<< Prev Question Next Question >>

Question 12/100

Which two options prevent the firewall from capturing traffic passing through it? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (100q)
Question 1: Which feature prevents the submission of corporate login inf...
1 commentQuestion 2: An administrator using an enterprise PKI needs to establish ...
2 commentQuestion 3: VPN traffic intended for an administrator's Palo Alto Networ...
4 commentQuestion 4: An administrator has enabled OSPF on a virtual router on the...
Question 5: An administrator has a requirement to export decrypted traff...
Question 6: An administrator needs to determine why users on the trust z...
Question 7: View the GlobalProtect configuration screen capture. What is...
1 commentQuestion 8: Which three steps will reduce the CPU utilization on the man...
Question 9: If the firewall has the link monitoring configuration, what ...
Question 10: A company needs to preconfigure firewalls to be sent to remo...
Question 11: A global corporate office has a large-scale network with onl...
Question 12: Which two options prevent the firewall from capturing traffi...
2 commentQuestion 13: An administrator encountered problems with inbound decryptio...
2 commentQuestion 14: Refer to exhibit. (Exhibit) An organization has Palo Alto Ne...
Question 15: Which User-ID method should be configured to map IP addresse...
5 commentQuestion 16: Decrypted packets from the website https://www.microsoft.com...
1 commentQuestion 17: An administrator has users accessing network resources throu...
Question 18: Which CLI command is used to simulate traffic going through ...
Question 19: Which processing order will be enabled when a Panorama admin...
Question 20: A client has a sensitive application server in their data ce...
Question 21: When configuring a GlobalProtect Portal, what is the purpose...
1 commentQuestion 22: Which two methods can be used to verify firewall connectivit...
Question 23: Which Palo Alto Networks VM-Series firewall is valid?...
4 commentQuestion 24: A session in the Traffic log is reporting the application as...
2 commentQuestion 25: An administrator needs to optimize traffic to prefer busines...
Question 26: Which feature must you configure to prevent users form accid...
3 commentQuestion 27: The administrator has enabled BGP on a virtual router on the...
2 commentQuestion 28: Which CLI command enables an administrator to check the CPU ...
Question 29: Which event will happen if an administrator uses an Applicat...
Question 30: Which Security policy rule will allow an admin to block face...
3 commentQuestion 31: How would an administrator monitor/capture traffic on the ma...
Question 32: Which PAN-OS® policy must you configure to force a user to p...
Question 33: When is the content inspection performed in the packet flow ...
9 commentQuestion 34: A web server is hosted in the DMZ, and the server is configu...
2 commentQuestion 35: Which three settings are defined within the Templates object...
3 commentQuestion 36: Refer to the exhibit. A web server in the DMZ is being mappe...
Question 37: To connect the Palo Alto Networks firewall to AutoFocus, whi...
Question 38: Which two virtualization platforms officially support the de...
1 commentQuestion 39: Refer to the exhibit. (Exhibit) An administrator is using DN...
Question 40: Which CLI command can be used to export the tcpdump capture?...
3 commentQuestion 41: Which option is part of the content inspection process?...
Question 42: How can a candidate or running configuration be copied to a ...
Question 43: Which CLI command enables an administrator to view details a...
1 commentQuestion 44: An administrator is using Panorama and multiple Palo Alto Ne...
Question 45: Refer to the exhibit. (Exhibit) Which will be the egress int...
2 commentQuestion 46: A Security policy rule is configured with a Vulnerability Pr...
1 commentQuestion 47: A web server is hosted in the DMZ and the server is configur...
Question 48: An administrator has been asked to configure active/passive ...
1 commentQuestion 49: VPN traffic intended for an administrator's Palo Alto Networ...
1 commentQuestion 50: What are two benefits of nested device groups in Panorama? (...
5 commentQuestion 51: What will be the egress interface if the traffic's ingress i...
Question 52: An administrator has been asked to configure a Palo Alto Net...
Question 53: Which method does an administrator use to integrate all non-...
4 commentQuestion 54: A client is concerned about resource exhaustion because of d...
Question 55: Which two subscriptions are available when configuring panor...
Question 56: Which item enables a firewall administrator to see details a...
3 commentQuestion 57: Which three file types can be forwarded to WildFire for anal...
4 commentQuestion 58: Refer to the exhibit. (Exhibit) Which certificates can be us...
Question 59: Which User-ID method maps IP addresses to usernames for user...
1 commentQuestion 60: A customer has an application that is being identified as un...
2 commentQuestion 61: An administrator needs to implement an NGFW between their DM...
Question 62: Which virtual router feature determines if a specific destin...
Question 63: Which three authentication factors does PAN-OS® software sup...
Question 64: In a virtual router, which object contains all potential rou...
5 commentQuestion 65: Refer to the exhibit. (Exhibit) An administrator cannot see ...
Question 66: What is exchanged through the HA2 link?...
Question 67: An administrator logs in to the Palo Alto Networks NGFW and ...
3 commentQuestion 68: The certificate information displayed in the following image...
3 commentQuestion 69: A speed/duplex negotiation mismatch is between the Palo Alto...
Question 70: Which three firewall states are valid? (Choose three.)...
2 commentQuestion 71: An administrator has left a firewall to use the default port...
2 commentQuestion 72: If a template stack is assigned to a device and the stack in...
1 commentQuestion 73: Which protection feature is available only in a Zone Protect...
2 commentQuestion 74: Which three options are supported in HA Lite? (Choose three....
Question 75: Which tool provides an administrator the ability to see tren...
2 commentQuestion 76: If an administrator does not possess a website's certificate...
4 commentQuestion 77: A customer wants to set up a VLAN interface for a Layer 2 Et...
Question 78: If an administrator wants to decrypt SMTP traffic and posses...
Question 79: Which DoS protection mechanism detects and prevents session ...
2 commentQuestion 80: An administrator has created an SSL Decryption policy rule t...
1 commentQuestion 81: An administrator pushes a new configuration from Panorama to...
Question 82: In High Availability, which information is transferred via t...
1 commentQuestion 83: An administrator creates an SSL decryption rule decrypting t...
2 commentQuestion 84: An administrator needs to upgrade a Palo Alto Networks NGFW ...
2 commentQuestion 85: During the packet flow process, which two processes are perf...
Question 86: Which option would an administrator choose to define the cer...
Question 87: A global corporate office has a large-scale network with onl...
1 commentQuestion 88: An administrator sees several inbound sessions identified as...
Question 89: Which prerequisite must be satisfied before creating an SSH ...
Question 90: Which Captive Portal mode must be configured to support MFA ...
Question 91: An administrator wants multiple web servers in the DMZ to re...
Question 92: An administrator has been asked to create 100 virtual firewa...
5 commentQuestion 93: The firewall identifies a popular application as an unknown-...
3 commentQuestion 94: How does an administrator schedule an Applications and Threa...
Question 95: An administrator creates a custom application containing Lay...
Question 96: An administrator has been asked to configure a Palo Alto Net...
2 commentQuestion 97: Which three authentication services can administrator use to...
Question 98: A Palo Alto Networks NGFW just submitted a file to WildFire ...
2 commentQuestion 99: Which two benefits come from assigning a Decryption Profile ...
2 commentQuestion 100: If the firewall is configured for credential phishing preven...