Question 141

Which protocol is used to map usernames to user groups when User-ID is configured?
  • Question 142

    Which two configuration settings shown are not the default? (Choose two.)
  • Question 143

    Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?
  • Question 144

    What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?
  • Question 145

    Place the following steps in the packet processing order of operations from first to last.