A firewall administrator has been asked to configure a Palo Alto Networks NGFW to prevent against compromised hosts trying tophone-number or bacon out to eternal command-and-control (C2) servers.
Which Security Profile type will prevent these behaviors?
An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port. Which log entry can the administrator use to verify that sessions are being decrypted?
Which two methods can be configured to validate the revocation status of a certificate? (Choose two)
In High Availability, which information is transferred via the HA data link?
An administrator sees several inbound sessions identified as unknown tcp in the Traffic logs. The administrator determines that thesesessions are from external users accessing the company’s propriety accounting application. The administrator wants to reliability identity this as their accounting application and to scan this traffic for threats.
Which option would achieve this result?
A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the switch it connect.
How would an administrator configure the interface to IGbps?