Will an exported configuration contain Management Interface settings?
Will an exported configuration contain Management Interface settings? A. Yes B. No
Will an exported configuration contain Management Interface settings? A. Yes B. No
When using Config Audit, the color yellow indicates which of the following? A. A setting has been changed between the two config files B. A setting has been deleted from a config file. C. A setting has been added to…
What will the user experience when attempting to access a blocked hacking website through a translation service such as Google Translate or Bing Translator? A. A "Blocked" page response when the URL filtering policy to block is enforced. B. A…
Both SSL decryption and SSH decryption are disabled by default. A. True B. False
What are the benefits gained when the "Enable Passive DNS Monitoring" checkbox is chosen on the firewall? A. Improved DNS-based C&C signatures. B. Improved PANDB malware detection. C. Improved BrightCloud malware detection. D. Improved malware detection in WildFire.
When configuring a Decryption Policy, which of the following are available as matching criteria in a policy? (Choose three.) A. Source Zone B. Source User C. Service D. URL-Category E. Application
Which of the following are methods HA clusters use to identify network outages? A. Path and Link Monitoring B. VR and VSys Monitors C. Heartbeat and Session Monitors D. Link and Session Monitors
As a Palo Alto Networks firewall administrator, you have made unwanted changes to the Candidate configuration. These changes may be undone by Device > Setup > Operations > Configuration Managements… and then what operation? A. Revert to Running Configuration B.…
When employing the BrightCloud URL filtering database in a Palo Alto Networks firewall, the order of evaluation within a profile is: A. Block list, Custom Categories, Predefined categories, Dynamic URL filtering, Allow list, Cache files. B. Block list, Allow list,…
When Destination Network Address Translation is being performed, the destination in the corresponding Security Policy Rule should use: A. The PostNAT destination zone and PostNAT IP address. B. The PreNAT destination zone and PreNAT IP address. C. The PreNAT destination…