose two.)A . Syslog B. XFF Headers C. Client probing D. Server MonitoringView AnswerAnswer: A,B

March 15, 2023 No Comments READ MORE +

Which sessions does Packet Buffer Protection apply to?

An engineer is configuring Packet Buffer Protection on ingress zones to protect from single-session DoS attacks. Which sessions does Packet Buffer Protection apply to?A . It applies to existing sessions and is not global B. It applies to new sessions and is global C. It applies to new sessions and...

March 13, 2023 No Comments READ MORE +