Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In Panorama, what is the correct order of precedence for security policies?

A.

Device group pre-rules, shared pre-rules, local rules, device group post-rules, shared post-rules

B.

Shared pre-rules, device group pre-rules, local rules, shared post-rules, device group post-rules

C.

Shared pre-rules, device group pre-rules, local rules, device group post-rules, shared post-rules

D.

Device group pre-rules, shared pre-rules, local rules, shared post-rules, device group post-rules

Match the task for server settings in group mapping with its order in the process.

Match the App-ID adoption task with its order in the process.

Your customer has asked you to set up tunnel monitoring on an IPsec VPN tunnel between two offices What three steps are needed to set up tunnel monitoring? (Choose three)

A.

Create a monitoring profile

B.

Add an IP address to each tunnel interface

C.

Restart each IPsec tunnel

D.

Restart each IKE gateway

E.

Enable tunnel monitoring on each IPsec tunnel

Which of the following is a primary use case for the Decryption Broker feature?

A.

Managing multiple decryption rules

B.

Sharing decrypted traffic with multiple security appliances

C.

Decrypting outbound SSL traffic

D.

Aggregating traffic logs from different sources

You are hosting a public-facing web server on your DMZ and access to that server is through a Palo Alto Networks firewall Both internal clients and internet clients access this web server using the FQDN public webserver acme com which resolves to the public address of 99.99 99.2

Which combination of NAT policies is necessary to enable access to the web server for both internal and internet clients?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which feature allows you to use multiple links simultaneously to balance the load in a Palo Alto Networks firewall?

A.

High Availability

B.

Aggregate Ethernet

C.

Virtual Wire

D.

ECMP (Equal-Cost Multi-Path)

Which two conditions must be met for a firewall to successfully forward traffic to a syslog server? (Choose two)

A.

The syslog server must be defined in the Device > Server Profiles > Syslog section

B.

A syslog forwarding profile must be created and applied to the appropriate security policies

C.

The firewall must be in Virtual Wire mode

D.

The syslog server must be reachable over a secure connection