Q1. A "Continue" action can be configured on the following Security Profiles:
A. URL Filtering, File Blocking, and Data Filtering
B. URL Filteringn
C. URL Filtering and Antivirus
D. URL Filtering and File Blocking
Answer: D
Q2. Which of the following options may be enabled to reduce system overhead when using Content ID?
A. STP
B. VRRP
C. RSTP
D. DSRI
Answer: D
Q3. When configuring Admin Roles for Web UI access, what are the available access levels?
A. Enable and Disable only
B. None, Superuser, Device Administrator
C. Allow and Deny only
D. Enable, Read-Only and Disable
Answer: D
Q4. Which one of the options describes the sequence of the GlobalProtect agent connecting to a Gateway?
A. The agent connects to the portal, obtains a list of the Gateways, and connects to the Gateway with the fastest SSL connect time
B. The agent connects to the portal and randomly establishes connect to the first available Gateway
C. The agent connects to the portal, obtains a list of the Gateways, and connects to the Gateway with the fastest PING response time
D. The agent connects to the closest Gateway and sends the HIP report to the portal
Answer: C
Q5. Which of the following describes the sequence of the Global Protect agent connecting to a Gateway?
A. The Agent connects to the Portal obtains a list of Gateways, and connects to the Gateway with the fastest SSL response time
B. The agent connects to the closest Gateway and sends the HIP report to the portal
C. The agent connects to the portal, obtains a list of gateways, and connects to the gateway with the fastest PING response time
D. The agent connects to the portal and randomly establishes a connection to the first available gateway
Answer: A
Q6. What can cause missing SSL packets when performing a packet capture on data plane interfaces?
A. There is a hardware problem with the offloading FPGA on the management plane.
B. The missing packets are offloaded to the management plane CPU.
C. The packets are hardware offloaded to the offload processor on the data plane.
D. The packets are not captured because they are encrypted.
Answer: C
Explanation:
Reference: https://live.paloaltonetworks.com/docs/DOC-8621
Q7. Two firewalls are configured in an Active/Passive High Availability (HA) pair with the following election settings:
Firewall 5050-B is presently in the "Active" state and 5050-A is presently in the "Passive" state. Firewall 5050-B reboots causing 5050-A to become Active.
Which firewall will be in the "Active" state after firewall 5050-B has completed its reboot and is back online?
A. Both firewalls are active (split brain)
B. Firewall 5050-B
C. Firewall 5050-A
D. It could be either firewall
Answer: B
Explanation:
Reference: https://live.paloaltonetworks.com/docs/DOC-2926
Q8. Wildfire may be used for identifying which of the following types of traffic?
A. URL content
B. DHCP
C. DNS
D. Viruses
Answer: D
Q9. Which fields can be altered in the default Vulnerability profile?
A. Severity
B. Category
C. CVE
D. None
Answer: D
Q10. HOTSPOT
Match each type of report provided by the firewall with its description. Answer options may be used more than once or not at all.
Answer: