When creating a Panorama administrator type of Device Group and Template Admin, which two things must you create first? (Choose two.)
The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.
Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
An administrator should filter NGFW traffic logs by which attribute column to determine if the entry is for the start or end of the session?
Which solution is a viable option to capture user identification when Active Directory is not in use?
What must first be created on the firewall for SAML authentication to be configured?
An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.
What type of Security policy rule is created?
Arrange the correct order that the URL classifications are processed within the system.
Which User Credential Detection method should be applied within a URL Filtering Security profile to check for the submission of a valid corporate username and the associated password?
Which action results in the firewall blocking network traffic with out notifying the sender?
An administrator has configured a Security policy where the matching condition includes a single application and the action is deny
If the application s default deny action is reset-both what action does the firewall take*?
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )
Selecting the option to revert firewall changes will replace what settings?
Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?
Why should a company have a File Blocking profile that is attached to a Security policy?
A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to
making the changes.
Which action will allow the administrator to undo the changes?
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)
What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )
Based on the screenshot what is the purpose of the group in User labelled ''it"?
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?
Based on the network diagram provided, which two statements apply to traffic between the User and Server networks? (Choose two.)
Which Security profile can you apply to protect against malware such as worms and Trojans?
Which URL profiling action does not generate a log entry when a user attempts to access that URL?
The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication Sequence SYS01," and the authentication sequence SYS01 has a profile list with four authentication profiles:
• Auth Profile LDAP
• Auth Profile Radius
• Auth Profile Local
• Auth Profile TACACS
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable but has lost the "SYS01 Admin" username and password.
What is the "SYS01 Admin" login capability after the outage?
How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?
In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns sessions?
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP –to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.
Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.
Which objects would be useful for combining several services that are often defined together?
Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.
What object is best suited for this configuration?
An administrator wants to prevent users from submitting corporate credentials in a phishing attack.
Which Security profile should be applied?
What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the laptop.
Which security profile feature could have been used to prevent the communication with the CnC server?
Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
What are three factors that can be used in domain generation algorithms? (Choose three.)
Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?
The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data.
Which Security profile feature could have been used to prevent the communications with the command-and-control server?
What is the default action for the SYN Flood option within the DoS Protection profile?
What are three valid ways to map an IP address to a username? (Choose three.)
An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.
Which Security profile should be used?
An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240 addresses and found that connections from addresses that needed new translations were being dropped.
Which type of NAT was configured?
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?
Which rule type is appropriate for matching traffic both within and between the source and destination zones?
What are two valid selections within an Anti-Spyware profile? (Choose two.)
An administrator needs to allow users to use only certain email applications.
How should the administrator configure the firewall to restrict users to specific email applications?
Review the Screenshot:
Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the
SERVER zone to the DMZ on SSH only.
Which rule group enables the required traffic?
A)
B)
C)
D)
Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)
Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?
Which Palo Alto networks security operating platform service protects cloud-based application such as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive information?
Which feature enables an administrator to review the Security policy rule base for unused rules?
Which feature enables an administrator to review the Security policy rule base for unused rules?
Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?
Which object would an administrator create to enable access to all applications in the office-programs subcategory?
View the diagram.
What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?
A)
B)
C)
D)
Which rule type is appropriate for matching traffic occurring within a specified zone?
Which CLI command will help confirm if FQDN objects are resolved in the event there is a shadow rule?
Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)
What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?
Which three configuration settings are required on a Palo Alto networks firewall management interface?
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
A)
B)
C)
D)
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
Given the detailed log information above, what was the result of the firewall traffic inspection?
In a security policy what is the quickest way to rest all policy rule hit counters to zero?
A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?
Which administrative management services can be configured to access a management interface?
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?
Which profile should be used to obtain a verdict regarding analyzed files?
Based on the security policy rules shown, ssh will be allowed on which port?
Which System log severity level would be displayed as a result of a user password change?
During the App-ID update process, what should you click on to confirm whether an existing policy rule is affected by an App-ID update?
Which feature must be configured to enable a data plane interface to submit DNS queries originated from the firewall on behalf of the control plane?
An administrator would like to create a URL Filtering log entry when users browse to any gambling website. What combination of Security policy and Security profile actions is correct?
The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;
1. trust for internal networks
2. untrust to the internet
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )
Which object would an administrator create to enable access to all applications in the office-programs subcategory?
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?
Which two configuration settings shown are not the default? (Choose two.)
Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?
Which option lists the attributes that are selectable when setting up an Application filters?
How many zones can an interface be assigned with a Palo Alto Networks firewall?
Which type firewall configuration contains in-progress configuration changes?
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
Place the following steps in the packet processing order of operations from first to last.
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.