1.
Which link is used by an Active-Passive cluster to synchronize session information?
2.
Which of the following describes the sequence of the Global Protect agent connecting to a Gateway?
3.
With IKE, each device is identified to the other by a Peer ID. In most cases, this is just the public IP address of the device. In situations where the public ID is not static, this value can be replaced with a domain name or other text value
4.
Which of the following are methods HA clusters use to identify network outages?
5.
As a Palo Alto Networks firewall administrator, you have made unwanted changes to the Candidate configuration. These changes may be undone by Device > Setup > Operations > Configuration Management>.... and then what operation?
6.
When employing the BrightCloud URL filtering database in a Palo Alto Networks firewall, the order of evaluation within a profile is:
7.
When Destination Network Address Translation is being performed, the destination in the corresponding Security Policy Rule should use:
8.
Taking into account only the information in the screenshot above, answer the following question. Which applications will be allowed on their standard ports?
9.
When using Config Audit, the color yellow indicates which of the following?
10.
Both SSL decryption and SSH decryption are disabled by default.