1.
As the Palo Alto Networks administrator, you have enabled Application Block pages. Afterward, some users do not receive web-based feedback for all denied applications. Why would this be?
2.
Wildfire may be used for identifying which of the following types of traffic?
3.
When Network Address Translation has been performed on traffic, Destination Zones in Security rules should be based on:
4.
In Active/Active HA environments, redundancy for the HA3 interface can be achieved by:
5.
An Outbound SSL forward-proxy decryption rule cannot be created using which type of zone?
6.
When a Palo Alto Networks firewall is forwarding traffic through interfaces configured for L2 mode, security policies can be set to match on multicast IP addresses.
7.
In an Anti-Virus profile, changing the action to "Block" for IMAP or POP decoders will result in the following:
8.
After configuring Captive Portal in Layer 3 mode, users in the Trust Zone are not receiving the Captive Portal authentication page when they launch their web browsers. How can this be corrected?
9.
The "Disable Server Return Inspection" option on a security profile:
10.
A user complains that they are no longer able to access a needed work application after you have implemented vulnerability and anti-spyware profiles. The user's application uses a unique port. What is the most efficient way to allow the user access to this application?