An administrator has users accessing network resources through Citrix XenApp 7 .x.
Which User-ID mapping solution will map multiple mat who using Citrix to connect to the network and access resources?
A. Client Probing
B. Globa1Protect
C. Terminal Services agent
D. Syslog Monitoring
Which two benefits come from assigning a Decrypting Profile to a Decryption rule with a" NO Decrypt" action? (Choose two.)
A. Block sessions with unsuspected cipher suites
B. Block sessions with untrusted issuers
C. Block credential phishing.
D. Block sessions with client authentication
E. Block sessions with expired certificates
A firewall administrator has been asked to configure a Palo Alto Networks NGFW to prevent against compromised hosts trying to phone-number or bacon out to eternal command-and-control (C2) servers. Which Security Profile type will prevent these behaviors?
A. Vulnerability Protection
B. Antivirus
C. Wildfire
D. Anti-Spyware
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will be detected as credential theft?
A. Using the name user's corporate username and password.
B. First four letters of the username matching any valid corporate username.
C. Matching any valid corporate username.
D. Mapping to the IP address of the logged-in user.
A customer wants to combine multiple Ethernet interfaces into a single virtual interface using Link aggregation.
Which two formats are correct for naming aggregate interlaces? (Choose two.)
A. aggregate.8
B. ae.8
C. ae.1
D. aggregate.1
Which administrative authentication method supports authorization by an external service?
A. RADIUS
B. SSH keys
C. Certification
D. LDAP
What will be the egress interface if the traffic's ingress interface is Ethernet 1/6 sourcing form 192.168.11.3 and to the destination 10.46.41.113.during the.
A. ethernet 1/6
B. ethernet 1/5
C. ethernet 1/3
D. ethernet 1/7
Which option would an administration choose to define the certificate and protect that Panorama and its managed devices uses for SSL/ITS services?
A. Set Up SSL/TLS under Policies > Service/URL Category > Service.
B. Configure on SSL/TLS Profile.
C. Configure a Decryption Profile and select SSL/TLS services.
D. Set up Security policy rule to allow SSL communication.
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?
A. No prerequisites are required
B. SSH keys must be manually generated
C. Both SSH keys and SSL certificates must be generated
D. SSL certificates must be generated
Anadministrator using an enterprise PKI needs to establish a unique chain of trust to ensure mutual authentication between Panorama and the managed firewalls and Log Collectors. How would the administrator establish the chain of trust?
A. Use custom certificates
B. Enable LDAP or RADIUS integration
C. Set up multi-factor authentication
D. Configure strong password authentication