Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which type of firewall resource can be assigned when configuring a new firewall virtual system (VSYS)?

A.

ICPU

B.

Sessions limit

C.

Memory

D.

Security profile limit

A network security engineer needs to permit traffic between two distinct VSYS that reside on one Palo Alto Networks firewall. This traffic will not egress the firewall to an external device. Which zone type must be configured to act as the logical source and destination for this traffic flow?

A.

TAP

B.

Layer 2

C.

Layer 3

D.

External

An engineer at a managed services provider is updating an application that allows its customers to request firewall changes to also manage SD-WAN. The application will be able to make any approved changes directly to devices via API.

What is a requirement for the application to create SD-WAN interfaces?

A.

REST API’s “sdwanInterfaceprofiles” parameter on a Panorama device

B.

REST API’s “sdwanInterfaces” parameter on a firewall device

C.

XML API’s “sdwanprofiles/interfaces” parameter on a Panorama device

D.

XML API’s “InterfaceProfiles/sdwan” parameter on a firewall device

An enterprise uses GlobalProtect with both user- and machine-based certificate authentication and requires pre-logon, OCSP checks, and minimal user disruption. They manage multiple firewalls via Panorama and deploy domain-issued machine certificates via Group Policy.

Which approach ensures continuous, secure connectivity and consistent policy enforcement?

A.

Use a wildcard certificate from a public CA, disable all revocation checks to reduce latency, and manage certificate renewals manually on each firewall.

B.

Distribute root and intermediate CAs via Panorama template, use distinct certificate profiles for user versus machine certs, reference an internal OCSP responder, and automate certificate deployment with Group Policy.

C.

Configure a single certificate profile for both user and machine certificates. Rely solely on CRLs for revocation to minimize complexity.

D.

Deploy self-signed certificates on each firewall, allow IP-based authentication to override certificate checks, and use default GlobalProtect settings for user / machine identification.

During an upgrade to the routing infrastructure in a customer environment, the network administrator wants to implement Advanced Routing Engine (ARE) on a Palo Alto Networks firewall.

Which firewall models support this configuration?

A.

PA-5280, PA-7080, PA-3250, VM-Series

B.

PA-455, VM-Series, PA-1410, PA-5450

C.

PA-3260, PA-5410, PA-850, PA-460

D.

PA-7050, PA-1420, VM-Series, CN-Series

For which two purposes is an IP address configured on a tunnel interface? (Choose two.)

A.

Use of dynamic routing protocols

B.

Tunnel monitoring

C.

Use of peer IP

D.

Redistribution of User-ID

Which PAN-OS method of mapping users to IP addresses is the most reliable?

A.

Port mapping

B.

GlobalProtect

C.

Syslog

D.

Server monitoring

A network architect is planning the deployment of a new IPSec VPN tunnel to connect a local data center to a cloud environment. The plan must include all necessary Security policy configurations for both tunnel negotiation and data transit. Which two Security policy requirements must be included in the implementation plan? (Choose two answers)

A.

The default interzone-default security policy is sufficient to allow the tunnel negotiation traffic between the firewall and the remote peer.

B.

A pair of policies is required to control the flow of data traffic into and out of the security zone assigned to the tunnel interface.

C.

A policy must explicitly permit only the IKE application between the external-facing zone and local zone.

D.

A policy must explicitly permit the IPSec container application between the external-facing zone and local zone.