What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?
A. every 30 minutes
B. every 5 minutes
C. once every 24 hours
D. every 1 minute
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?
A. Active Directory monitoring
B. Windows session monitoring
C. Windows client probing
D. domain controller monitoring
Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)
A. Security policy rules inspect but do not block traffic.
B. Security Profile should be used only on allowed traffic.
C. Security Profile are attached to security policy rules.
D. Security Policy rules are attached to Security Profiles.
E. Security Policy rules can block or allow traffic.
An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range. Which steps should the administrator take?
A. Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.
B. Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.
C. Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.
D. Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.
What is a valid Security Zone type in PAN-OS?
A. Management
B. Logical
C. Transparent
D. Tap
An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule. What is the best way to do this?
A. Create a Security policy rule to allow the traffic.
B. Create a new NAT rule with the correct parameters and leave the translation type as None
C. Create a static NAT rule with an application override.
D. Create a static NAT rule translating to the destination interface.
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
A. Layer 2
B. Tap
C. Layer 3
D. Virtual Wire
An administrator is troubleshooting an issue with Office365 and expects that this traffic traverses the firewall.
When reviewing Traffic Log entries, there are no logs matching traffic from the test workstation.
What might cause this issue?
A. Office365 traffic is logged in the System Log.
B. Office365 traffic is logged in the Authentication Log.
C. Traffic matches the interzone-default rule, which does not log traffic by default.
D. The firewall is blocking the traffic, and all blocked traffic is in the Threat Log.
How are service routes used in PAN-OS?
A. By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network
B. To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services
C. For routing, because they are the shortest path selected by the BGP routing protocol
D. To route management plane services through data interfaces rather than the management interface
What are three configurable interface types for a data-plane ethernet interface? (Choose three.)
A. VWire
B. Layer 2
C. Management
D. HSCI
E. Layer 3