Which two components are required to configure certificate based, secure authentication to the web Ul?
An administrator needs firewall access on a trusted interface. Which two components are required to configure certificate based, secure authentication to the web Ul? (Choose two)A . certificate profile B. server certificate C. SSH Service Profile D. SSL/TLS Service ProfileView AnswerAnswer: A,B
The UDP-4501 protocol-port is used between which two GlobalProtect components?
The UDP-4501 protocol-port is used between which two GlobalProtect components?A . GlobalProtect app and GlobalProtect gateway B. GlobalProtect portal and GlobalProtect gateway C. GlobalProtect app and GlobalProtect satellite D. GlobalProtect app and GlobalProtect portalView AnswerAnswer: A Explanation: UDP 4501 Used for IPSec tunnel connections between GlobalProtect apps and gateways. https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-globalprotect.html
Which CLI command is used to determine how much disk space is allocated to logs?
Which CLI command is used to determine how much disk space is allocated to logs?A . show logging-status B. show system info C. debug log-receiver show D. show system logdfo-quotaView AnswerAnswer: D
Which Panorama feature protects logs against data loss if a Panorama server fails?
Which Panorama feature protects logs against data loss if a Panorama server fails?A . Panorama HA automatically ensures that no logs are lost if a server fails inside the HA Cluster. B. Panorama Collector Group with Log Redundancy ensures that no logs are lost if a server fails inside the...
Which strategy is consistent with decryption best practices to ensure consistent performance?
A network security engineer wants to prevent resource-consumption issues on the firewall. Which strategy is consistent with decryption best practices to ensure consistent performance?A . Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic B. Use PFS in a...
Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)
Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)A . inherit address-objects from templates B. define a common standard template configuration for firewalls C. standardize server profiles and authentication configuration across all stacks D. standardize log-forwarding profiles for security polices across all stacksView...
In the screenshot above which two pieces ot information can be determined from the ACC configuration shown? (Choose two)
In the screenshot above which two pieces ot information can be determined from the ACC configuration shown? (Choose two) A . The Network Activity tab will display all applications, including FTP. B. Threats with a severity of "high" are always listed at the top of the Threat Name list C....
Which source should be used for User-ID mappings?
A company is using wireless controllers to authenticate users. Which source should be used for User-ID mappings?A . Syslog B. XFF headers C. server monitoring D. client probingView AnswerAnswer: A
Which statement regarding HA timer settings is true?
Which statement regarding HA timer settings is true?A . Use the Recommended profile for typical failover timer settings B. Use the Moderate profile for typical failover timer settings C. Use the Aggressive profile for slower failover timer settings. D. Use the Critical profile for faster failover timer settings.View AnswerAnswer: A
Which three actions will help the administrator troubleshool this issue?
An administrator is seeing one of the firewalls in a HA active/passive pair moved to 'suspended" state due to Non-functional loop. Which three actions will help the administrator troubleshool this issue? (Choose three.)A . Use the CLI command show high-availability flap-statistics B. Check the HA Link Monitoring interface cables. C....