Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)A . inherit address-objects from templatesB . define a common standard template configuration for firewallsC . standardize server profiles and authentication configuration across all stacksD . standardize log-forwarding profiles for security polices across all stacksView...

April 4, 2022 No Comments READ MORE +

How should those rules be configured to ensure that they are evaluated with a high priority?

An administrator is building Security rules within a device group to block traffic to and from malicious locations How should those rules be configured to ensure that they are evaluated with a high priority?A . Create the appropriate rules with a Block action and apply them at the top of...

April 4, 2022 No Comments READ MORE +

PBF can address which two scenarios? (Select Two)

PBF can address which two scenarios? (Select Two)A . forwarding all traffic by using source port 78249 to a specific egress interfaceB . providing application connectivity the primary circuit failsC . enabling the firewall to bypass Layer 7 inspectionD . routing FTP to a backup ISP link to save bandwidth...

April 4, 2022 No Comments READ MORE +

When using certificate authentication for firewall administration, which method is used for authorization?

When using certificate authentication for firewall administration, which method is used for authorization?A . RadiusB . LDAPC . KerberosD . LocalView AnswerAnswer: C

April 4, 2022 No Comments READ MORE +

Which type of role-based access is most appropriate for this project?

A superuser is tasked with creating administrator accounts for three contractors For compliance purposes, all three contractors will be working with different device-groups in their hierarchy to deploy policies and objects. Which type of role-based access is most appropriate for this project?A . Create a Dynamic Admin with the Panorama...

April 4, 2022 No Comments READ MORE +

Which statement is correct given the following message from the PanGPA log on the GlobalProtect app?

Which statement is correct given the following message from the PanGPA log on the GlobalProtect app? Failed to connect to server at port:47 67A . The PanGPS process failed to connect to the PanGPA process on port 4767B . The GlobalProtect app failed to connect to the GlobalProtect Portal on...

April 3, 2022 No Comments READ MORE +

What type of address object would be useful for internal devices where the addressing structure assigns meaning to certain bits in the address, as illustrated in the diagram?

What type of address object would be useful for internal devices where the addressing structure assigns meaning to certain bits in the address, as illustrated in the diagram? A . IP NetmaskB . IP Wildcard MaskC . IP AddressD . IP RangeView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/networking-features/wildcard-address

April 3, 2022 No Comments READ MORE +

in an HA failover scenario what occurs when sessions match an SSL Forward Proxy Decryption policy?

in an HA failover scenario what occurs when sessions match an SSL Forward Proxy Decryption policy?A . HA Sync does not occur the existing session is transferred to the active firewall.B . HA Sync does not occur the firewall drops the session.C . HA Sync occurs the session is sent...

April 3, 2022 No Comments READ MORE +

When you navigate to Network: > GlobalProtect > Portals > Method section, which three options are available? (Choose three)

When you navigate to Network: > GlobalProtect > Portals > Method section, which three options are available? (Choose three)A . user-logon (always on)B . pre-logon then on-demandC . on-demand (manual user initiated connection)D . post-logon (always on)E . certificate-logonView AnswerAnswer: A,C,D

April 3, 2022 No Comments READ MORE +

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two)

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two)A . Dos Protection policyB . QoS ProfileC . Zone Protection ProfileD . DoS Protection ProfileView AnswerAnswer: C,D Explanation: Flood Attack Protection Zone Protection Profiles protect against of five types of floods: • SYN (TCP) • UDP...

April 3, 2022 No Comments READ MORE +