Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0 Question and Answers

Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0

Last Update Oct 15, 2025
Total Questions : 374

We are offering FREE PCNSE Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare PCNSE free exam questions and then go for complete pool of Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0 test questions that will help you more.

PCNSE pdf

PCNSE PDF

$42  $104.99
PCNSE Engine

PCNSE Testing Engine

$50  $124.99
PCNSE PDF + Engine

PCNSE PDF + Testing Engine

$66  $164.99
Questions 1

Phase two of a VPN will not establish a connection. The peer is using a policy-based VPN configuration.

What part of the configuration should the engineer verify?

Options:

A.  

IKE Crypto Profile

B.  

Security policy

C.  

Proxy-IDs

D.  

PAN-OS versions

Discussion 0
Questions 2

Given the following snippet of a WildFire submission log, did the end user successfully download a file?

Options:

A.  

No, because the URL generated an alert.

B.  

Yes, because both the web-browsing application and the flash file have the 'alert" action.

C.  

Yes, because the final action is set to "allow.''

D.  

No, because the action for the wildfire-virus is "reset-both."

Discussion 0
Questions 3

Which statement is correct given the following message from the PanGPA log on the GlobalProtect app?

Failed to connect to server at port:47 67

Options:

A.  

The PanGPS process failed to connect to the PanGPA process on port 4767

B.  

The GlobalProtect app failed to connect to the GlobalProtect Portal on port 4767

C.  

The PanGPA process failed to connect to the PanGPS process on port 4767

D.  

The GlobalProtect app failed to connect to the GlobalProtect Gateway on port 4767

Discussion 0
Questions 4

Which method will dynamically register tags on the Palo Alto Networks NGFW?

Options:

A.  

Restful API or the VMWare API on the firewall or on the User-ID agent or the read-only domain controller (RODC)

B.  

Restful API or the VMware API on the firewall or on the User-ID agent

C.  

XML-API or the VMware API on the firewall or on the User-ID agent or the CLI

D.  

XML API or the VM Monitoring agent on the NGFW or on the User-ID agent

Discussion 0
Questions 5

An engineer needs to collect User-ID mappings from the company’s existing proxies. What two methods can be used to pull this data from third-party proxies? (Choose two)

Options:

A.  

Client Probing

B.  

Syslog

C.  

Server Monitoring

D.  

XFF Headers

Discussion 0
Questions 6

Which function does the HA4 interface provide when implementing a firewall cluster which contains firewalls configured as active-passive pairs?

Options:

A.  

Perform packet forwarding to the active-passive peer during session setup and asymmetric traffic flow.

B.  

Perform synchronization of routes, IPSec security associations, and User-ID information.

C.  

Perform session cache synchronization for all HA cluster members with the same cluster ID.

D.  

Perform synchronization of sessions, forwarding tables, and IPSec security associations between firewalls in an HA pair.

Discussion 0
Questions 7

While troubleshooting an issue, a firewall administrator performs a packet capture with a specific filter. The administrator sees drops for packets with a source IP address of 10.1.1.1.

How can the administrator further investigate these packet drops by looking at the global counters for this packet capture filter?

Options:

A.  

> show counter global filter packet-filter yes delta yes

B.  

> show counter global filter severity drop

C.  

> debug dataplane packet-diag set capture stage drop

D.  

> show counter global filter delta yes I match 10.1.1-1

Discussion 0
Questions 8

Exhibit.

An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms The network team has reported excessive traffic on the corporate WAN How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all the existing monitoring/security platforms?

Options:

A.  

Any configuration on an M-500 would address the insufficient bandwidth concerns

B.  

Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW

C.  

Configure log compression and optimization features on all remote firewalls

D.  

Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services.

Discussion 0
Questions 9

A firewall administrator has confirm reports of a website is not displaying as expected, and wants to ensure that decryption is not causing the issue. Which three methods can the administrator use to determine if decryption is causing the website to fail? (Choose three.)

Options:

A.  

Move the policy with action decrypt to the top of the decryption policy rulebase.

B.  

Temporarily disable SSL decryption for all websites to troubleshoot the issue.

C.  

Create a policy-based “No Decrypt” rule in the decryption policy to exclude specific traffic from decryption.

D.  

Investigate decryption logs of the specific traffic to determine reasons for failure.

E.  

Disable SSL handshake logging.

Discussion 0
Questions 10

During the implementation of SSL Forward Proxy decryption, an administrator imports the company's Enterprise Root CA and Intermediate CA certificates onto the firewall. The company's Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company's Intermediate CA.

Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

Options:

A.  

Generate a single subordinate CA certificate for both Forward Trust and Forward Untrust.

B.  

Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.

C.  

Generate a single self-signed CA certificate for Forward Trust and another for Forward Untrust

D.  

Generate two subordinate CA certificates, one for Forward Trust and one for Forward Untrust.

Discussion 0
Questions 11

Where is Palo Alto Networks Device Telemetry data stored on a firewall with a device certificate installed?

Options:

A.  

On Palo Alto Networks Update Servers

B.  

M600 Log Collectors

C.  

Cortex Data Lake

D.  

Panorama

Discussion 0
Questions 12

A company has recently migrated their branch office's PA-220S to a centralized Panorama. This Panorama manages a number of PA-7000 Series and PA-5200 Series devices All device group and template configuration is managed solely within Panorama

They notice that commit times have drastically increased for the PA-220S after the migration

What can they do to reduce commit times?

Options:

A.  

Disable "Share Unused Address and Service Objects with Devices" in Panorama Settings.

B.  

Update the apps and threat version using device-deployment

C.  

Perform a device group push using the "merge with device candidate config" option

D.  

Use "export or push device config bundle" to ensure that the firewall is integrated with the Panorama config.

Discussion 0
Questions 13

Which active-passive HA firewall state describes the firewall that is currently processing traffic?

Options:

A.  

Active-secondary

B.  

Active

C.  

Active-primary

D.  

Initial

Discussion 0
Questions 14

An administrator is attempting to create policies tor deployment of a device group and template stack. When creating the policies, the zone drop down list does not include the required zone.

What must the administrator do to correct this issue?

Options:

A.  

Specify the target device as the master device in the device group

B.  

Enable "Share Unused Address and Service Objects with Devices" in Panorama settings

C.  

Add the template as a reference template in the device group

D.  

Add a firewall to both the device group and the template

Discussion 0
Questions 15

Which two policy components are required to block traffic in real time using a dynamic user group (DUG)? (Choose two.)

Options:

A.  

A Deny policy for the tagged traffic

B.  

An Allow policy for the initial traffic

C.  

A Decryption policy to decrypt the traffic and see the tag

D.  

A Deny policy with the "tag" App-ID to block the tagged traffic

Discussion 0
Questions 16

An organization wants to begin decrypting guest and BYOD traffic.

Which NGFW feature can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted?

Options:

A.  

Authentication Portal

B.  

SSL Decryption profile

C.  

SSL decryption policy

D.  

comfort pages

Discussion 0
Questions 17

An engineer is deploying multiple firewalls with common configuration in Panorama.

What are two benefits of using nested device groups? (Choose two.)

Options:

A.  

Inherit settings from the Shared group

B.  

Inherit IPSec crypto profiles

C.  

Inherit all Security policy rules and objects

D.  

Inherit parent Security policy rules and objects

Discussion 0
Questions 18

All firewall at a company are currently forwarding logs to Palo Alto Networks log collectors. The company also wants to deploy a sylog server and forward all firewall logs to the syslog server and to the log collectors. There is known logging peak time during the day, and the security team has asked the firewall engineer to determined how many logs per second the current Palo Alto Networking log processing at that particular time. Which method is the most time-efficient to complete this task?

Options:

A.  

Navigate to Panorama > Managed Collectors, and open the Statistics windows for each Log Collector during the peak time.

B.  

Navigate to Monitor > Unified logs, set the filter to the peak time, and browse to the last page to find out how many logs have been received.

C.  

Navigate to Panorama> Managed Devices> Health, open the Logging tab for each managed firewall and check the log rates during the peak time.

D.  

Navigate to ACC> Network Activity, and determine the total number of sessions and threats during the peak time.

Discussion 0
Questions 19

An engineer is configuring a firewall with three interfaces:

• MGT connects to a switch with internet access.

• Ethernet1/1 connects to an edge router.

• Ethernet1/2 connects to a visualization network.

The engineer needs to configure dynamic updates to use a dataplane interface for internet traffic. What should be configured in Setup > Services > Service Route Configuration to allow this traffic?

Options:

A.  

Set DNS and Palo Alto Networks Services to use the ethernet1/1 source interface.

B.  

Set DNS and Palo Alto Networks Services to use the ethernet1/2 source interface.

C.  

Set DNS and Palo Alto Networks Services to use the MGT source interface.

D.  

Set DDNS and Palo Alto Networks Services to use the MGT source interface.

Discussion 0
Questions 20

Which feature of Panorama allows an administrator to create a single network configuration that can be reused repeatedly for large-scale deployments even if values of configured objects, such as routes and interface addresses, change?

Options:

A.  

the 'Shared' device group

B.  

template stacks

C.  

a device group

D.  

template variables

Discussion 0
Questions 21

An engineer configures a specific service route in an environment with multiple virtual systems instead of using the inherited global service route configuration.

What type of service route can be used for this configuration?

Options:

A.  

IPv6 Source or Destination Address

B.  

Destination-Based Service Route

C.  

IPv4 Source Interface

D.  

Inherit Global Setting

Discussion 0
Questions 22

An administrator plans to deploy 15 firewalls to act as GlobalProtect gateways around the world. Panorama will manage the firewalls.

The firewalls will provide access to mobile users and act as edge locations to on-premises infrastructure. The administrator wants to scale the configuration out quickly and wants all of the firewalls to use the same template configuration.

Which two solutions can the administrator use to scale this configuration? (Choose two.)

Options:

A.  

collector groups

B.  

template stacks

C.  

virtual systems

D.  

variables

Discussion 0
Questions 23

Which tool can gather information about the application patterns when defining a signature for a custom application?

Options:

A.  

Policy Optimizer

B.  

Data Filtering Log

C.  

Wireshark

D.  

Expedition

Discussion 0
Questions 24

Which two components are required to configure certificate-based authentication to the web UI when firewall access is needed on a trusted interface? (Choose two.)

Options:

A.  

Server certificate

B.  

Certificate Profile

C.  

CA certificate

D.  

SSL/TLS Service Profile

Discussion 0
Questions 25

Review the screenshot of the Certificates page.

An administrator for a small LLC has created a series of certificates as shown, to use for a planned Decryption roll out. The administrator has also installed the self-signed root certificate in all client systems.

When testing, they noticed that every time a user visited an SSL site, they received unsecured website warnings.

What is the cause of the unsecured website warnings?

Options:

A.  

The forward untrust certificate has not been signed by the self-singed root CA certificate.

B.  

The forward trust certificate has not been installed in client systems.

C.  

The self-signed CA certificate has the same CN as the forward trust and untrust certificates.

D.  

The forward trust certificate has not been signed by the self-singed root CA certificate.

Discussion 0
Questions 26

An administrator is troubleshooting application traffic that has a valid business use case, and observes the following decryption log message: "Received fatal alert UnknownCA from client."

How should the administrator remediate this issue?

Options:

A.  

Contact the site administrator with the expired certificate to request updates or renewal.

B.  

Enable certificate revocation checking to deny access to sites with revoked certificates. -"

C.  

Add the server's hostname to the SSL Decryption Exclusion List to allow traffic without decryption.

D.  

Check for expired certificates and take appropriate actions to block or allow access based on business needs.

Discussion 0
Questions 27

An administrator needs to assign a specific DNS server to an existing template variable. Where would the administrator go to edit a template variable at the device level?

Options:

A.  

"Managed Devices > Device Association"

B.  

PDF Export under "Panorama > Templates"

C.  

Variable CSV export under "Panorama > Templates"

D.  

Manage variables under "Panorama > Templates"

Discussion 0
Questions 28

An auditor is evaluating the configuration of Panorama and notices a discrepancy between the Panorama template and the local firewall configuration.

When overriding the firewall configuration pushed from Panorama, what should you consider?

Options:

A.  

The firewall template will show that it is out of sync within Panorama.

B.  

The modification will not be visible in Panorama.

C.  

Only Panorama can revert the override.

D.  

Panorama will update the template with the overridden value.

Discussion 0
Questions 29

An administrator has two pairs of firewalls within the same subnet. Both pairs of firewalls have been configured to use High Availability mode with Active/Passive. The ARP tables for upstream routes display the same MAC address being shared for some of these firewalls.

What can be configured on one pair of firewalls to modify the MAC addresses so they are no longer in conflict?

Options:

A.  

Configure a floating IP between the firewall pairs.

B.  

Change the Group IDs in the High Availability settings to be different from the other firewall pair on the same subnet.

C.  

Change the interface type on the interfaces that have conflicting MAC addresses from L3 to VLAN.

D.  

On one pair of firewalls, run the CLI command: set network interface vlan arp.

Discussion 0
Questions 30

An administrator plans to install the Windows User-ID agent on a domain member system.

What is a best practice for choosing where to install the User-ID agent?

Options:

A.  

On the same RODC that is used for credential detection

B.  

In close proximity to the firewall it will be providing User-ID to

C.  

In close proximity to the servers it will be monitoring

D.  

On the DC holding the Schema Master FSMO role

Discussion 0
Questions 31

What happens, by default, when the GlobalProtect app fails to establish an IPSec tunnel to the GlobalProtect gateway?

Options:

A.  

It tries to establish a tunnel to the GlobalProtect portal using SSL/TLS.

B.  

It stops the tunnel-establishment processing to the GlobalProtect gateway immediately.

C.  

It tries to establish a tunnel to the GlobalProtect gateway using SSL/TLS.

D.  

It keeps trying to establish an IPSec tun£el to the GlobalProtect gateway.

Discussion 0
Questions 32

Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)

Options:

A.  

Log Ingestion

B.  

HTTP

C.  

Log Forwarding

D.  

LDAP

Discussion 0
Questions 33

Which source is the most reliable for collecting User-ID user mapping?

Options:

A.  

Syslog Listener

B.  

Microsoft Exchange

C.  

Microsoft Active Directory

D.  

GlobalProtect

Discussion 0
Questions 34

A firewall architect is attempting to install a new Palo Alto Networks NGFW. The company has previously had issues moving all administrative functions onto a data plane interface to meet the design limitations of the environment. The architect is able to access the device for HTTPS and SSH; however, the NGFW can neither validate licensing nor get updates. Which action taken by the architect will resolve this issue?

Options:

A.  

Create a service route that sets the source interface to the data plane interface in question

B.  

Validate that all upstream devices will allow and properly route the outbound traffic to the external destinations needed

C.  

Create a loopback from the management interface to the data plane interface, then make a service route from the management interface to the data plane interface

D.  

Enable OCSP for the data plane interface so the firewall will create a certificate with the data plane interface's IP

Discussion 0
Questions 35

Which statement regarding HA timer settings is true?

Options:

A.  

Use the Recommended profile for typical failover timer settings

B.  

Use the Moderate profile for typical failover timer settings

C.  

Use the Aggressive profile for slower failover timer settings.

D.  

Use the Critical profile for faster failover timer settings.

Discussion 0
Questions 36

An engineer configures SSL decryption in order to have more visibility to the internal users' traffic when it is regressing the firewall.

Which three types of interfaces support SSL Forward Proxy? (Choose three.)

Options:

A.  

High availability (HA)

B.  

Layer 3

C.  

Layer 2

D.  

Tap

E.  

Virtual Wire

Discussion 0
Questions 37

An administrator notices that an interface configuration has been overridden locally on a firewall. They require all configuration to be managed from Panorama and overrides are not allowed. What is one way the administrator can meet this requirement?

Options:

A.  

Perform a device-group commit push from Panorama using the "Include Device and Network Templates" option

B.  

Perform a template commit push from Panorama using the "Force Template Values" option

C.  

Perform a commit force from the CLI of the firewall

D.  

Reload the running configuration and perform a firewall local commit

Discussion 0
Questions 38

A firewall engineer creates a new App-ID report under Monitor > Reports > Application Reports > New Applications to monitor new applications on the network and better assess any Security policy updates the engineer might want to make.

How does the firewall identify the New App-ID characteristic?

Options:

A.  

It matches to the New App-IDs downloaded in the last 90 days.

B.  

It matches to the New App-IDs in the most recently installed content releases.

C.  

It matches to the New App-IDs downloaded in the last 30 days.

D.  

It matches to the New App-IDs installed since the last time the firewall was rebooted.

Discussion 0
Questions 39

A firewall administrator manages sets of firewalls which have two unique idle timeout values. Datacenter firewalls needs to be set to 20 minutes and BranchOffice firewalls need to be set to 30 minutes. How can the administrator assign these settings through the use of template stacks?

Options:

A.  

Create one template stack and place the BranchOffice_Template in higher priority than Datacenter_Template.

B.  

Create one template stack and place the Datanceter_Template in higher priority than BranchOffice_template.

C.  

Create two separate template stacks one each for Datacenter and BranchOffice, and verify that Datacenter_Template and BranchOffice_template are at the bottom of their stack.

D.  

Create two separate template stacks one each for Datacenter and BranchOffice, and verify that Datacenter_template are at the top of their stack

Discussion 0
Questions 40

What should an engineer consider when setting up the DNS proxy for web proxy?

Options:

A.  

A secondary DNS server in the DNS proxy is optional, and configuration commit to the firewall will succeed with only one DNS server.

B.  

A maximum of two FQDNs can be mapped to an IP address in the static entries for DNS proxy.

C.  

DNS timeout for web proxy can be configured manually, and it should be set to the highest value possible.

D.  

Adjust the UDP queries for the DNS proxy to allow both DNS servers to be tried within 20 seconds.

Discussion 0
Questions 41

An engineer is troubleshooting a traffic-routing issue.

What is the correct packet-flow sequence?

Options:

A.  

PBF > Zone Protection Profiles > Packet Buffer Protection

B.  

BGP > PBF > NAT

C.  

PBF > Static route > Security policy enforcement

D.  

NAT > Security policy enforcement > OSPF

Discussion 0
Questions 42

Which two are required by IPSec in transport mode? (Choose two.)

Options:

A.  

Auto generated key

B.  

NAT Traversal

C.  

IKEv1

D.  

DH-group 20 (ECP-384 bits)

Discussion 0
Questions 43

A firewall engineer creates a source NAT rule to allow the company's internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.

Which set of steps should the engineer take to accomplish this objective?

Options:

A.  

1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port.2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none.3. Place (NAT-Rule-1) above (NAT-Rule-2).

B.  

1- Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.0/23.2. Check the box for negate option to negate this IP subnet from NAT translation.

C.  

1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port.2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none.3. Place (NAT-Rule-2) above (NAT-Rule-1).

D.  

1. Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.10/32.2. Check the box for negate option to negate this IP from the NAT translation.

Discussion 0
Questions 44

In the following image from Panorama, why are some values shown in red?

Options:

A.  

sg2 session count is the lowest compared to the other managed devices.

B.  

us3 has a logging rate that deviates from the administrator-configured thresholds.

C.  

uk3 has a logging rate that deviates from the seven-day calculated baseline.

D.  

sg2 has misconfigured session thresholds.

Discussion 0
Questions 45

Users are intermittently being cut off from local resources whenever they connect to GlobalProtect. After researching, it is determined that this is caused by an incorrect setting on one of the NGFWs. Which action will resolve this issue?

Options:

A.  

Change the "GlobalProtect Gateway -> Agent -> Network Services -> Split Tunnel -> No direct access to local network" setting to "off"

B.  

Change the "GlobalProtect Portal -> Satellite -> Gateways -> No direct access to local network" setting to "off"

C.  

Change the "GlobalProtect Gateway -> Agent -> Client Settings -> Split Tunnel -> No direct access to local network" setting to "off"

D.  

Change the "GlobalProtect Portal -> Agent -> App -> Split Tunnel -> No direct access to local network" setting to "off"

Discussion 0
Questions 46

An auditor is evaluating the configuration of Panorama and notices a discrepancy between the Panorama template and the local firewall configuration. When overriding the firewall configuration pushed from Panorama, what should you consider?

Options:

A.  

The firewall template will show that it is out of sync within Panorama

B.  

Only Panorama can revert the override

C.  

The modification will not be visible in Panorama

D.  

Panorama will update the template with the overridden value

Discussion 0
Questions 47

An engineer is pushing configuration from Panorama to a managed firewall What happens when the pushed Panorama configuration has Address Object names that duplicate the Address Objects already configured on the firewall?

Options:

A.  

The firewall ignores only the pushed objects that have the same name as the locally configured objects, and it will commit the rest of the pushed configuration.

B.  

The firewall fully commits all of the pushed configuration and overwrites its locally configured objects

C.  

The firewall rejects the pushed configuration, and the commit fails.

D.  

The firewall renames the duplicate local objects with "-1" at the end signifying they are clones; it will update the references to the objects accordingly and fully commit the pushed configuration.

Discussion 0
Questions 48

Which three statements accurately describe Decryption Mirror? (Choose three.)

Options:

A.  

Decryption Mirror requires a tap interface on the firewall

B.  

Use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information that is submitted via an encrypted channel

C.  

Only management consent is required to use the Decryption Mirror feature.

D.  

Decryption, storage, inspection, and use of SSL traffic are regulated in certain countries.

E.  

You should consult with your corporate counsel before activating and using Decryption Mirror in a production environment.

Discussion 0
Questions 49

Which two components are required to configure certificate-based authentication to the web Ul when an administrator needs firewall access on a trusted interface'? (Choose two.)

Options:

A.  

Server certificate

B.  

SSL/TLS Service Profile

C.  

Certificate Profile

D.  

CA certificate

Discussion 0
Questions 50

Which three external authentication services can the firewall use to authenticate admins into the Palo Alto Networks NGFW without creating administrator account on the firewall? (Choose three.)

Options:

A.  

RADIUS

B.  

TACACS+

C.  

Kerberos

D.  

LDAP

E.  

SAML

Discussion 0
Questions 51

During a routine security audit, the risk and compliance team notices a series of WildFire logs that contain a "malicious" verdict and the action "allow." Upon further inspection, the team confirms that these same threats are automatically blocked by the firewalls the following day. How can the existing configuration be adjusted to ensure that new threats are blocked within minutes instead of having to wait until the following day?

Options:

A.  

Confirm the file types and direction are configured correctly in the WildFire analysis profile

B.  

Configure the appropriate actions in the Antivirus security profile

C.  

Configure the appropriate actions in the File Blocking profile

D.  

Confirm the file size limits are configured correctly in the WildFire general settings

Discussion 0
Questions 52

Which action does a firewall take when a decryption profile allows unsupported modes and unsupported traffic with TLS 1.2 protocol traverses the firewall?

Options:

A.  

It downgrades the protocol to ensure compatibility.

B.  

It generates a decryption error message but allows the traffic to continue decryption.

C.  

It blocks all communication with the server indefinitely.

D.  

It automatically adds the server to the SSL decryption exclusion list.

Discussion 0
Questions 53

A security engineer needs firewall management access on a trusted interface.

Which three settings are required on an SSL/TLS Service Profile to provide secure Web UI authentication? (Choose three.)

Options:

A.  

Minimum TLS version

B.  

Certificate

C.  

Encryption Algorithm

D.  

Maximum TLS version

E.  

Authentication Algorithm

Discussion 0
Questions 54

An administrator needs to gather information about the CPU utilization on both the management plane and the data plane. Where does the administrator view the desired data?

Options:

A.  

Support > Resources

B.  

Application Command and Control Center

C.  

Resources Widget on the Dashboard

D.  

Monitor > Utilization

Discussion 0
Questions 55

A company has a PA-3220 NGFW at the edge of its network and wants to use active directory groups in its Security policy rules. There are 1500 groups in its active directory. An engineer has been provided 800 active directory groups to be used in the Security policy rules.

What is the engineer's next step?

Options:

A.  

Create a Group Mapping with 800 groups in the Group Include List.

B.  

Create two Group Include Lists, each with 400 Active Directory groups.

C.  

Create a Group Include List with the 800 Active Directory groups.

D.  

Create two Group Mappings, each with 400 groups in the Group Include List.

Discussion 0
Questions 56

A firewall administrator has been tasked with ensuring that all Panorama configuration is committed and pushed to the devices at the end of the day at a certain time. How can they achieve this?

Options:

A.  

Use the Scheduled Config Push to schedule Commit to Panorama and also Push to Devices.

B.  

Use the Scheduled Config Push to schedule Push to Devices and separately schedule an API call to commit all Panorama changes.

C.  

Use the Scheduled Config Export to schedule Push to Devices and separately schedule an API call to commit all Panorama changes

D.  

Use the Scheduled Config Export to schedule Commit to Panorama and also Push to Devices

Discussion 0
Questions 57

An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted Information Security to look for more controls that can secure access to critical assets. For users that need to access these systems. Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MFA.

What should the enterprise do to use PAN-OS MFA?

Options:

A.  

Configure a Captive Portal authentication policy that uses an authentication sequence.

B.  

Configure a Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile.

C.  

Create an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy.

D.  

Use a Credential Phishing agent to detect, prevent, and mitigate credential phishing campaigns.

Discussion 0
Questions 58

If an administrator wants to apply QoS to traffic based on source, what must be specified in a QoS policy rule?

Options:

A.  

Post-NAT destination address

B.  

Pre-NAT destination address

C.  

Post-NAT source address

D.  

Pre-NAT source address

Discussion 0
Questions 59

A company CISO updates the business Security policy to identify vulnerable assets and services and deploy protection for quantum-related attacks. As a part of this update, the firewall team is reviewing the cryptography used by any devices they manage. The firewall architect is reviewing the Palo Alto Networks NGFWs for their VPN tunnel configurations. It is noted in the review that the NGFWs are running PAN-OS 11.2. Which two NGFW settings could the firewall architect recommend to deploy protections per the new policy? (Choose two)

Options:

A.  

IKEv1 only to deactivate the use of public key encryption

B.  

IKEv2 with Hybrid Key exchange

C.  

IKEv2 with Post-Quantum Pre-shared Keys

D.  

IPsec with Hybrid ID exchange

Discussion 0
Questions 60

Which sessions does Packet Buffer Protection apply to when used on ingress zones to protect against single-session DoS attacks?

Options:

A.  

New sessions and is global

B.  

New sessions and is not global

C.  

Existing sessions and is not global

D.  

Existing sessions and is global

Discussion 0
Questions 61

A firewall administrator has been tasked with ensuring that all firewalls forward System logs to Panorama. In which section is this configured?

Options:

A.  

Monitor > Logs > System

B.  

Objects > Log Forwarding

C.  

Panorama > Managed Devices

D.  

Device > Log Settings

Discussion 0
Questions 62

Which two factors should be considered when sizing a decryption firewall deployment? (Choose two.)

Options:

A.  

Encryption algorithm

B.  

Number of security zones in decryption policies

C.  

TLS protocol version

D.  

Number of blocked sessions

Discussion 0
Questions 63

A firewall administrator is investigating high packet buffer utilization in the company firewall. After looking at the threat logs and seeing many flood attacks coming from a single source that are dropped by the firewall, the administrator decides to enable packet buffer protection to protect against similar attacks.

The administrator enables packet buffer protection globally in the firewall but still sees a high packet buffer utilization rate.

What else should the administrator do to stop packet buffers from being overflowed?

Options:

A.  

Apply DOS profile to security rules allow traffic from outside.

B.  

Add the default Vulnerability Protection profile to all security rules that allow traffic from outside.

C.  

Enable packet buffer protection for the affected zones.

D.  

Add a Zone Protection profile to the affected zones.

Discussion 0
Questions 64

Which log type is supported in the Log Forwarding profile?

Options:

A.  

Configuration

B.  

GlobalProtect

C.  

Tunnel

D.  

User-ID

Discussion 0
Questions 65

A firewall engineer is migrating port-based rules to application-based rules by using the Policy Optimizer. The engineer needs to ensure that the new application-based rules are future-proofed, and that they will continue to match if the existing signatures for a specific application are expanded with new child applications. Which action will meet the requirement while ensuring that traffic unrelated to the specific application is not matched?

Options:

A.  

Create a custom application and define it by the correct TCP and UDP ports

B.  

Create an application filter based on the existing application category and risk

C.  

Add specific applications that are seen when creating cloned rules

D.  

Add the relevant container application when creating cloned rules

Discussion 0
Questions 66

An engineer has been asked to limit which routes are shared by running two different areas within an OSPF implementation. However, the devices share a common link for communication. Which virtual router configuration supports running multiple instances of the OSPF protocol over a single link?

Options:

A.  

OSPFV3

B.  

ECMP

C.  

ASBR

D.  

OSBF

Discussion 0
Questions 67

An organization uses the User-ID agent to control access to sensitive internal resources. A firewall engineer adds Security policies to ensure only User A has access to a specific resource. User A was able to access the resource without issue before the updated policies, but now is having intermittent connectivity issues. What is the most likely resolution to this issue?

Options:

A.  

Add service accounts running on that machine to the "Ignore User List" in the User-ID agent setup

B.  

Remove the identity redistribution rules synced from Cloud Identity Engine from the User-ID agent configuration

C.  

Remove the rate-limiting rule that is assigned to User A access from the User-ID agent configuration

D.  

Add the subnets of both the user machine and the resource to the "Include List" in the User-ID agent configuration

Discussion 0
Questions 68

An engineer is monitoring an active/active high availability (HA) firewall pair.

Which HA firewall state describes the firewall that is experiencing a failure of a monitored path?

Options:

A.  

Initial

B.  

Tentative

C.  

Passive

D.  

Active-secondary

Discussion 0
Questions 69

An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.)

Options:

A.  

Exhibit A

B.  

Exhibit B

C.  

Exhibit C

D.  

Exhibit D

Discussion 0
Questions 70

A firewall administrator is configuring an IPSec tunnel between Site A and Site B. The Site A firewall uses a DHCP assigned address on the outside interface of the firewall, and the Site B firewall uses a static IP address assigned to the outside interface of the firewall. However, the use of dynamic peering is not working.

Refer to the two sets of configuration settings provided. Which two changes will allow the configurations to work? (Choose two.)

Site A configuration:

Options:

A.  

Enable NAT Traversal on Site B firewall

B.  

Configure Local Identification on Site firewall

C.  

Disable passive mode on Site A firewall

D.  

Match IKE version on both firewalls.

Discussion 0
Questions 71

Which two virtualization platforms officially support the deployment of Palo Alto Networks VM-Series firewalls? (Choose two.)

Options:

A.  

Red Hat Enterprise Virtualization (RHEV)

B.  

Kernel Virtualization Module (KVM)

C.  

Boot Strap Virtualization Module (BSVM)

D.  

Microsoft Hyper-V

Discussion 0
Questions 72

What are three tasks that cannot be configured from Panorama by using a template stack? (Choose three.)

Options:

A.  

Change the firewall management IP address

B.  

Configure a device block list

C.  

Add administrator accounts

D.  

Rename a vsys on a multi-vsys firewall

E.  

Enable operational modes such as normal mode, multi-vsys mode, or FIPS-CC mode

Discussion 0
Questions 73

An engineer is designing a deployment of multi-vsys firewalls.

What must be taken into consideration when designing the device group structure?

Options:

A.  

Only one vsys or one firewall can be assigned to a device group, and a multi-vsys firewall can have each vsys in a different device group.

B.  

Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall can have each vsys in a different device group.

C.  

Only one vsys or one firewall can be assigned to a device group, except for a multi-vsys firewall, which must have all its vsys in a single device group.

D.  

Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall must have all its vsys in a single device group.

Discussion 0
Questions 74

A firewall engineer creates a NAT rule to translate IP address 1.1.1.10 to 192.168.1.10. The engineer also plans to enable DNS rewrite so that the firewall rewrites the IPv4 address in a DNS response based on the original destination IP address and translated destination IP address configured for the rule. The engineer wants the firewall to rewrite a DNS response of 1.1.1.10 to 192.168.1.10.

What should the engineer do to complete the configuration?

Options:

A.  

Create a U-Turn NAT to translate the destination IP address 192.168.1.10 to 1.1.1.10 with the destination port equal to UDP/53.

B.  

Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Forward.

C.  

Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Reverse.

D.  

Create a U-Turn NAT to translate the destination IP address 1.1.1.10 to 192.168.1.10 with the destination port equal to UDP/53.

Discussion 0
Questions 75

An administrator has been tasked with configuring decryption policies,

Which decryption best practice should they consider?

Options:

A.  

Consider the local, legal, and regulatory implications and how they affect which traffic can be decrypted.

B.  

Decrypt all traffic that traverses the firewall so that it can be scanned for threats.

C.  

Place firewalls where administrators can opt to bypass the firewall when needed.

D.  

Create forward proxy decryption rules without Decryption profiles for unsanctioned applications.

Discussion 0
Questions 76

A company is expanding its existing log storage and alerting solutions All company Palo Alto Networks firewalls currently forward logs to Panorama. Which two additional log forwarding methods will PAN-OS support? (Choose two)

Options:

A.  

SSL

B.  

TLS

C.  

HTTP

D.  

Email

Discussion 0
Questions 77

An administrator is building Security rules within a device group to block traffic to and from malicious locations.

How should those rules be configured to ensure that they are evaluated with a high priority?

Options:

A.  

Create the appropriate rules with a Block action and apply them at the top ol the Security Pre-Rules.

B.  

Create the appropriate rules with a Block action and apply them at the top of the Security Post-Rules.

C.  

Create the appropriate rules with a Block action and apply them at the top of the local firewall Security rules.

D.  

Create the appropriate rules with a Block action and apply them at the top of the Default Rules.

Discussion 0
Questions 78

Which is not a valid reason for receiving a decrypt-cert-validation error?

Options:

A.  

Unsupported HSM

B.  

Unknown certificate status

C.  

Client authentication

D.  

Untrusted issuer

Discussion 0
Questions 79

SAML SLO is supported for which two firewall features? (Choose two.)

Options:

A.  

GlobalProtect Portal

B.  

CaptivePortal

C.  

WebUI

D.  

CLI

Discussion 0
Questions 80

An engineer troubleshooting a VPN issue needs to manually initiate a VPN tunnel from the CLI Which CLI command can the engineer use?

Options:

A.  

test vpn ike-sa

B.  

test vpn gateway

C.  

test vpn flow

D.  

test vpn tunnel

Discussion 0
Questions 81

What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three

Options:

A.  

Configure a URL profile to block the phishing category.

B.  

Create a URL filtering profile

C.  

Enable User-ID.

D.  

Create an anti-virus profile.

E.  

Create a decryption policy rule.

Discussion 0
Questions 82

When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?

Options:

A.  

Set the passive link state to shutdown".

B.  

Disable config sync.

C.  

Disable the HA2 link.

D.  

Disable HA.

Discussion 0
Questions 83

An administrator has purchased WildFire subscriptions for 90 firewalls globally.

What should the administrator consider with regards to the WildFire infra-structure?

Options:

A.  

To comply with data privacy regulations, WildFire signatures and ver-dicts are not shared globally.

B.  

Palo Alto Networks owns and maintains one global cloud and four WildFire regional clouds.

C.  

Each WildFire cloud analyzes samples and generates malware signatures and verdicts independently of the other WildFire clouds.

D.  

The WildFire Global Cloud only provides bare metal analysis.

Discussion 0
Questions 84

An administrator is tasked to provide secure access to applications running on a server in the company's on-premises datacenter.

What must the administrator consider as they prepare to configure the decryption policy?

Options:

A.  

Ensure HA3 interfaces are configured in a HA pair environment to sync decrypted sessions.

B.  

Obtain or generate the server certificate and private key from the datacenter server.

C.  

Obtain or generate the self-signed certificate with private key in the firewall

D.  

Obtain or generate the forward trust and forward untrust certificate from the datacenter server.

Discussion 0
Questions 85

A superuser is tasked with creating administrator accounts for three contractors. For compliance purposes, all three contractors will be working with different device-groups in their hierarchy to deploy policies and objects

Which type of role-based access is most appropriate for this project?

Options:

A.  

Create a Dynamic Read only superuser.

B.  

Create a Dynamic Admin with the Panorama Administrator role

C.  

Create a Device Group and Template Admin

D.  

Create a Custom Panorama Admin

Discussion 0
Questions 86

An engineer decides to use Panorama to upgrade devices to PAN-OS 10.2.

Which three platforms support PAN-OS 10.2? (Choose three.)

Options:

A.  

PA-220

B.  

PA-800 Series

C.  

PA-5000 Series

D.  

PA-500

E.  

PA-3400 Series

Discussion 0
Questions 87

During the process of developing a decryption strategy and evaluating which websites are required for corporate users to access, several sites have been identified that cannot be decrypted due to technical reasons. In this case, the technical reason is unsupported ciphers Traffic to these sites will therefore be blocked if decrypted.

How should the engineer proceed?

Options:

A.  

Install the unsupported cipher into the firewall to allow the sites to be decrypted

B.  

Allow the firewall to block the sites to improve the security posture.

C.  

Add the sites to the SSL Decryption Exclusion list to exempt them from decryption.

D.  

Create a Security policy to allow access to those sites.

Discussion 0
Questions 88

A firewall engineer needs to update a company's Panorama-managed firewalls to the latest version of PAN-OS. Strict security requirements are blocking internet access to Panorama and to the firewalls. The PAN-OS images have previously been downloaded to a secure host on the network.

Which path should the engineer follow to deploy the PAN-OS images to the firewalls?

Options:

A.  

Upload the image to Panorama > Software menu, and deploy it to the firewalls. *

B.  

Upload the image to Panorama > Device Deployment > Dynamic Updates menu, and deploy it to the firewalls.

C.  

Upload the image to Panorama > Dynamic Updates menu, and deploy it to the firewalls.

D.  

Upload the image to Panorama > Device Deployment > Software menu, and deploy it to the firewalls.

Discussion 0
Questions 89

Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port?

Options:

A.  

The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-1.

B.  

The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-2.

C.  

The firewall will allow HTTP, Telnet, SNMP, HTTPS, SSH and Ping from IP addresses defined as $permitted-subnet-1 and $permitted-subnet-2.

D.  

The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-1 and $permitted-subnet-2.

Discussion 0
Questions 90

An administrator would like to determine which action the firewall will take for a specific CVE. Given the screenshot below, where should the administrator navigate to view this information?

Options:

A.  

The profile rule action

B.  

CVE column

C.  

Exceptions lab

D.  

The profile rule threat name

Discussion 0
Questions 91

A standalone firewall with local objects and policies needs to be migrated into Panorama. What procedure should you use so Panorama is fully managing the firewall?

Options:

A.  

Use the "import device configuration to Panorama" operation, commit to Panorama, then "export or push device config bundle" to push the configuration.

B.  

Use the "import Panorama configuration snapshot" operation, commit to Panorama, then "export or push device config bundle" to push the configuration.

C.  

Use the "import device configuration to Panorama" operation, commit to Panorama, then perform a device-group commit push with "include device and network templates".

D.  

Use the "import Panorama configuration snapshot" operation, commit to Panorama, then perform a device-group commit push with "include device and network templates".

Discussion 0
Questions 92

A firewall administrator has configured User-ID and deployed GlobalProtect, but there is no User-ID showing in the traffic logs.

How can the administrator ensure that User-IDs are populated in the traffic logs?

Options:

A.  

Create a Group Mapping for the GlobalProtect Group.

B.  

Enable Captive Portal on the expected source interfaces.

C.  

Add the users to the proper Dynamic User Group.

D.  

Enable User-ID on the expected trusted zones.

Discussion 0
Questions 93

An engineer is reviewing policies after a PAN-OS upgrade What are the two differences between Highlight Unused Rules and the Rule Usage Hit counters immediately after a reboot?

Options:

A.  

Highlight Unused Rules will highlight all rules.

B.  

Highlight Unused Rules will highlight zero rules.

C.  

Rule Usage Hit counter will not be reset

D.  

Rule Usage Hit counter will reset

Discussion 0
Questions 94

An administrator wants to configure the Palo Alto Networks Windows User-D agent to map IP addresses to u: ‘The company uses four Microsoft Active ‘servers and two Microsoft Exchange servers, which can provide logs for login events. All six servers have IP addresses assigned from the following subnet: 192.168.28.32/27. The Microsoft Active Directory in 192.168.28.22/128, and the Microsoft Exchange reside in 192,168.28 48/28. What the 0 the User

Options:

A.  

network 192.168.28.32/28 with server type Microsoft Active Directory and network 192.168.28.40/28 Exchange

B.  

network 192.188 28 32/27 with server type Microsoft

C.  

one IP address of a Microsoft Active Directory server and “Auto Discover” enabled to automatically obtain all five of the other servers

D.  

the IP-address and corresponding server type (Microsoft Active Directory or Microsoft Exchange) for each of the six servers

Discussion 0
Questions 95

A firewall architect is attempting to install a new Palo Alto Networks NGFW. The company has previously had issues moving all administrative functions onto a data plane interface to meet the design limitations of the environment. The architect is able to access the device for HTTPS and SSH; however, the NGFW can neither validate licensing nor get updates. Which action taken by the architect will resolve this issue?

Options:

A.  

Create a service route that sets the source interface to the data plane interface in question

B.  

Validate that all upstream devices will allow and properly route the outbound traffic to the external destinations needed

C.  

Create a loopback from the management interface to the data plane interface, then make a service route from the management interface to the data plane interface

D.  

Enable OCSP for the data plane interface so the firewall will create a certificate with the data plane interface’s IP

Discussion 0
Questions 96

Forwarding of which two log types is configured in Objects -> Log Forwarding? (Choose two)

Options:

A.  

GlobalProtect

B.  

Authentication

C.  

User-ID

D.  

WildFire

Discussion 0
Questions 97

Which User-ID mapping method should be used in a high-security environment where all IP address-to-user mappings should always be explicitly known?

Options:

A.  

PAN-OS integrated User-ID agent

B.  

GlobalProtect

C.  

Windows-based User-ID agent

D.  

LDAP Server Profile configuration

Discussion 0
Questions 98

Which feature can provide NGFWs with User-ID mapping information?

Options:

A.  

Web Captcha

B.  

Native 802.1q authentication

C.  

GlobalProtect

D.  

Native 802.1x authentication

Discussion 0
Questions 99

In which two scenarios would it be necessary to use Proxy IDs when configuring site-to-site VPN Tunnels? (Choose two.)

Options:

A.  

Firewalls which support policy-based VPNs.

B.  

The remote device is a non-Palo Alto Networks firewall.

C.  

Firewalls which support route-based VPNs.

D.  

The remote device is a Palo Alto Networks firewall.

Discussion 0
Questions 100

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port.

Which two mandatory options are used to configure a VLAN interface? (Choose two.)

Options:

A.  

Virtual router

B.  

Security zone

C.  

ARP entries

D.  

Netflow Profile

Discussion 0
Questions 101

Which two actions would be part of an automatic solution that would block sites with untrusted certificates without enabling SSL Forward Proxy? (Choose two.)

Options:

A.  

Create a no-decrypt Decryption Policy rule.

B.  

Configure an EDL to pull IP addresses of known sites resolved from a CRL.

C.  

Create a Dynamic Address Group for untrusted sites

D.  

Create a Security Policy rule with vulnerability Security Profile attached.

E.  

Enable the “Block sessions with untrusted issuers” setting.

Discussion 0
Questions 102

Which three items must be configured to implement application override? (Choose three )

Options:

A.  

Custom app

B.  

Security policy rule

C.  

Application override policy rule

D.  

Decryption policy rule

E.  

Application filter

Discussion 0
Questions 103

Review the information below. A firewall engineer creates a U-NAT rule to allow users in the trust zone access to a server in the same zone by using an external,

public NAT IP for that server.

Given the rule below, what change should be made to make sure the NAT works as expected?

Options:

A.  

Change destination NAT zone to Trust_L3.

B.  

Change destination translation to Dynamic IP (with session distribution) using firewall ethI/2 address.

C.  

Change Source NAT zone to Untrust_L3.

D.  

Add source Translation to translate original source IP to the firewall eth1/2 interface translation.

Discussion 0
Questions 104

Which three split tunnel methods are supported by a globalProtect gateway? (Choose three.)

Options:

A.  

video streaming application

B.  

Client Application Process

C.  

Destination Domain

D.  

Source Domain

E.  

Destination user/group

F.  

URL Category

Discussion 0
Questions 105

The UDP-4501 protocol-port is to between which two GlobalProtect components?

Options:

A.  

GlobalProtect app and GiobalProtect satellite

B.  

GlobalRrotect app and GlobalProtect gateway

C.  

GlobalProtect portal and GlobalProtect gateway

D.  

GlobalProtect app and GlobalProtect portal

Discussion 0
Questions 106

Match the terms to their corresponding definitions

Options:

Discussion 0
Questions 107

A firewall administrator needs to check which egress interface the firewall will use to route the IP 10.2.5.3.

Which command should they use?

Options:

A.  

test routing route ip 10.2.5.3 *

B.  

test routing route ip 10.2.5.3 virtual-router default

C.  

test routing fib-lookup ip 10.2.5.0/24 virtual-router default

D.  

test routing fib-lookup ip 10.2.5.3 virtual-router default

Discussion 0
Questions 108

Which tool will allow review of the policy creation logic to verify that unwanted traffic is not allowed?

Options:

A.  

Managed Devices Health

B.  

Test Policy Match

C.  

Preview Changes

D.  

Policy Optimizer

Discussion 0
Questions 109

Following a review of firewall logs for traffic generated by malicious activity, how can an administrator confirm that WildFire has identified a virus?

Options:

A.  

By navigating to Monitor > Logs > WildFire Submissions, applying filter "(subtype eq wildfire-virus)"

B.  

By navigating to Monitor > Logs > Threat, applying filter "(subtype eq wildfire-virus)'

C.  

By navigating to Monitor > Logs > Traffic, applying filter "(subtype eq virus)"

D.  

By navigating to Monitor > Logs> Threat, applying filter "(subtype eq virus)"

Discussion 0
Questions 110

An administrator wants to add User-ID information for their Citrix MetaFrame Presentation Server (MPS) users.

Which option should the administrator use?

Options:

A.  

Terminal Server Agent for User Mapping

B.  

Windows-Based User-ID Agent

C.  

PAN-OS Integrated User-ID Agent

D.  

PAN-OS XML API

Discussion 0
Questions 111

Which three methods are supported for split tunneling in the GlobalProtect Gateway? (Choose three.)

Options:

A.  

Destination user/group

B.  

URL Category

C.  

Destination Domain

D.  

video streaming application

E.  

Source Domain

F.  

Client Application Process

Discussion 0
Questions 112

A firewall administrator configures the HIP profiles on the edge firewall where GlobalProtect is enabled, and adds the profiles to security rules. The administrator wants to redistribute the HIP reports to the data center firewalls to apply the same access restrictions using HIP profiles. However, the administrator can only see the HIP match logs on the edge firewall but not on the data center firewall

What are two reasons why the administrator is not seeing HIP match logs on the data center firewall? (Choose two.)

Options:

A.  

Log Forwarding Profile is configured but not added to security rules in the data center firewall.

B.  

HIP profiles are configured but not added to security rules in the data center firewall.

C.  

User ID is not enabled in the Zone where the users are coming from in the data center firewall.

D.  

HIP Match log forwarding is not configured under Log Settings in the device tab.

Discussion 0