An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the
administrator use to verify the progress or success of that commit task? (Choose two.)
A D
What is the purpose of the firewall decryption broker?
A
Explanation:
Reference: https://www.paloaltonetworks.com/documentation/81/pan-os/newfeaturesguide/decryption-features/decryption-
broker
Which feature can be configured on VM-Series firewalls?
D
Which three file types can be forwarded to WildFire for analysis as a part of the basic WildFire service? (Choose three.)
D E F
When is the content inspection performed in the packet flow process?
A
Explanation:
Reference: https://live.paloaltonetworks.com/t5/Learning-Articles/Packet-Flow-Sequence-in-PAN-OS/ta-p/56081
Which two features require another license on the NGFW? (Choose two.)
C D
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/configure-decryption-port-mirroring.html
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-licenses.html
A customer is replacing its legacy remote-access VPN solution. Prisma Access has been selected as the replacement.
During onboarding, the following options and licenses were selected and enabled:
- Prisma Access for Remote Networks: 300Mbps
- Prisma Access for Mobile Users: 1500 Users
- Cortex Data Lake: 2TB
- Trusted Zones: trust
- Untrusted Zones: untrust
- Parent Device Group: shared
The customer wants to forward to a Splunk SIEM the logs that are generated by users that are connected to Prisma Access
for Mobile Users. Which two settings must the customer configure? (Choose two.)
B C
Explanation:
Reference: https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/get-started-with-log-
forwarding-app/forward-logs-from-logging-service-to-syslog-server.html
On the NGFW, how can you generate and block a private key from export and thus harden your security posture and prevent
rogue administrators or other bad actors from misusing keys?
B
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-new-features/decryption-features/block-export-of-private-
keys.html
Which virtual router feature determines if a specific destination IP address is reachable?
C
Explanation:
Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/policy-based-forwarding/pbf/path-
monitoring-for-pbf
An administrator needs to determine why users on the trust zone cannot reach certain websites. The only information
available is shown on the following image.
Which configuration change should the administrator make?
B