<< Prev Question Next Question >>

Question 17/79

Which two features does PAN-OS® software use to identify applications? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (79q)
2 commentQuestion 1: Which two benefits come from assigning a Decryption Profile ...
1 commentQuestion 2: VPN traffic intended for an administrator's Palo Alto Networ...
Question 3: Which CLI command enables an administrator to check the CPU ...
3 commentQuestion 4: The administrator has enabled BGP on a virtual router on the...
Question 5: An administrator has users accessing network resources throu...
Question 6: An administrator wants a new Palo Alto Networks NGFW to obta...
Question 7: When is the content inspection performed in the packet flow ...
1 commentQuestion 8: What are the differences between using a service versus usin...
2 commentQuestion 9: An administrator sees several inbound sessions identified as...
Question 10: Where can an administrator see both the management plane and...
Question 11: The firewall identifies a popular application as an unknown-...
3 commentQuestion 12: Which three authentication services can administrator use to...
Question 13: Which User-ID method maps IP addresses to usernames for user...
Question 14: A session in the Traffic log is reporting the application as...
Question 15: A customer wants to set up a site-to-site VPN using tunnel i...
Question 16: Which Captive Portal mode must be configured to support MFA ...
Question 17: Which two features does PAN-OS® software use to identify app...
Question 18: An administrator has been asked to create 100 virtual firewa...
Question 19: A global corporate office has a large-scale network with onl...
3 commentQuestion 20: Which three file types can be forwarded to WildFire for anal...
3 commentQuestion 21: An administrator needs to implement an NGFW between their DM...
Question 22: Which four NGFW multi-factor authentication factors are supp...
1 commentQuestion 23: If an administrator does not possess a website's certificate...
Question 24: Which two settings can be configured only locally on the fir...
Question 25: What is exchanged through the HA2 link?...
1 commentQuestion 26: A web server is hosted in the DMZ and the server is configur...
Question 27: Refer to the exhibit. (Exhibit) Which will be the egress int...
Question 28: Which three authentication factors does PAN-OS® software sup...
Question 29: Which PAN-OS® policy must you configure to force a user to p...
Question 30: A company wants to install a PA-3060 firewall between two co...
Question 31: An administrator wants multiple web servers in the DMZ to re...
Question 32: Which prerequisite must be satisfied before creating an SSH ...
Question 33: In High Availability, which information is transferred via t...
Question 34: Which three firewall states are valid? (Choose three.)...
Question 35: If an administrator wants to decrypt SMTP traffic and posses...
Question 36: Which log file can be used to identify SSL decryption failur...
Question 37: Which two options prevent the firewall from capturing traffi...
Question 38: Which Palo Alto Networks VM-Series firewall is valid?...
Question 39: Which event will happen if an administrator uses an Applicat...
Question 40: An administrator just submitted a newly found piece of spywa...
Question 41: A client is concerned about resource exhaustion because of d...
1 commentQuestion 42: Which data flow describes redistribution of user mappings?...
Question 43: An administrator using an enterprise PKI needs to establish ...
Question 44: Which User-ID method should be configured to map IP addresse...
Question 45: An administrator creates a custom application containing Lay...
1 commentQuestion 46: A web server is hosted in the DMZ, and the server is configu...
Question 47: An administrator has been asked to configure a Palo Alto Net...
Question 48: Which Zone Pair and Rule Type will allow a successful connec...
Question 49: An administrator needs to optimize traffic to prefer busines...
1 commentQuestion 50: Which three user authentication services can be modified to ...
Question 51: An administrator has a requirement to export decrypted traff...
Question 52: An administrator has configured a QoS policy rule and a QoS ...
Question 53: If the firewall is configured for credential phishing preven...
Question 54: Which two methods can be used to verify firewall connectivit...
Question 55: A customer wants to combine multiple Ethernet interfaces int...
Question 56: What will be the egress interface if the traffic's ingress i...
Question 57: What are two benefits of nested device groups in Panorama? (...
Question 58: An administrator has created an SSL Decryption policy rule t...
Question 59: A Palo Alto Networks NGFW just submitted a file to WildFire ...
Question 60: How would an administrator monitor/capture traffic on the ma...
Question 61: An administrator is using Panorama and multiple Palo Alto Ne...
Question 62: Which processing order will be enabled when a Panorama admin...
Question 63: An administrator has enabled OSPF on a virtual router on the...
Question 64: Which two subscriptions are available when configuring panor...
Question 65: Which Security policy rule will allow an admin to block face...
Question 66: A user's traffic traversing a Palo Alto Networks NGFW someti...
Question 67: Which method does an administrator use to integrate all non-...
Question 68: Refer to the exhibit. A web server in the DMZ is being mappe...
3 commentQuestion 69: Based on the following image, what is the correct path of ro...
Question 70: Which virtual router feature determines if a specific destin...
1 commentQuestion 71: A Security policy rule is configured with a Vulnerability Pr...
Question 72: A global corporate office has a large-scale network with onl...
Question 73: When backing up and saving configuration files, what is achi...
Question 74: A speed/duplex negotiation mismatch is between the Palo Alto...
Question 75: A client has a sensitive application server in their data ce...
1 commentQuestion 76: Decrypted packets from the website https://www.microsoft.com...
Question 77: View the GlobalProtect configuration screen capture. What is...
3 commentQuestion 78: An administrator wants to upgrade an NGFW from PAN-OS® 7.1.2...
Question 79: Which DoS protection mechanism detects and prevents session ...