Q: 5
What is a result of enabling split tunneling in the GlobalProtect portal configuration with the “Both
Network Traffic and DNS” option?
Options
Discussion
Its B here. With split tunneling set this way, I'm thinking users can hit internal and external resources based on location but using the same FQDN. Not 100% sure, open to other views.
D imo, because when you use "Both Network Traffic and DNS" in GlobalProtect split tunneling, it lets the admin set exactly which domains resolve via VPN-assigned DNS and which through local DNS. It's not about location-based access or letting users pick FQDNs based on where they are (that's more B, but that's a trap here). Pretty sure D is how Palo Alto describes it in docs. Correct me if I'm off.
Its D, split tunneling with both options lets the VPN dictate which DNS queries go to VPN DNS vs local DNS.
Official docs and practice tests back D for split tunneling with DNS, domains route to the right DNS server. D
B tbh. Seems like users could switch between internal and external resources with the same name based on connection, fits my understanding of split tunneling here.
A is wrong, D. Seen similar wording in official guide and practice test, DNS split tunneling lets you control which domains use VPN DNS vs local. Straight to the point.
Probably D, that matches what I've seen in practice. Nice straightforward question for this topic.
Be respectful. No spam.