What is the dependency for users to access services that require authentication?
What is the dependency for users to access services that require authentication?A . An Authentication profile that includes those services B. Disabling the authentication timeout C. An authentication sequence that includes those services D. A Security policy allowing users to access those servicesView AnswerAnswer: D
Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?
Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...
Which action will this configuration cause on the matched traffic?
A Security policy rule is configured with a Vulnerability Protection Profile and an action of "Deny." Which action will this configuration cause on the matched traffic?A . The Profile Settings section will be grayed out when the Action is set to "Deny" B. It will cause the firewall to skip...
Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?
An administrator can not see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama? A) B) C) D)...
Which steps should an engineer take to forward system logs to email?
Which steps should an engineer take to forward system logs to email?A . Create a new email profile under Device > server profiles; then navigate to Objects > Log Forwarding profile > set log type to system and the add email profile. B. Enable log forwarding under the email profile...
Which benefit do policy rule UUlDs provide?
Which benefit do policy rule UUlDs provide?A . An audit trail across a policy's lifespan B. Functionality for scheduling policy actions C. The use of user IP mapping and groups in policies D. Cloning of policies between device-groupsView AnswerAnswer: A
What are three valid parameters of an SSL Decryption policy?
An engineer is tasked with enabling SSL decryption across the environment. What are three valid parameters of an SSL Decryption policy? (Choose three.)A . URL categories B. source users C. source and destination IP addresses D. App-ID E. GlobalProtect HIPView AnswerAnswer: A,B,C
What can be used to create dynamic address groups?
What can be used to create dynamic address groups?A . dynamic address B. region objects C. tags D. FODN addressesView AnswerAnswer: C
What two methods can be used to pull this data from third party proxies?
An engineer needs to collect User-ID mappings from the company's existing proxies. What two methods can be used to pull this data from third party proxies? (Choose two.)A . Syslog B. XFF Headers C. Client probing D. Server MonitoringView AnswerAnswer: A,B
Which sessions does Packet Buffer Protection apply to?
An engineer is configuring Packet Buffer Protection on ingress zones to protect from single-session DoS attacks. Which sessions does Packet Buffer Protection apply to?A . It applies to existing sessions and is not global B. It applies to new sessions and is global C. It applies to new sessions and...