<< Prev Question Next Question >>

Question 11/150

What is exchanged through the HA2 link?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
2 commentQuestion 1: An Administrator is configuring an IPSec VPN toa Cisco ASA a...
3 commentQuestion 2: A company.com wants to enable Application Override. Given th...
Question 3: Which log file can be used to identify SSL decryption failur...
Question 4: An administrator encountered problems with inbound decryptio...
Question 5: When a malware-infected host attempts to resolve a known com...
Question 6: What are the two behavior differences between Highlight Unus...
Question 7: An administrator wants to upgrade an NGFW from PAN-OS 8.0.2 ...
Question 8: Which two mechanisms help prevent a spilt brain scenario an ...
Question 9: How can a candidate or running configuration be copied to a ...
Question 10: An administrator has configured the Palo Alto Networks NGFW'...
Question 11: What is exchanged through the HA2 link?...
Question 12: Which protection feature is available only in a Zone Protect...
Question 13: A network security engineer needs to configure a virtual rou...
Question 14: A customer has an application that is being identified as un...
Question 15: Which is not a valid reason for receiving a decrypt-cert-val...
Question 16: Which option is part of the content inspection process?...
Question 17: A customer wants to set up a site-to-site VPN using tunnel i...
Question 18: An administrator needs to implement an NGFW between their DM...
Question 19: A network security engineer has been asked to analyze Wildfi...
Question 20: Which two subscriptions are available when configuring panor...
Question 21: The IT department has received complaints abou VoIP call jit...
Question 22: Which three user authentication services can be modified to ...
Question 23: Which DoS protection mechanism detects and prevents session ...
Question 24: An administrator is defining protection settings on the Palo...
Question 25: An administrator needs to upgrade a Palo Alto Networks NGFW ...
1 commentQuestion 26: If the firewall is configured for credential phishing preven...
Question 27: Which three file types can be forwarded to WildFire for anal...
Question 28: An administrator pushes a new configuration from Panorama to...
1 commentQuestion 29: The web server is configured to listen for HTTP traffic on p...
Question 30: An administrator needs to upgrade an NGFW to the most curren...
Question 31: An administrator just submitted a newly found piece of spywa...
Question 32: Which User-ID method maps IP address to usernames for users ...
Question 33: The certificate information displayed in the following image...
Question 34: An administrator has users accessing network resources throu...
Question 35: Which client software can be used to connect remote Linux cl...
Question 36: An administrator has configured a QoS policy rule and a QoS ...
1 commentQuestion 37: Which two settings can be configured only locally on the fir...
Question 38: How would an administrator monitor/capture traffic on the ma...
Question 39: Which Panorama administrator types require the configuration...
Question 40: Which three split tunnel methods are supported by a globalPr...
Question 41: An administrator has enabled OSPF on a virtual router on the...
Question 42: During the packet flow process, which two processes are perf...
Question 43: A network administrator uses Panorama to push security polic...
Question 44: An administrator sees several inbound sessions identified as...
Question 45: How is the Forward Untrust Certificate used?...
Question 46: Which prerequisite must be satisfied before creating an SSH ...
Question 47: A logging infrastructure may need to handle more than 10,000...
Question 48: A user's traffic traversing a Palo Alto Networks NGFW someti...
Question 49: Refer to Exhibit: (Exhibit) A firewall has three PDF rules a...
Question 50: An administrator is configuring an IPSec VPN to a Cisco ASA ...
Question 51: A network security engineer has a requirement to allow an ex...
Question 52: Company.com has an in-house application that the Palo Alto N...
Question 53: O: 49 A client is concerned about resource exhaustion becaus...
Question 54: Which User-ID method maps IP addresses to usernames for user...
Question 55: How does Panorama handle incoming logs when it reaches the m...
Question 56: An administrator needs to determine why users on the trust z...
Question 57: VPN traffic intended for an administrator's Palo Alto Networ...
Question 58: Which Palo Alto Networks VM-Series firewall is valid?...
Question 59: Which three steps will reduce the CPU utilization on the man...
Question 60: To connect the Palo Alto Networks firewall to AutoFocus, whi...
Question 61: A client has a sensitive application server in their data ce...
Question 62: Only two Trust to Untrust allow rules have been created in t...
Question 63: When backing up and saving configuration files, what is achi...
Question 64: A company has a web server behind a Palo Alto Networks next-...
Question 65: Refer to exhibit. (Exhibit) An organization has Palo Alto Ne...
Question 66: YouTube videos are consuming too much bandwidth on the netwo...
Question 67: VPN traffic intended for an administrator's Palo Alto Networ...
Question 68: Which menu item enables a firewall administrator to see deta...
Question 69: Support for which authentication method was added in PAN-OS ...
1 commentQuestion 70: What are three valid actions in a File Blocking Profile? (Ch...
Question 71: Refer to the exhibit. (Exhibit) Which will be the egress int...
Question 72: Which two interface types can be used when configuring Globa...
Question 73: For which two reasons would a firewall discard a packet as p...
Question 74: Which CLI command displays the current management plan memor...
Question 75: Refer to the exhibit. (Exhibit) An administrator cannot see ...
Question 76: Which three firewall states are valid? (Choose three)...
Question 77: Which three function are found on the dataplane of a PA-5050...
Question 78: Which is the maximum number of samples that can be submitted...
Question 79: The GlobalProtect Portal interface and IP address have been ...
Question 80: Palo Alto Networks maintains a dynamic database of malicious...
Question 81: An administrator accidentally closed the commit window/scree...
Question 82: Which administrative authentication method supports authoriz...
Question 83: An administrator wants multiple web servers in the DMZ to re...
Question 84: Which CLI command is used to simulate traffic going through ...
Question 85: Which CLI command can be used to export the tcpdump capture?...
Question 86: Which two actions would be part of an automatic solution tha...
Question 87: View the GlobalProtect configuration screen capture. (Exhibi...
Question 88: When configuring a GlobalProtect Portal, what is the purpose...
Question 89: Which PAN-OS policy must you configure to force a user to pr...
3 commentQuestion 90: Based on the following image, (Exhibit) what is the correct ...
Question 91: When configuring the firewall for packet capture, what are t...
Question 92: What are two benefits of nested device groups in Panorama? (...
Question 93: Which User-ID method should be configured to map IP addresse...
Question 94: Which processing order will be enabled when a Panorama admin...
2 commentQuestion 95: Which three options are available when creating a security p...
Question 96: Which feature can provide NGFWs with User-ID mapping informa...
Question 97: (Exhibit) What will be the source address in the ICMP packet...
Question 98: People are having intermittent quality issues during a live ...
Question 99: When using the predefined default profile, the policy will i...
Question 100: Which Public Key infrastructure component is used to authent...
Question 101: An administrator wants a new Palo Alto Networks NGFW to obta...
Question 102: A network design calls for a "router on a stick" implementat...
Question 103: Which Palo Alto Networks VM-Series firewall is supported for...
Question 104: Which feature can be configured on VM-Series firewalls?...
Question 105: A file sharing application is being permitted and no one kno...
Question 106: Several offices are connected with VPNs using static IPv4 ro...
Question 107: A company has a policy that denies all applications it class...
1 commentQuestion 108: The firewall identifies a popular application as an unknown-...
Question 109: Which Security Policy Rule configuration option disables ant...
Question 110: What are three valid method of user mapping? (Choose three)...
1 commentQuestion 111: The company's Panorama server (IP 10.10.10.5) is not able to...
Question 112: In a virtual router, which object contains all potential rou...
Question 113: Exhibit: (Exhibit) What will be the egress interface if the ...
Question 114: A firewall administrator is troubleshooting problems with tr...
Question 115: A company is upgrading its existing Palo Alto Networks firew...
Question 116: What should an administrator consider when planning to rever...
Question 117: An administrator has been asked to configure a Palo Alto Net...
Question 118: When is the content inspection performed in the packet flow ...
Question 119: Refer to the exhibit. (Exhibit) A web server in the DMZ is b...
Question 120: A network design change requires an existing firewall to sta...
Question 121: A web server is hosted in the DMZ and the server is configur...
Question 122: A network Administrator needs to view the default action for...
Question 123: ON NO: 80 An administrator has been asked to configure a Pal...
Question 124: Which two virtualization platforms officially support the de...
Question 125: A company hosts a publically accessible web server behind a ...
2 commentQuestion 126: Which two statements are correct for the out-of-box configur...
Question 127: Which field is optional when creating a new Security Policy ...
Question 128: Which interface configuration will accept specific VLAN IDs?...
Question 129: Which Panorama feature allows for logs generated by Panorama...
Question 130: Which two methods can be used to mitigate resource exhaustio...
Question 131: Firewall administrators cannot authenticate to a firewall GU...
Question 132: Which CLI command enables an administrator to view details a...
Question 133: Which event will happen if an administrator uses an Applicat...
Question 134: Which command can be used to validate a Captive Portal polic...
Question 135: When is it necessary to activate a license when provisioning...
Question 136: Which two features does PAN-OS software use to identify appl...
Question 137: The firewall is not downloading IP addresses from MineMeld. ...
Question 138: Which operation will impact performance of the management pl...
Question 139: Which two virtualized environments support Active/Active Hig...
Question 140: In the following image from Panorama, why are some values sh...
Question 141: An administrator has a requirement to export decrypted traff...
Question 142: How are IPV6 DNS queries configured to user interface ethern...
Question 143: Which Captive Portal mode must be configured to support MFA ...
Question 144: Site-A and Site-B need to use IKEv2 to establish a VPN conne...
Question 145: A Security policy rule is configured with a Vulnerability Pr...
Question 146: Which data flow describes redistribution of user mappings?...
Question 147: Refer to the exhibit. (Exhibit) An administrator is using DN...
Question 148: Which three firewall states are valid? (Choose three.)...
Question 149: An administrator has been asked to configure active/passive ...
Question 150: Which three options are supported in HA Lite? (Choose three....