1.
Given the following routing table:
Which configuration change on the firewall would cause it to use 10.66.24.88 as the nexthop for the 192.168.93.0/30 network?
2.
A company hosts a publicly-accessible web server behind their Palo Alto Networks firewall, with this configuration information:
Which NAT Policy rule will allow users outside the company to access the web server?
3.
A company has purchased a WildFire subscription and would like to implement dynamic updates to download the most recent content as often as possible.
What is the shortest time interval the company can configure their firewall to check for WildFire updates?
4.
Which method is the most efficient for determining which administrator made a specific change to the running config?
5.
You are configuring a File Blocking Profile to be applied to all outbound traffic uploading a specific file type, and there is a specific application that you want to match in the policy. What are three valid actions that can be set when the specified file is detected? Choose 3 answers
6.
Two firewalls are configured in an Active/Passive High Availability (HA) pair with the following election settings:
Firewall 5050-B is presently in the "Active" state and 5050-A is presently in the "Passive" state. Firewall 5050-B reboots causing 5050-A to become Active.
Which firewall will be in the "Active" state after firewall 5050-B has completed its reboot and is back online?
7.
Which two statements are true about DoS Protection Profiles and Policies? Choose 2 answers
8.
Where can the maximum concurrent SSL VPN Tunnels be set for Vsys2 when provisioning a Palo Alto Networks firewall for multiple virtual systems?
9.
A security engineer has been asked by management to optimize how Palo Alto Networks firewall syslog messages are forwarded to a syslog receiver. There are currently 20 PA-5060 s, each of which is configured to forward syslogs individually.
The security engineer would like to leverage their two M-100 appliances to send syslog messages from a single source and has already deployed one in Panorama mode and the other as a Log Collector.
What is the remaining step in implementing this solution?
10.
What can cause missing SSL packets when performing a packet capture on data plane interfaces?