Which two items must be configured when implementing application override and allowing traffic through the firewall? (Choose two.)
An administrator wants to enable WildFire inline machine learning. Which three file types does WildFire inline ML analyze? (Choose three.)
Which CLI command displays the physical media that are connected to ethernet1/8?
Which three firewall multi-factor authentication factors are supported by PAN-OS? (Choose three.)
Which two key exchange algorithms consume the most resources when decrypting SSL traffic? (Choose two.)
A company wants to implement threat prevention to take action without redesigning the network routing.
What are two best practice deployment modes for the firewall? (Choose two.)
A network security engineer needs to ensure that virtual systems can communicate with one another within a Palo Alto Networks firewall. Separate virtual routers (VRs) are created for each virtual system.
In addition to confirming security policies, which three configuration details should the engineer focus on to ensure communication between virtual systems? (Choose three.)
An engineer is troubleshooting a traffic-routing issue.
What is the correct packet-flow sequence?
When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?
A network engineer has discovered that asymmetric routing is causing a Palo Alto Networks firewall to drop traffic. The network architecture cannot be changed to correct this.
Which two actions can be taken on the firewall to allow the dropped traffic permanently? (Choose two.)