



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
PA 241-260 EXAM STUDY GUIDE 2025-2026
Typology: Exams
1 / 5
This page cannot be seen from the preview
Don't miss anything!
How can packet buffer protection be configured? A. at zone level to protect firewall resources and ingress zones, but not at the device level B. at the interface level to protect firewall resources C. at the device level (globally) to protect firewall resources and ingress zones, but not at the zone level D. at the device level (globally) and, if enabled globally, at the zone level - ANSWER D An existing NGFW customer requires direct internet access offload locally at each site, and IPSec connectivity to all branches over public internet. One requirement is that no new SD-WAN hardware be introduced to the environment.What is the best solution for the customer? A. Configure a remote network on PAN-OS B. Upgrade to a PAN-OS SD-WAN subscription C. Configure policy-based forwarding D. Deploy Prisma SD-WAN with Prisma Access - ANSWER B A firewall administrator requires an A/P HA pair to fail over more quickly due to critical business application uptime requirements.What is the correct setting? A. Change the HA timer profile to "user-defined" and manually set the timers. B. Change the HA timer profile to "fast". C. Change the HA timer profile to "aggressive" or customize the settings in advanced profile. D. Change the HA timer profile to "quick" and customize in advanced profile. - ANSWER C What is the function of a service route? A. The service packets exit the firewall on the port assigned for the external service. The server sends its response to the configured source interface and source IP address.
B. The service packets enter the firewall on the port assigned from the external service. The server sends its response to the configured destination interface and destination IP address. C. The service route is the method required to use the firewall's management plane to provide services to applications. D. Service routes provide access to external services, such as DNS servers, external authentication servers or Palo Alto Networks services like the Customer Support Portal.
B. Yes. Firewalls are session-based, so they do not scale to millions of CPS. C. No. Placing firewalls in front of perimeter DDoS devices provides greater protection for sensitive devices inside the network. D. Yes. Zone Protection profiles can be tailored to the resources that they protect via the configuration of specific device types and operating systems. - ANSWER B PICTURE DRAG DROP -Match each GlobalProtect component to the purpose of that component.Select and Place: A. GlobalProtect Gateway B. GlobalProtect Clientless C. GlobalProtect Portal D. GlobalProtect App - ANSWER CADB An administrator needs to validate that policies that will be deployed will match the appropriate rules in the device-group hierarchy.Which tool can the administrator use to review the policy creation logic and verify that unwanted traffic is not allowed? A. Preview Changes B. Policy Optimizer C. Managed Devices Health D. Test Policy Match - ANSWER A What is a key step in implementing WildFire best practices? A. Configure the firewall to retrieve content updates every minute. B. Ensure that a Threat Prevention subscription is active. C. In a mission-critical network, increase the WildFire size limits to the maximum value. D. n a security-first network, set the WildFire size limits to the minimum value. - ANSWER B What happens when an A/P firewall cluster synchronizes IPsec tunnel security associations (SAs)? A. Phase 2 SAs are synchronized over HA2 links. B. Phase 1 and Phase 2 SAs are synchronized over HA2 links. C. Phase 1 SAs are synchronized over HA1 links.
D. Phase 1 and Phase 2 SAs are synchronized over HA3 links. - ANSWER A A security engineer needs to mitigate packet floods that occur on a set of servers behind the internet facing interface of the firewall.Which Security Profile should be applied to a policy to prevent these packet floods? A. Vulnerability Protection profile B. DoS Protection profile C. Data Filtering profile D. URL Filtering profile - ANSWER B What are three reasons why an installed session can be identified with the "application incomplete" tag? (Choose three.) A. There was no application data after the TCP connection was established. B. The client sent a TCP segment with the PUSH flag set. C. The TCP connection was terminated without identifying any application data. D. There is not enough application data after the TCP connection was established. E. The TCP connection did not fully establish. - ANSWER ACE PICTURE Which three statements correctly describe Session 380280? (Choose three.) A. The application was initially identified as "ssl." B. The session has ended with the end-reason "unknown." C. The session cid not go through SSL decryption processing. D. The application shifted to "web-browsing." E. The session went through SSL decryption processing. - ANSWER ADE An administrator's device-group commit push is failing due to a new URL category.How should the administrator correct this issue? A. update the Firewall Apps and Threat version to match the version of Panorama B. change the new category action to "alert" and push the configuration again C. ensure that the firewall can communicate with the URL cloud D. verity that the URL seed tile has been downloaded and activated on the firewall - ANSWER A