Paloalto Networks PCNSE - Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0
When creating a Policy-Based Forwarding (PBF) policy, which two components can be used? (Choose two.)
A company wants to add threat prevention to the network without redesigning the network routing.
What are two best practice deployment modes for the firewall? (Choose two.)
What happens when the log forwarding built-in action with tagging is used?
An engineer is tasked with decrypting web traffic in an environment without an established PKI When using a self-signed certificate generated on the firewall which type of certificate should be in? approved web traffic?
What is the purpose of the firewall decryption broker?
An administrator plans to install the Windows User-ID agent on a domain member system.
What is a best practice for choosing where to install the User-ID agent?
What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure an SSL/TLS connection'?
Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)
An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.)
Which two items must be configured when implementing application override and allowing traffic through the firewall? (Choose two.)