In High Availability, which information is transferred via the HA data link?
A. heartbeats
B. HA state information
C. session information
D. User-ID information
An administrator using an enterprise PKI needs to establish a unique chain of trust to ensure mutual authentication between panorama and the managed firewall and Log Collectors. How would the administrator establish the chain of trust?
A. Configure strong password
B. Set up multiple-factor authentication.
C. Use custom certificates.
D. Enable LDAP or RADIUS integration.
Which feature prevents the submission of login information into website froms?
A. credential phishing prevention
B. file blocking
C. User-ID
D. data filtering
A firewall administrator has been asked to configure a Palo Alto Networks NGFW to prevent against compromised hosts trying to phone-number or bacon out to eternal command-and-control (C2) servers. Which Security Profile type will prevent these behaviors?
A. Vulnerability Protection
B. Antivirus
C. Wildfire
D. Anti-Spyware
Which two methods can be used to verify firewall connectivity to Autofocus? (Choose two. )
A. Check the WebUl Dashboard Autofocus widget
B. Check for WildFire forwarding logs.
C. Verify AutoFocus is enabled below Device Management tab
D. Verify AutoFocus status using the CLI "test"command.
E. Check the license
Which administrative authentication method supports authorization by an external service?
A. RADIUS
B. SSH keys
C. Certification
D. LDAP
A Security policy rule is configured with a Vulnerability Protection Profile and an action of Deny".
Which action will this configuration cause on the matched traffic?
A. The configuration is invalid it will cause the firewall to Skip this Security policy rule A warning will be displayed during a command.
B. The configuration is valid It will cause the firewall to deny the matched sessions. Any configured Security Profiles have no effect if the Security policy rule action is set to "Deny".
C. The configuration will allow the matched session unless a vulnerability signature is detected. The "Deny" action will supersede the per. defined, severity defined actions defined in the associated Vulnerability Protection Profile.
D. The configuration is invalid. The Profile Settings section will be- grayed out when the action is set to "Deny".
What should an administrator consider when planning to revert Panorama to a pre-PAN-OS 8.1 version?
A. When Panorama is reverted to an earlier PAN-OS release, variable used in template stacks will be removed authentically.
B. Panorama cannot be reverted to an earlier PAN-OS release if variables are used in templates or stacks.
C. An administrator must use the Expedition tool to adapt the configuration to the pre-pan-OS 8.1 state.
D. Administrators need to manually update variable characters to those to used in pre-PAN-OS 8.1.
A Company needs to preconfigured firewalls to be sent to remote sites with the least amount of preconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers.
Which VPN configuration would adapt to changes when deployed to Hie future site?
A. preconfigured GlobalProtcet satellite
B. preconfigured GlobalProtcet client
C. preconfigured iPsec tunnels
D. preconfigured PPTP Tunnels
What is exchanged through the HA2 link?
A. hello heartbeats
B. User-ID in information
C. session synchronization
D. HA state information