Which two components are required to configure certificate based, secure authentication to the web Ul?

An administrator needs firewall access on a trusted interface. Which two components are required to configure certificate based, secure authentication to the web Ul? (Choose two)A . certificate profile B. server certificate C. SSH Service Profile D. SSL/TLS Service ProfileView AnswerAnswer: A,B

March 10, 2023 No Comments READ MORE +

The UDP-4501 protocol-port is used between which two GlobalProtect components?

The UDP-4501 protocol-port is used between which two GlobalProtect components?A . GlobalProtect app and GlobalProtect gateway B. GlobalProtect portal and GlobalProtect gateway C. GlobalProtect app and GlobalProtect satellite D. GlobalProtect app and GlobalProtect portalView AnswerAnswer: A Explanation: UDP 4501 Used for IPSec tunnel connections between GlobalProtect apps and gateways. https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-globalprotect.html

March 9, 2023 No Comments READ MORE +

Which CLI command is used to determine how much disk space is allocated to logs?

Which CLI command is used to determine how much disk space is allocated to logs?A . show logging-status B. show system info C. debug log-receiver show D. show system logdfo-quotaView AnswerAnswer: D

March 9, 2023 No Comments READ MORE +

Which Panorama feature protects logs against data loss if a Panorama server fails?

Which Panorama feature protects logs against data loss if a Panorama server fails?A . Panorama HA automatically ensures that no logs are lost if a server fails inside the HA Cluster. B. Panorama Collector Group with Log Redundancy ensures that no logs are lost if a server fails inside the...

March 9, 2023 No Comments READ MORE +

Which strategy is consistent with decryption best practices to ensure consistent performance?

A network security engineer wants to prevent resource-consumption issues on the firewall. Which strategy is consistent with decryption best practices to ensure consistent performance?A . Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic B. Use PFS in a...

March 9, 2023 No Comments READ MORE +

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)A . inherit address-objects from templates B. define a common standard template configuration for firewalls C. standardize server profiles and authentication configuration across all stacks D. standardize log-forwarding profiles for security polices across all stacksView...

March 9, 2023 No Comments READ MORE +

In the screenshot above which two pieces ot information can be determined from the ACC configuration shown? (Choose two)

In the screenshot above which two pieces ot information can be determined from the ACC configuration shown? (Choose two) A . The Network Activity tab will display all applications, including FTP. B. Threats with a severity of "high" are always listed at the top of the Threat Name list C....

March 8, 2023 No Comments READ MORE +

Which source should be used for User-ID mappings?

A company is using wireless controllers to authenticate users. Which source should be used for User-ID mappings?A . Syslog B. XFF headers C. server monitoring D. client probingView AnswerAnswer: A

March 8, 2023 No Comments READ MORE +

Which statement regarding HA timer settings is true?

Which statement regarding HA timer settings is true?A . Use the Recommended profile for typical failover timer settings B. Use the Moderate profile for typical failover timer settings C. Use the Aggressive profile for slower failover timer settings. D. Use the Critical profile for faster failover timer settings.View AnswerAnswer: A

March 8, 2023 No Comments READ MORE +

Which three actions will help the administrator troubleshool this issue?

An administrator is seeing one of the firewalls in a HA active/passive pair moved to 'suspended" state due to Non-functional loop. Which three actions will help the administrator troubleshool this issue? (Choose three.)A . Use the CLI command show high-availability flap-statistics B. Check the HA Link Monitoring interface cables. C....

March 8, 2023 No Comments READ MORE +