What is the best description of the HA4 Keep-Alive Threshold (ms)?

What is the best description of the HA4 Keep-Alive Threshold (ms)?A . the maximum interval between hello packets that are sent to verify that the HA functionality on the other firewall is operational. B. The time that a passive or active-secondary firewall will wait before taking over as the active...

November 8, 2022 No Comments READ MORE +

What happens when the pushed Panorama configuration has Address Object names that duplicate the Address Objects already configured on the firewall?

An engineer is pushing configuration from Panorama lo a managed firewall. What happens when the pushed Panorama configuration has Address Object names that duplicate the Address Objects already configured on the firewall?A . The firewall rejects the pushed configuration, and the commit fails. B. The firewall renames the duplicate local...

November 8, 2022 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre Office B. Create an Application Group and add business-systems to...

November 8, 2022 No Comments READ MORE +

What best explains these occurrences?

While analyzing the Traffic log, you see that some entries show "unknown-tcp" in the Application column. What best explains these occurrences?A . A handshake took place, but no data packets were sent prior to the timeout. B. A handshake took place; however, there were not enough packets to identify the...

November 6, 2022 No Comments READ MORE +

In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)

In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)A . wildcard server certificate B. enterprise CA certificate C. client certificate D. server certificate E. self-signed CA certificateView AnswerAnswer: B,E Explanation: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-forward-proxy.html

November 6, 2022 No Comments READ MORE +

When using certificate authentication for firewall administration, which method is used for authorization?

When using certificate authentication for firewall administration, which method is used for authorization?A . Radius B. LDAP C. Kerberos D. LocalView AnswerAnswer: A

November 5, 2022 No Comments READ MORE +

Which CLI command is used to determine how much disk space is allocated to logs?

Which CLI command is used to determine how much disk space is allocated to logs?A . show logging-status B. show system info C. debug log-receiver show D. show system logdfo-quotaView AnswerAnswer: D

November 5, 2022 No Comments READ MORE +

How can you configure Prisma Access to provide the same level of access as the current VPN solution?

A customer is replacing their legacy remote access VPN solution. The current solution is in place to secure only internet egress for the connected clients Prisma Access has been selected to replace the current remote access VPN solution. During onboarding the following options and licenses were selected and enabled -...

November 5, 2022 No Comments READ MORE +

Why is the AE interface showing down on the passive firewall?

The Aggregate Ethernet interface is showing down on a passive PA-7050 firewall of an active/passive HA pair. The HA Passive Link State is set to "Auto" under Device > High Availability > General > Active/Passive Settings. The AE interface is configured with LACP enabled and is up only on the...

November 5, 2022 No Comments READ MORE +

Which statement accurately describes service routes and virtual systems?

Which statement accurately describes service routes and virtual systems?A . Virtual systems that do not have specific service routes configured inherit the global service and service route settings for the firewall. B. Virtual systems can only use one interface for all global service and service routes of the firewall. C....

November 5, 2022 No Comments READ MORE +