Which interface type would support this business requirement?

An administrator needs to implement an NGFW between their DMZ and Core network EIGRP Routing between the two environments is required. Which interface type would support this business requirement?A . Layer 3 interfaces but configuring EIGRP on the attached virtual routerB . Virtual Wire interfaces to permit EIGRP routing to...

April 3, 2022 No Comments READ MORE +

When an in-band data port is set up to provide access to required services, what is required for an interface that is assigned to service routes?

When an in-band data port is set up to provide access to required services, what is required for an interface that is assigned to service routes?A . The interface must be used for traffic to the required servicesB . You must enable DoS and zone protectionC . You must set...

April 3, 2022 No Comments READ MORE +

What should the enterprise do to use PAN-OS MFA1?

An enterprise information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems However a recent phisning campaign against the organization has prompted Information Security to look for more controls that can secure access to critical assets For users that need to access...

April 2, 2022 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems to...

April 2, 2022 No Comments READ MORE +

What are three valid qualifiers for a Decryption Policy Rule match? (Choose three )

What are three valid qualifiers for a Decryption Policy Rule match? (Choose three )A . Destination ZoneB . App-IDC . Custom URL CategoryD . User-IDE . Source InterfaceView AnswerAnswer: A,C,D

April 2, 2022 No Comments READ MORE +

What are three types of Decryption Policy rules? (Choose three.)

What are three types of Decryption Policy rules? (Choose three.)A . SSL Inbound InspectionB . SSH ProxyC . SSL Forward ProxyD . Decryption BrokerE . Decryption MirrorView AnswerAnswer: A,B,C Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/define-traffic-to-decrypt/create-a-decryption-policy-rule

April 2, 2022 No Comments READ MORE +

Where would you configure this setting?

A customer wants to spin their session load equally across two SD-WAN-enabled interfaces. Where would you configure this setting?A . Path Quality profileB . ECMP setting on virtual routerC . Traffic Dtstnbution profileD . SD-WAN Interface profileView AnswerAnswer: C

April 2, 2022 No Comments READ MORE +

This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?

An administrator with 84 firewalls and Panorama does not see any WildFire logs in Panorama. All 84 firewalls have an active WildFire subscription On each firewall WildFire logs are available. This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?A . System...

April 2, 2022 No Comments READ MORE +

Which server OS platforms can be used for server monitoring with User-ID?

An engineer is in the planning stages of deploying User-ID in a diverse directory services environment. Which server OS platforms can be used for server monitoring with User-ID?A . Microsoft Terminal Server, Red Hat Linux, and Microsoft Active DirectoryB . Microsoft Active Directory, Red Hat Linux, and Microsoft ExchangeC ....

April 2, 2022 2 Comments READ MORE +

While troubleshooting an SSL Forward Proxy decryption issue which PAN-OS CLI command would you use to check the details of the end-entity certificate that is signed by the Forward Trust Certificate or Forward Untrust Certificate?

While troubleshooting an SSL Forward Proxy decryption issue which PAN-OS CLI command would you use to check the details of the end-entity certificate that is signed by the Forward Trust Certificate or Forward Untrust Certificate?A . show system setting ssl-decrypt certsB . show systea setting ssl-decrypt certificate-cacheC . show systen...

April 2, 2022 No Comments READ MORE +