<< Prev Question Next Question >>

Question 23/37

An administrator needs to build Security rules in a Device Group that allow traffic to specific users and groups defined in Active Directory What must be configured in order to select users and groups for those rules from Panorama?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (37q)
Question 1: An engineer is configuring Packet Buffer Protection on ingre...
Question 2: Before you upgrade a Palo Alto Networks NGFW, what must you ...
Question 3: An internal system is not functioning. The firewall administ...
Question 4: What type of address object would be useful for internal dev...
1 commentQuestion 5: When you navigate to Network: &gt; GlobalProtect &gt; Portal...
Question 6: In SSL Forward Proxy decryption, which two certificates can ...
Question 7: Which data flow describes redistribution of user mappings?...
Question 8: A network administrator wants to use a certificate for the S...
Question 9: An administrator has a PA-820 firewall with an active Threat...
Question 10: When configuring forward error correction (FEC) for PAN-OS S...
Question 11: Which three use cases are valid reasons for requiring an Act...
Question 12: Given the following snippet of a WildFire submission log. di...
Question 13: SAML SLO is supported for which two firewall features? (Choo...
Question 14: An administrator analyzes the following portion of a VPN sys...
Question 15: A network administrator troubleshoots a VPN issue and suspec...
Question 16: WildFire will submit for analysis blocked files that match w...
Question 17: A network security engineer must implement Quality of Servic...
Question 18: What is the function of a service route?...
Question 19: A remote administrator needs firewall access on an untrusted...
Question 20: A network security engineer wants to prevent resource-consum...
Question 21: What is the best description of the HA4 Keep-Alive Threshold...
Question 22: An administrator has configured the Palo Alto Networks NGFW'...
Question 23: An administrator needs to build Security rules in a Device G...
Question 24: What are three valid qualifiers for a Decryption Policy Rule...
Question 25: A firewall administrator is trying to identify active routes...
Question 26: Which statement is true regarding a Best Practice Assessment...
Question 27: Before an administrator of a VM-500 can enable DoS and zone ...
Question 28: What can you use with Global Protect to assign user-specific...
Question 29: SSL Forward Proxy decryption is configured but the firewall ...
1 commentQuestion 30: An administrator can not see any Traffic logs from the Palo ...
Question 31: A customer is replacing their legacy remote access VPN solut...
1 commentQuestion 32: During the process of developing a decryption strategy and e...
Question 33: How would an administrator monitor/capture traffic on the ma...
Question 34: What is considered the best practice with regards to zone pr...
Question 35: An engineer must configure the Decryption Broker feature Whi...
Question 36: A network-security engineer attempted to configure a bootstr...
Question 37: What are two best practices for incorporating new and modifi...