1.
Which Security Policy rule configuration option disables antivirus and anti-spyware scanning of server- to-client flows only?
2.
Which two interface types provide support for network address translation (NAT)? Choose 2 answers
3.
A firewall is being attacked with a port scan. Which component can prevent this attack?
4.
A Palo Alto Networks firewall has the following interface configuration;
Hosts are directly connected on the following interfaces:
Ethernet 1/6 - Host IP 192.168.62.2
Ethernet 1/3 - Host IP 10.46.40.63
The security administrator is investigating why ICMP traffic between the hosts is not working.
She first ensures that ail traffic is allowed between zones based on the following security policy rule:
The routing table of the firewall shows the following output:
Which interface configuration change should be applied to ethernet1/6 to allow the two hosts to communicate based on this information?
5.
After migrating from an ASA firewall, the VPN connection between a remote network and the Palo Alto Networks firewall is not establishing correctly. The following entry is appearing in the logs:

pfs group mismatched: my:0 peer:2
Which setting should be changed on the Palo Alto Firewall to resolve this error message?
6.
Which two interface types can be used when configuring GlobalProtect Portal? Choose 2 answers
7.
After pushing a security policy from Panorama to a PA-3020 firewall, the firewall administrator notices that traffic logs from the PA-3020 are not appearing in Panorama's traffic logs.
What could be the problem?
8.
Palo Alto Networks maintains a dynamic database of malicious domains. Which two Security Platform components use this database to prevent threats? Choose 2 answers
9.
Which three inspections can be performed with a next-generation firewall but NOT with a legacy firewall? Choose 3 answers
10.
It is discovered that WebandNetTrends Unlimited's new web server software produces traffic that the Palo Alto Networks firewall sees as "unknown-tcp" traffic. Which two configurations would identify the application while preserving the ability of the firewall to perform content and threat detection on the traffic? Choose 2 answers