A "Continue" action can be configured on the following Security Profiles:
A. URL Filtering, File Blocking, and Data Filtering
B. URL Filteringn
C. URL Filtering and Antivirus
D. URL Filtering and File Blocking
Can multiple administrator accounts be configured on a single firewall?
A. Yes
B. No
What is the default setting for 'Action' in a Decryption Policy's rule?
A. No-decrypt
B. Decrypt
C. Any
D. None
Where does a GlobalProtect client connect to first when trying to connect to the network?
A. AD agent
B. User-ID agent
C. GlobalProtect Gateway
D. GlobalProtect Portal
What is a use case for deploying Palo Alto Networks NGFW in the public cloud?
A. extending the corporate data center into the public cloud
B. cost savings through one-time purchase of Palo Alto Networks hardware and subscriptions
C. centralizing your data storage on premise
D. faster WildFire analysis response time
Which three are valid configuration options in a WildFire Analysis Profile? (Choose three.)
A. file types
B. direction
C. maximum file size
D. application
In PAN-OS8.0, rule numbers were introduced. Rule Numbers are:
A. Dynamic numbers that refer to a security policy's order and are especially useful when filtering security policies by tags
B. Numbers referring to when the security policy was created and do not have a bearing on the order of policy enforcement
C. Static numbers that must be manually re-numbered whenever a new security policy is added
As the Palo Alto Networks Administrator you have enabled Application Block pages.
Afterwards, not knowing they are attempting to access a blocked webbased application, users call the Help
Desk to complain about network connectivity issues.
What is the cause of the increased number of help desk calls?
A. The File Blocking Block Page was disabled.
B. Some AppID's are set with a Session Timeout value that is too low.
C. The firewall admin did not create a custom response page to notify potential users that their attempt to access the webbased application is being blocked due to policy.
D. Application Block Pages will only be displayed when Captive Portal is configured.
When Destination Network Address Translation is being performed, the destination in the corresponding Security Policy Rule should use:
A. The PostNAT destination zone and PostNAT IP address.
B. The PreNAT destination zone and PreNAT IP address.
C. The PreNAT destination zone and PostNAT IP address.
D. The PostNAT destination zone and PreNAT IP address.
Which fields can be altered in the default Vulnerability profile?
A. Severity
B. Category
C. CVE
D. None