Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are two valid zone types that can be selected from the zone configuration menu, per Palo Alto Networks best practices? (Choose two answers)

A.

Layer 3

B.

Layer 2

C.

Management

D.

DMZ

When integrating Kubernetes with Palo Alto Networks NGFWs, what is used to secure traffic between microservices?

A.

Service graph

B.

Ansible automation modules

C.

Panorama role-based access control

D.

CN-Series firewalls

How does a Palo Alto Networks firewall choose the best route when it receives routes for the same destination from different routing protocols?

A.

The route that was received first will be entered into the forwarding table, and all subsequent routes will be rejected.

B.

It will attempt to load balance the traffic across all routes.

C.

It compares the administrative distance and chooses the one with the highest value.

D.

It compares the administrative distance and chooses the one with the lowest value.

An engineer is troubleshooting a failed inter-VSYS communication path between a DMZ-VSYS and an Internal-VSYS. The configuration includes separate virtual routers with next-vr static routes and appropriate Security policies within each VSYS allowing traffic to and from their external zones. Given that all routing and policy configurations within each individual VSYS are correct, what is the probable cause of the failure?

A.

The intrazone-default policy is blocking the traffic because the two external zones are logically connected.

B.

A tunnel interface is required to connect the two virtual routers instead of using the next-vr option.

C.

The administrator did not configure Visible Virtual System.

D.

The external zones were not assigned the External zone type, preventing them from connecting.

What is a valid configurable limit for setting resource quotas when defining a new VSYS on a Palo Alto Networks firewall?

A.

Percentage of total CPU utilization

B.

Maximum number of SSL decryption rules

C.

Maximum number of virtual routers

D.

Disk space allocation for logs

How does a Palo Alto Networks NGFW respond when the preemptive hold time is set to 0 minutes during configuration of route monitoring?

A.

It does not accept the configuration.

B.

It accepts the configuration but throws a warning message.

C.

It removes the static route because 0 is a NULL value

D.

It reinstalls the route into the routing information base (RIB) as soon as the path comes up.

Without performing a context switch, which set of operations can be performed that will affect the operation of a connected firewall on the Panorama GUI?

A.

Restarting the local firewall, running a packet capture, accessing the firewall CLI

B.

Modification of local security rules, modification of a Layer 3 interface, modification of the firewall device hostname

C.

Modification of pre-security rules, modification of a virtual router, modification of an IKE Gateway Network Profile

D.

Modification of post NAT rules, creation of new views on the local firewall ACC tab, creation of local custom reports

An organization runs multiple Kubernetes clusters both on-premises and in public clouds (AWS, Azure, GCP). They want to deploy the Palo Alto Networks CN-Series NGFW to secure east-west traffic within each cluster, maintain consistent Security policies across all environments, and dynamically scale as containerized workloads spin up or down. They also plan to use a centralized Panorama instance for policy management and visibility.

Which approach meets these requirements?

A.

Install standalone CN-Series instances in each cluster with local configuration only. Export daily policy configuration snapshots to Panorama for recordkeeping, but do not unify policy enforcement.

B.

Configure the CN-Series only in public cloud clusters, and rely on Kubernetes Network Policies for on-premises cluster security. Synchronize partial policy information into Panorama manually as needed.

C.

Use Kubernetes-native deployment tools (e.g., Helm) to deploy CN-Series in each cluster, ensuring local insertion into the service mesh or CNI. Manage all CN-Series firewalls centrally from Panorama, applying uniform Security policies across on-premises and cloud clusters.

D.

Deploy a single CN-Series firewall in the on-premises data center to process traffic for all clusters, connecting remote clusters via VPN or peering. Manage this single instance through Panorama.

An engineer is configuring a site-to-site IPSec VPN to a partner network. The IKE Gateway and IPSec tunnel configurations are complete, and the tunnel interface has been assigned to a security zone. However, the tunnel fails to establish, and no application traffic passes through it once it is up. Which two Security policy configurations are required to allow tunnel establishment and data traffic flow in this scenario? (Choose two answers)

A.

A security rule is needed to allow IKE and IPSec traffic between the zone where the physical interface resides and the zone of the partner gateway.

B.

A single bidirectional security rule must be configured to manage traffic flowing through the tunnel interface.

C.

Security rules must be configured to permit application traffic from the local zone to the tunnel zone, and from the tunnel zone to the local zone.

D.

An Application Override policy is needed to allow both the IKE negotiation and the encapsulated data traffic.

An administrator plans to upgrade a pair of active/passive firewalls to a new PAN-OS release. The environment is highly sensitive, and downtime must be minimized.

What is the recommended upgrade process for minimal disruption in this high availability (HA) scenario?

A.

Suspend the active firewall to trigger a failover to the passive firewall. With traffic now running on the former passive unit, upgrade the suspended (now passive) firewall and confirm proper operation. Then fail traffic back and upgrade the remaining firewall.

B.

Shut down the currently active firewall and upgrade it offline, allowing the passive firewall to handle all traffic. Once the active firewall finishes upgrading, bring it back online and rejoin the HA cluster. Finally, upgrade the passive firewall while the newly upgraded unit remains active.

C.

Isolate both firewalls from the production environment and upgrade them in a separate, offline setup. Reconnect them only after validating the new software version, resuming HA functionality once both units are fully upgraded and tested.

D.

Push the new PAN-OS version simultaneously to both firewalls, having them upgrade and reboot in parallel. Rely on automated HA reconvergence to restore normal operations without manually failing over traffic.