When a security rule is configured as Intrazone, which field cannot be changed?
Which two rule types allow the administrator to modify the destination zone? (Choose two )
An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?
Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?
In a security policy what is the quickest way to rest all policy rule hit counters to zero?
An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
Given the topology, which zone type should you configure for firewall interface E1/1?
What allows a security administrator to preview the Security policy rules that match new application signatures?
Complete the statement. A security profile can block or allow traffic____________
Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?
Which two types of profiles are needed to create an authentication sequence? (Choose two.)
Which protocol used to map username to user groups when user-ID is configured?
After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?
Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.
Which Security policy rule will allow traffic to flow to the web server?
Which rule type is appropriate for matching traffic both within and between the source and destination zones?
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
What do you configure if you want to set up a group of objects based on their ports alone?
What is a recommended consideration when deploying content updates to the firewall from Panorama?
Which action would an administrator take to ensure that a service object will be available only to the selected device group?
Based on the security policy rules shown, ssh will be allowed on which port?
What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)
Which information is included in device state other than the local configuration?
Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)
Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?
URL categories can be used as match criteria on which two policy types? (Choose two.)
What are three factors that can be used in domain generation algorithms? (Choose three.)
View the diagram.
What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?
A)
B)
C)
D)
Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?
Which file is used to save the running configuration with a Palo Alto Networks firewall?
Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?
What are three Palo Alto Networks best practices when implementing the DNS Security Service? (Choose three.)
You must configure which firewall feature to enable a data-plane interface to submit DNS queries on behalf of the control plane?
Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.
What is the quickest way to reset the hit counter to zero in all the security policy rules?
During the packet flow process, which two processes are performed in application identification? (Choose two.)
Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?
You receive notification about new malware that infects hosts through malicious files transferred by FTP.
Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
What does an administrator use to validate whether a session is matching an expected NAT policy?
Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?
Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?
A website is unexpectedly allowed due to miscategorization.
What are two way-s to resolve this issue for a proper response? (Choose two.)
An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.
Which configuration action should the administrator take when creating the address object?
Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?
An administrator would like to determine the default deny action for the application dns-over-https
Which action would yield the information?
Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?
Based on the security policy rules shown, ssh will be allowed on which port?
Selecting the option to revert firewall changes will replace what settings?
Which Security profile should be applied in order to protect against illegal code execution?
An administrator is updating Security policy to align with best practices.
Which Policy Optimizer feature is shown in the screenshot below?
What must be considered with regards to content updates deployed from Panorama?
An address object of type IP Wildcard Mask can be referenced in which part of the configuration?
An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny. What deny action will the firewall perform?
What is the best-practice approach to logging traffic that traverses the firewall?
Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized.
Which user-ID agent sufficient in your network?
Which feature must be configured to enable a data plane interface to submit DNS queries originated from the firewall on behalf of the control plane?
An administrator is troubleshooting traffic that should match the interzone-default rule. However, the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was never changed from its default configuration.
Why doesn't the administrator see the traffic?
In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)
Which interface type requires no routing or switching but applies Security or NAT policy rules before passing allowed traffic?
Selecting the option to revert firewall changes will replace what settings?
An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule. What is the best way to do this?
A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.
Which two types of traffic will the rule apply to? (Choose two)
Why should a company have a File Blocking profile that is attached to a Security policy?
Which solution is a viable option to capture user identification when Active Directory is not in use?
Place the following steps in the packet processing order of operations from first to last.
An administrator is configuring a NAT rule
At a minimum, which three forms of information are required? (Choose three.)
To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?
Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
In order to attach an Antivirus, Anti-Spyware and Vulnerability Protection security profile to your Security Policy rules, which setting must be selected?
Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP Addresses list?
Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?
You have been tasked to configure access to a new web server located in the DMZ
Based on the diagram what configuration changes are required in the NGFW virtual router to route traffic from the 10 1 1 0/24 network to 192 168 1 0/24?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
How many zones can an interface be assigned with a Palo Alto Networks firewall?
Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?
By default, what is the maximum number of templates that can be added to a template stack?
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?
Files are sent to the WildFire cloud service via the WildFire Analysis Profile. How are these files used?
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
What action will inform end users when their access to Internet content is being restricted?
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?
Match the Palo Alto Networks Security Operating Platform architecture to its description.
Match each feature to the DoS Protection Policy or the DoS Protection Profile.
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to
making the changes.
Which action will allow the administrator to undo the changes?
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
Which URL profiling action does not generate a log entry when a user attempts to access that URL?