Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Correct Answer:
C
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-ip-addresses-to-users/map-ip-addres
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )
Correct Answer:
ABD
Selecting the option to revert firewall changes will replace what settings?
Correct Answer:
A
An administrator would like to silently drop traffic from the internet to a ftp server. Which Security policy action should the administrator select?
Correct Answer:
D
Place the steps in the correct packet-processing order of operations.
Solution:
Text, application, table Description automatically generated with medium confidence
Does this meet the goal?
Correct Answer:
A