Which statement best describes the Automated Commit Recovery feature?

Which statement best describes the Automated Commit Recovery feature?A . It performs a connectivity check between the firewall and Panorama after every configuration commit on the firewall. It reverts the configuration changes on the firewall if the check fails. B. It restores the running configuration on a firewall and Panorama...

November 10, 2022 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

November 10, 2022 No Comments READ MORE +

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?A . Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection B. Create a zone protection profile...

November 9, 2022 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre Office B. Create an Application Group and add business-systems to...

November 9, 2022 No Comments READ MORE +

When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator would turn on the feature inside which type of SD-WAN profile?

When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator would turn on the feature inside which type of SD-WAN profile?A . Certificate profile B. Path Quality profile C. SD-WAN Interface profile D. Traffic Distribution profileView AnswerAnswer: C

November 9, 2022 No Comments READ MORE +

When upgrading Log Collectors to 10.2, you must do what?

You have upgraded Panorama to 10.2 and need to upgrade six Log Collectors. When upgrading Log Collectors to 10.2, you must do what?A . Upgrade the Log Collectors one at a time. B. Add Panorama Administrators to each Managed Collector. C. Add a Global Authentication Profile to each Managed Collector....

November 9, 2022 No Comments READ MORE +

What are three reasons for excluding a site from SSL decryption? (Choose three.)

What are three reasons for excluding a site from SSL decryption? (Choose three.)A . the website is not present in English B. unsupported ciphers C. certificate pinning D. unsupported browser version E. mutual authenticationView AnswerAnswer: B,C,E Explanation: Reasons that sites break decryption technically include pinned certificates, client authentication, incomplete certificate...

November 9, 2022 No Comments READ MORE +

What happens when an A/P firewall cluster synchronies IPsec tunnel security associations (SAs)?

What happens when an A/P firewall cluster synchronies IPsec tunnel security associations (SAs)?A . Phase 2 SAs are synchronized over HA2 links B. Phase 1 and Phase 2 SAs are synchronized over HA2 links C. Phase 1 SAs are synchronized over HA1 links D. Phase 1 and Phase 2 SAs...

November 8, 2022 No Comments READ MORE +

Which three file types does WildFire inline ML analyze?

An administrator wants to enable WildFire inline machine learning. Which three file types does WildFire inline ML analyze? (Choose three.)A . MS Office B. ELF C. APK D. VBscripts E. Powershell scriptsView AnswerAnswer: A, B, E

November 8, 2022 No Comments READ MORE +

Which combination of features can allow PAN-OS to detect exploit traffic in a session with TLS encapsulation?

A firewall administrator needs to be able to inspect inbound HTTPS traffic on servers hosted in their DMZ to prevent the hosted service from being exploited. Which combination of features can allow PAN-OS to detect exploit traffic in a session with TLS encapsulation?A . Decryption policy and a Data Filtering...

November 8, 2022 No Comments READ MORE +