Question 21

An administrator creates an application-based security policy rule and commits the change to the firewall. Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)
  • Question 22

    An engineer needs to see how many existing SSL decryption sessions are traversing a firewall What command should be used?
  • Question 23

    An administrator has configured the Palo Alto Networks NGFW's management interface to connect to the internet through a dedicated path that does not traverse back through the NGFW itself.
    Which configuration setting or step will allow the firewall to get automatic application signature updates?
  • Question 24

    An existing NGFW customer requires direct interne! access offload locally at each site and iPSec connectivity to all branches over public internet. One requirement is mat no new SD-WAN hardware be introduced to the environment.
    What is the best solution for the customer?
  • Question 25

    The manager of the network security team has asked you to help configure the company's Security Profiles according to Palo Alto Networks best practice As part of that effort, the manager has assigned you the Vulnerability Protection profile for the internet gateway firewall.
    Which action and packet-capture setting for items of high severity and critical severity best matches Palo Alto Networks best practice?