Palo Alto Networks - PCNSE Practice Questions
Test - PCNSE Practice Questions
PCNSE Practice Questions
Why is “Browsing to IP domains” an event that appears in the Botnet report? |
Only a newly-created website could have an IP address but not a URL, and newly- created websites are statistically more likely to provide command-and-control services that connect to malware. | |
IP domains are frequently used by command-and-control servers that have been blocked from becoming part of either a DNS domain or a Windows domain. | |
Web browsing to an IP address instead of a URL may indicate an attempt to avoid proper categorization when traffic passes through a URL Filtering system. | |
Web browsing to an IP address is not possible and is an indicator of a possible attempt to tunnel other applications through TCP port 80. | |
Mark for follow up |
A network administrator needs to view the default action for a specific spyware signature. The administrator follows the tabs and menus through Objects > Security Profiles > Anti-Spyware, and selects the default Profile. What should be done next? |
Nothing more is necessary. The actions already will be displayed with their default values. | |
Click the Rules tab and then look for rules with "default" in the Action column. | |
Click the Exceptions tab and then click Show all signatures. | |
The default actions will be displayed in the Action column. | |
Mark for follow up |
Which feature of the Palo Alto Networks firewall was designed to minimize network latency on the data plane? |
Multi-Pass Packet Stream Processing Engine | |
Single-Pass Parallel Processing Architecture | |
Automated Dynamic Content Update Scheduler | |
Standard XML-formatted configuration file | |
Mark for follow up |
A company uses Active Directory and RADIUS to capture User-ID information and implement user-based policies to control web access. Many Linux and Mac computers in the environment that do not have IP-address-to-user mappings. What is the best way to collect user information for those systems? |
Install the User-ID agent on the systems to collect user information | |
Install a Terminal Services agent in the environment | |
Load the GlobalProtect client and connect to the company GlobalProtect environment | |
Use Captive Portal to capture user information | |
Mark for follow up |
Each week, a company wants to know the list of employees in the "mgt" group who are the biggest users of network bandwidth. Assume that the "mgt" group is properly configured on the company's Domain Controller, and that User-ID also is configured correctly. The firewall administrator starts to create the Custom report shown above: What must the administrator do or change to complete this Custom report? |
'Application Statistics' must be selected from the 'Database' option. | |
'Last 24 Hrs' must be selected from the 'Time Frame' option. | |
'Source User' must be selected from the 'Available Columns' option. | |
Explicitly set the 'Sort By' option. | |
Mark for follow up |
Which two authentication methods are supported in PAN-OS software when using SSH to manage a device? (Choose two.) |
PublicKeyAuthentication | |
RADIUS | |
Certificate-basedAuthentication | |
NTLM | |
Mark for follow up |
A website is presenting an RSA 2048-bit key. By default, what will the size of the key in the certificate sent by the firewall to the client be when doing SSL Decryption? |
2048 bits | |
1024 bits | |
4096 bits | |
512 bits | |
Mark for follow up |
A Palo Alto Networks firewall has been configured with multiple virtual systems and is administered by multiple personnel. Several administrators are logged into the firewall and are making configuration changes to separate virtual systems at the same time. Which option will ensure that no single administrator's changes are interrupted or undone by another administrator while still allowing all administrators to complete their changes prior to issuing a commit? |
One administrator sets a shared configuration lock and each administrator sets a commit lock. | |
Each administrator sets a shared configuration lock. | |
Each administrator sets a configuration and commit lock for the vsys to which they are making changes. | |
Each administrator sets a shared commit lock. | |
Mark for follow up |
The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? (Choose two.) |
URLFiltering | |
GlobalProtect Data File | |
PAN-OS | |
Threat Prevention | |
App-ID | |
Mark for follow up |
Which Panorama feature allows for aggregated device logs to be forwarded to an external security information and event management (SIEM) system? |
Scheduled Log Aggregation and Forwarding | |
Device Group Log Forwarding Profiles | |
Collector Log Forwarding for Collector Groups | |
Log Forwarding Profile | |
Mark for follow up |
American Textile Corporation has acquired Fab Fabric Limited. American Textile uses a SIP-based VoIP phone system, which has been working well through a Palo Alto Networks firewall. However, integrating Fab Fabric's SIP phone system into American Textile's network has not been successful. The network security administrator for the combined company determines that the firewall is the cause of the failed phone system integration. Which action will disable the Application Level Gateway (ALG) firewall feature for the Fab Fabric phones while not affecting the American Textile Corporation phone system? |
Disable ALG in the Security policy that matches the traffic to and from the Fab Fabric phones | |
Create an application override policy that assigns SIP traffic to a custom application. | |
Create an Application Override policy that assigns traffic to and from the Fab Fabric phones to a custom application | |
Disable ALG for the "sip" application in the Applications sub-menu of the Objects tab. | |
Mark for follow up |
What is the proper method to determine which active sessions on the firewall matched a security rule named "ftp-out"? |
Apply the filter "(rule eq ftp-out) and (subtype eq start)" to the traffic logs. | |
In the CLI, run the command "show session all filter application ftp". | |
Apply the filter "(application eq ftp) and (subtype eq end)" to the traffic logs. | |
In the CLI, run the command "show session all filter rule ftp-out". | |
Mark for follow up |
Which statement is true of an OSPFv3 configuration on the Palo Alto Networks firewall? |
It supports dynamic interfaces such as DHCP. | |
It uses IPv4 addresses for the area ID. | |
It is enabled per-subnet instead of per-link. | |
It requires MD5 authentication. | |
Mark for follow up |
A US-CERT notification is published regarding a newly-discovered piece of malware. The infection is spread using spear phishing e-mails that prompt users to click an HTTP hyperlink, which then downloads the malware. Palo Alto Networks has just released signatures to detect this malware as a high severity threat and the firewall is configured to dynamically update to the latest databases automatically. Which component and implementation will detect and prevent this threat? |
Zone Protection profiles applied to the external zone with Packet Based Attack Protection with action set to block high severity threats | |
Antivirus profiles applied to outbound security policy rules with action set to block high severity threats | |
Vulnerability Protection profiles applied to inbound and outbound security policies with action set to block high severity threats | |
Antivirus profiles applied to inbound security policies with action set to block high severity threats | |
Mark for follow up |
Which method can be used to verify that the firewall is transmitting packets to the correct destination? |
Compare the routing table to the FIB table to ensure there are no discrepancies. | |
Verify the contents of the ARP table for the egress interface. | |
Collect packet captures from the transmit stage on the firewall. | |
Capture packet in the receive stage on the firewall. | |
Mark for follow up |
Which CLI command would allow an administrator to assess CPU usage by process on the management plane? |
show running resource monitor | |
show system resources | |
show system statistics | |
show process list | |
Mark for follow up |
Which action will display the NAT policies that are being enforced by the firewall? |
View the NAT policies currently displayed by the management plane in the GUI. | |
Navigate to the Policies tab in the GUI, select NAT from the configuration tree and check the box marked "Highlight Unused Rules". | |
From the command line, check the status of the NAT pool on the data plane using the command "nat-rule-ippool". | |
From the command line, check the NAT policies loaded on the data plane using the command "show running nat-policy". | |
Mark for follow up |
In which scenario would an active/active High Availability (HA) deployment be recommended instead of an active/passive HA pair? |
There is a potential for asymmetric routing to occur. | |
There is a need to double the net throughput capacity of the HA pair. | |
There is a need to load balance the traffic on the network. | |
There is a need for the firewalls to load balance the traffic on the network. | |
Mark for follow up |
Where can the oversubscription rate be adjusted on platforms that support NAT oversubscription? |
IIn the CLI, by using the command set session offload | |
In the GUI, under Device -> Setup -> Session -> Session Settings | |
In the GUI, by selecting the individual rule name and making the adjustment under the Translated Address tab | |
In CLI configuration mode, by issuing the command set deviceconfig setting nat reserve-ip with the appropriate argument | |
Mark for follow up |
Which x509 attribute is required for "Forward Trust Certificate" to be enabled? |
OCSP Location | |
SubjectAlternateName | |
CertificateAuthority | |
CRL Distribution Point | |
Mark for follow up |
Where in the firewall GUI can an administrator see how many sessions of web-browsing traffic have occurred in the last day? |
ACC->Application | |
Objects->Applications->web-browsing | |
Monitor->Session Browser | |
Monitor->App Scope->Summary | |
Mark for follow up |
Which public key infrastructure component is required to implement SSL Forward Proxy? |
CertificateAuthoritycertificate | |
Machine certificate | |
Certificate signing request | |
Online Certificate Status Protocol | |
Mark for follow up |
Which three inspections can be performed with a next-generation firewall but NOT with a legacy firewall? (Choose three.) |
Identifying unauthorized applications that attempt to connect over non-standard ports | |
Recognizing when SSH sessions are using SSH v1 instead of SSH v2 | |
Removing from the session table any TCP session without traffic for 3600 seconds | |
Allowing a packet through from an external DNS server only if an internal host recently queried that DNS server | |
Validating that UDP port 53 packets are not being used to tunnel data for another protocol | |
Mark for follow up |
Which component must be configured before a User Activity report can be generated? |
SSLDecryption | |
GlobalProtect | |
Log Forwarding | |
User Identification | |
Mark for follow up |
What can be used to push network and device configurations from Panorama to firewalls running PAN-OS software? |
Service Profiles | |
Templates | |
Device groups | |
Management groups | |
Mark for follow up |
Which technique can be performed by a next-generation firewall, but NOT by a legacy firewall? |
Inspecting HTTP data streams to detect instances of the POST method | |
Detecting a spoofed IP address | |
Detecting a mismatched overlapping TCP segment | |
Allowing some ICMP echo-reply packets by matching them to ICMP echo-request packets | |
Mark for follow up |
Given the following routing table: Which nexthop(s) would be added to the forwarding information base (FIB) for the 192.168.93.0/30 network? |
10.66.24.88, 10.66.24.93 | |
0.0.0.0 | |
10.66.24.93 | |
10.66.24.88 | |
Mark for follow up |
Which feature will control how the firewall handles web servers with expired certificates when decrypting SSL? |
Default Trusted Certification Authorities | |
Certificate Profile | |
Data Filtering Profile | |
Decryption Profile | |
Mark for follow up |
Which three engines are built into the Single-Pass Parallel Processing Architecture? (Choose three.) |
Application Identification (App-ID) | |
User Identification (User-ID) | |
Threat Identification (Threat-ID) | |
Content Identification (Content-ID) | |
Group Identification (Group-ID) | |
Mark for follow up |
A Palo Alto Networks firewall is configured with a NAT policy rule that performs the following source translation: Which filters need to be configured to match traffic originating from 192.168.1.10 in the "Trust-L3" zone to 2.2.2.2 in the "Untrust-L3" zone in the Transmit stage? |
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 1.1.1.1 destination 2.2.2.2 | |
Filter 1 source 1.1.1.1 destination 192.168.1.10 Filter 2 source 192.168.1.10 destination 1.1.1.1 | |
Filter 1 source 1.1.1.1 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 1.1.1.1 | |
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 192.168.1.10 | |
Mark for follow up |
Which two techniques become available only after upgrading from a legacy firewall to a Palo Alto Networks next-generation firewall? (Choose two.) |
Dynamically opening small holes in the firewall to permit FTP data transfers, instead of being required to open all high port numbers | |
Distinguishing between SSH v1 and SSH v2 in a traffic stream | |
Limiting applications to using only their standard port numbers | |
Differentiating between traffic for the base Facebook application and traffic using Facebook Chat | |
Mark for follow up |
Which function resides on the management plane? |
Content inspection performed in software | |
System logging | |
Application ID | |
Server response inspection | |
Mark for follow up |
Given the following Security Policy and information about traffic traversing the firewall: Source Address: 192.168.64.10 Source Zone: Trust-L3 - Destination Address: 199.167.55.50 Destination Zone: Untrust-L3 Destination port: 85 - Application: web-browsing. Which rule will match the specified traffic? |
Rule number 6 | |
Rule number 3 | |
Rule number 2 | |
Rule number 4 | |
Mark for follow up |
The network is experiencing routing problems and the firewall administrator needs to determine the root cause. Which CLI command should the administrator use to verify routing behavior while watching the current flow of routed logs? |
less follow yes mp-log routed.log | |
show routing fib virtual-router vr1 | |
less mp-log routed.log | |
show routing summary virtual-router vr1 | |
Mark for follow up |
You are the network security engineer for a large corporation. On the same night you finished a successful migration, you receive an after-hours call from the Network Operations Center (NOC). After the latest firewall migration, traffic coming from the internal network (inside zone) is not reaching its destination on several rules present in the Security Policy that have the DMZ zone as target and are allowing the traffic. The NOC sends you an email message received on your phone with the information shown above. Given that there is no current internet access, which steps should the NOC engineer take to fix the problem? |
Change the destination zone to Inside zone and commit the change. | |
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.26.0/24 nexthop ip-address 10.15.25.1 | |
Change the destination zone to DMZ zone and commit the change | |
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.22.0/24 nexthop ip-address 172.15.22.65 | |
Mark for follow up |
Which GlobalProtect deployment strategy could be leveraged to expand a company's global VPN footprint without incurring hosting fees for physical equipment? |
LSVPN (Large Scale VPN) | |
MDM (Mobile Device Manager) | |
GlobalProtect Satellite | |
VM-Series for AWS (Amazon Web Services) | |
Mark for follow up |
Which two statements regarding next-generation and legacy firewalls are true? (Choose two) |
Both legacy firewalls and next-generation firewalls can reassemble packets in a given HTTP stream that arrive in an incorrect order. | |
A next-generation firewall detects when traffic shifts from “normal” web browsing to a specific web application, not a more specific protocol. | |
A next-generation firewall can decrypt an attached encrypted .ZIP file sent through SMTP; a legacy firewall cannot. | |
Both legacy firewalls and next-generation firewalls can be configured to allow internal users to read, but not post at, an internet discussion board. | |
Mark for follow up |
A company has a Palo Alto Networks firewall configured with the following three zones: Internet DMZ Inside. All users are located on the Inside zone and are using public DNS servers for name resolution. The company hosts a publicly accessible web application on a server in the DMZ zone. Which NAT rule configuration will allow users on the Inside zone to access the web application using its public IP address? |
Explicit No-NAT Policy Rule | |
Three zone U-turn NAT | |
Two zone U-turn NAT | |
Bi-directional NAT | |
Mark for follow up |
A company is deploying a pair of PA-5060 firewalls in an environment requiring support for asymmetric routing. Which High Availability (HA) mode best supports this design requirement? |
Active-Passive mode with "tcp-reject-non-syn" set to "no" | |
HA-LiteActive-Passivemode | |
Active-Passive mode | |
Active-Active mode | |
Mark for follow up |
Which action will allow a firewall administrator to determine which NAT rules have NOT been matched since the last reboot? |
From the CLI, issue the command test nat-policy-match against each configured rule. | |
In the GUI, select the Highlight Unused Rules option under Policies -> NAT. | |
From the CLI, issue the command show session all filter nat-rule command. | |
From the CLI, issue the command show running nat-policy command. | |
Mark for follow up |
A user is reporting that they cannot download a PDF file from the internet. Which option will show whether the downloaded file has been blocked by a Security Profile? |
Filter the System log for "Download Failed" messages. | |
Filter the Traffic logs for all traffic from the user that resulted in a deny action. | |
Filter the Data Filtering logs for the user's traffic and the name of the PDF file. | |
Filter the Session Browser for all sessions from the user with the application "adobe". | |
Mark for follow up |
Given the Application Override policy shown above, what will be the effect of this policy? |
Traffic matching the Application Override policy will be assigned to the application "web-browsing". | |
Traffic to the WebTrends server from the DMZ zone will be subject to content and threat detection. | |
Traffic destined to TCP port 8888 will be assigned to the application "web-browsing" and discarded by the firewall. | |
Traffic matching the policy will be assigned to the "web-browsing" application, bypassing content and threat detection. | |
Mark for follow up |
A company has decided to install a Palo Alto Networks firewall using VWire interfaces. Because of pre-existing network configurations, the traffic on the upstream and downstream devices can have 802.1Q tags with the following values: 5 10 11 12 13 14 15 25 30 - How should the network administrator configure the Tag Allowed field of the VWire to allow only traffic with 802.1Q tag values of 11, 12, and 14? |
0 | |
[10-15] | |
{11-14} | |
11,12,14 | |
Mark for follow up |
A Security policy accepts new FTP traffic sessions between 8:00 a.m. and 5:00 p.m. What happens to an already-accepted and running FTP session at 5:01 p.m.? |
The session is terminated, and the initiator must establish a new session. | |
The session continues to run, because already-accepted sessions are not re- evaluated. | |
The session is re-evaluated to determine whether it is allowed under a different policy rule. | |
The session is re-evaluated if the default configuration setting “Rematch all sessions on config policy change” is enabled. | |
Mark for follow up |
Which two functions can be performed with a next-generation firewall but NOT with a legacy firewall? (Choose two.) |
Checking for suspicious, but technically compliant, protocol behavior | |
Inspecting traffic at the application layer | |
Temporarily allowing an external web server to send inbound packets after an outbound request for a web page | |
Creating virtual connections out of UDP traffic | |
Mark for follow up |
Which interface type provides support for point-to-point protocol over Ethernet (PPPoE)? |
Layer3 | |
PPP | |
Virtual wire | |
Layer2 | |
Mark for follow up |
Which statement is true if a Security policy contains two rules that would both match a proposed new session? |
The rule with the most restrictive action will be applied. | |
Both rules will be applied. | |
The first rule that matches while evaluating the rules from top to bottom is the one that will be applied. | |
Deny rules are evaluated first, and then Accept rules. | |
Mark for follow up |
Which source address translation type will allow multiple devices to share a single translated source address while using a single NAT Policy rule? |
Bidirectional | |
Static IP | |
Dynamic IP and Port | |
Dynamic IP | |
Mark for follow up |
You are analyzing a specific device group from Panorama and notice there are a very large number of "insufficient-data" log entries. What is known for certain about the "insufficient-data" in this display? Consider the following data: |
The number of bytes sent in packets where the application could not be identified | |
The number of bytes sent in sessions that were never fully opened with a SYN, SYN- ACK, ACK sequence | |
The number of bytes in the extra packets sent in a DoS attack | |
The number of bytes sent by hosts attempting to transmit malware | |
Mark for follow up |
A workstation at a company was infected with malware on September 18, 2014. Palo Alto Networks released an antivirus signature for that malware on September 17, 2014. The company's firewall is licensed with Threat Prevention and URL Filtering. The Threat log in the Monitor tab of the firewall shows no indications of traffic related to the infection. However, the Traffic log shows traffic between the workstation and the command-and-control server. Given the company's Dynamic Updates configuration: What is the cause of traffic not matching a malware signature? |
The update schedule is set to "download only" and not to "download and install". | |
The infection occurred during the hourly update window when the malware was identified. | |
A WildFire subscription is needed to detect malware. | |
The most recent updates were incremental and not full updates. | |
Mark for follow up |
A Management Profile to allow SSH access has been created and applied to interface ethernet1/1. A security rule with the action "deny" is applied to packets from "any" source zone to "any" destination zone. What will happen when someone attempts to initiate an SSH connection to ethernet1/1? |
SSH access to the interface will be allowed because intra-zone traffic is allowed by default. | |
SSH access to the interface will be allowed because the Management Profile is applied before the Security policy. | |
SSH access to the interface will be denied because intra-zone traffic is denied. | |
SSH access to the interface will be allowed because inter-zone traffic is allowed. | |
Mark for follow up |
Which URL Filtering Security Profile action logs the URL Filtering category to the URL Filtering log? |
Allow | |
Default | |
Log | |
Alert | |
Mark for follow up |
A Security Operations Center (SOC) has been provided a list of 10,000 malicious URLs. They were asked not to share this list outside of the organization. The Chief Information Security Officer has requested that all user access to these URLs be filtered and blocked immediately to prevent potential breaches. However, the inline Palo Alto Networks firewall is NOT licensed for URL Filtering. What is an efficient method for blocking access to these URLs? |
Import the URLs to a Dynamic Block List and reference the Dynamic Block List in a Security policy rule set to deny. | |
Submit a Bulk Change Request via the Palo Alto Networks Support Portal containing the list of the URLs, request that the URLs be categorized as “Malware,” and set the action to "block" for the Malware category in a URL Filtering profile. | |
Use a script to automatically import each URL domain as an FQDN address object. | |
Import the URLs to a Custom URL Category and reference the URL Category in a Security policy rule set to deny. | |
Mark for follow up |
A Palo Alto Networks firewall is being targeted by a DoS attack from the Internet that is creating a flood of bogus TCP connections to internal servers behind the firewall. This traffic is allowed by security policies, and other than creating half-open TCP connections, it is indistinguishable from legitimate inbound traffic. Which Zone Protection Profile with SYN Flood Protection action, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic? |
SYN Cookies applied on the internal zone | |
Random Early Drop applied on the internet-facing zone | |
SYN Cookies applied on the internet-facing zone | |
Random Early Drop applied on the internal zone | |
Mark for follow up |
A US-CERT notification is published regarding a newly discovered piece of malware. The infection is spread using spear phishing emails that prompt users to click an HTTP hyperlink, which then downloads the malware. Palo Alto Networks has just released signatures to detect this malware as a high severity threat and the firewall is configured to dynamically update to the latest databases automatically. Which component and implementation will detect and prevent this threat? |
Antivirus Profiles applied to inbound Security policies with action set to block high-severity threats | |
Zone Protection Profiles applied to the external zone with Packet Based Attack Protection with action set to block high-severity threats | |
Vulnerability Protection Profiles applied to inbound and outbound Security policies with action set to block high-severity threats | |
Antivirus Profiles applied to outbound Security policy rules with action set to block high-severity threats | |
Mark for follow up |
A company wants to run their pair of PA-200 firewalls in a High Availability active/passive mode and will be using HA-Lite. Which capability can be used in this situation? |
Session Sync | |
Configuration Sync | |
Link Aggregation | |
Jumbo Frames | |
Mark for follow up |
When would there be a benefit from the creation of a custom application signature? |
When the application can be used to send and receive malware | |
When a company wants to know who is watching World Cup soccer matches during work hours | |
When the risk level of a Palo Alto Networks-provided application signature needs to be changed | |
When the ability of an application to port hop needs to be eliminated | |
Mark for follow up |
What statement is true about the Highlight Unused Rules option for a Security Policy? |
A management plane restart will clear the counters for used/unused rules. | |
A dataplane restart will clear the counters for used/unused rules. | |
The counters for used/unused rules can be cleared using the "reset counter global name rule-use" CLI command. | |
The counters for used/unused rules can be cleared using the reset counter global name rule-use CLI command. | |
Mark for follow up |
A security engineer has been asked by management to optimize how Palo Alto Networks firewall syslog messages are forwarded to a syslog receiver. There are currently 20 PA-5060 firewalls, each of which is configured to forward syslogs individually. The security engineer wants to leverage their two M-100 appliances to send syslog messages from a single source and already has deployed one in Panorama mode and the other as a Log Collector. What is the remaining step in this solution? |
Configure a Syslog Proxy Profile | |
EnableSyslogAggregation | |
Configure a Panorama Log Forwarding Profile | |
Configure Collector Log Forwarding | |
Mark for follow up |
Which Interface Type can be used to manage a firewall via SSH or HTTPS? |
Virtual Wire | |
Tap | |
HA | |
Layer3 | |
Layer2 | |
Mark for follow up |
Validating that UDP port 53 packets are not being used to tunnel data for another protocol | |
Question 24 of 60.
Which component must be configured before a User Activity report can be generated? |
SSLDecryption | |||
GlobalProtect | |||
Log Forwarding | |||
User Identification | |||
Question 25 of 60.
What can be used to push network and device configurations from Panorama to firewalls running PAN-OS software? |
Service Profiles | |||
Templates | |||
Device groups | |||
Management groups | |||
Question 26 of 60.
Which technique can be performed by a next-generation firewall, but NOT by a legacy firewall? |
Inspecting HTTP data streams to detect instances of the POST method | |||
Detecting a spoofed IP address | |||
Detecting a mismatched overlapping TCP segment | |||
Allowing some ICMP echo-reply packets by matching them to ICMP echo-request packets | |||
Question 27 of 60.
Given the following routing table: Which nexthop(s) would be added to the forwarding information base (FIB) for the 192.168.93.0/30 network? |
10.66.24.88, 10.66.24.93 | |||
0.0.0.0 | |||
10.66.24.93 | |||
10.66.24.88 | |||
Question 28 of 60.
Which feature will control how the firewall handles web servers with expired certificates when decrypting SSL? |
Default Trusted Certification Authorities | |||
Certificate Profile | |||
Data Filtering Profile | |||
Decryption Profile | |||
Question 29 of 60.
Which three engines are built into the Single-Pass Parallel Processing Architecture? (Choose three.) |
Application Identification (App-ID) | |
User Identification (User-ID) | |
Threat Identification (Threat-ID) | |
Content Identification (Content-ID) | |
Group Identification (Group-ID) | |
Question 30 of 60.
A Palo Alto Networks firewall is configured with a NAT policy rule that performs the following source translation: Which filters need to be configured to match traffic originating from 192.168.1.10 in the "Trust-L3" zone to 2.2.2.2 in the "Untrust-L3" zone in the Transmit stage? |
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 1.1.1.1 destination 2.2.2.2 | |||
Filter 1 source 1.1.1.1 destination 192.168.1.10 Filter 2 source 192.168.1.10 destination 1.1.1.1 | |||
Filter 1 source 1.1.1.1 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 1.1.1.1 | |||
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 192.168.1.10 | |||
Question 31 of 60.
Which two techniques become available only after upgrading from a legacy firewall to a Palo Alto Networks next-generation firewall? (Choose two.) |
Dynamically opening small holes in the firewall to permit FTP data transfers, instead of being required to open all high port numbers | |
Distinguishing between SSH v1 and SSH v2 in a traffic stream | |
Limiting applications to using only their standard port numbers | |
Differentiating between traffic for the base Facebook application and traffic using Facebook Chat | |
Question 32 of 60.
Which function resides on the management plane? |
Content inspection performed in software | |||
System logging | |||
Application ID | |||
Server response inspection | |||
Question 33 of 60.
Given the following Security Policy and information about traffic traversing the firewall: Source Address: 192.168.64.10 Source Zone: Trust-L3 - Destination Address: 199.167.55.50 Destination Zone: Untrust-L3 Destination port: 85 - Application: web-browsing. Which rule will match the specified traffic? |
Rule number 6 | |||
Rule number 3 | |||
Rule number 2 | |||
Rule number 4 | |||
Question 34 of 60.
The network is experiencing routing problems and the firewall administrator needs to determine the root cause. Which CLI command should the administrator use to verify routing behavior while watching the current flow of routed logs? |
less follow yes mp-log routed.log | |||
show routing fib virtual-router vr1 | |||
less mp-log routed.log | |||
show routing summary virtual-router vr1 | |||
Question 35 of 60.
You are the network security engineer for a large corporation. On the same night you finished a successful migration, you receive an after-hours call from the Network Operations Center (NOC). After the latest firewall migration, traffic coming from the internal network (inside zone) is not reaching its destination on several rules present in the Security Policy that have the DMZ zone as target and are allowing the traffic. The NOC sends you an email message received on your phone with the information shown above. Given that there is no current internet access, which steps should the NOC engineer take to fix the problem? |
Change the destination zone to Inside zone and commit the change. | |||
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.26.0/24 nexthop ip-address 10.15.25.1 | |||
Change the destination zone to DMZ zone and commit the change | |||
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.22.0/24 nexthop ip-address 172.15.22.65 | |||
Question 36 of 60.
Which GlobalProtect deployment strategy could be leveraged to expand a company's global VPN footprint without incurring hosting fees for physical equipment? |
LSVPN (Large Scale VPN) | |||
MDM (Mobile Device Manager) | |||
GlobalProtect Satellite | |||
VM-Series for AWS (Amazon Web Services) | |||
Question 37 of 60.
Which two statements regarding next-generation and legacy firewalls are true? (Choose two) |
Both legacy firewalls and next-generation firewalls can reassemble packets in a given HTTP stream that arrive in an incorrect order. | |
A next-generation firewall detects when traffic shifts from “normal” web browsing to a specific web application, not a more specific protocol. | |
A next-generation firewall can decrypt an attached encrypted .ZIP file sent through SMTP; a legacy firewall cannot. | |
Both legacy firewalls and next-generation firewalls can be configured to allow internal users to read, but not post at, an internet discussion board. | |
Question 38 of 60.
A company has a Palo Alto Networks firewall configured with the following three zones: Internet DMZ Inside. All users are located on the Inside zone and are using public DNS servers for name resolution. The company hosts a publicly accessible web application on a server in the DMZ zone. Which NAT rule configuration will allow users on the Inside zone to access the web application using its public IP address? |
Explicit No-NAT Policy Rule | |||
Three zone U-turn NAT | |||
Two zone U-turn NAT | |||
Bi-directional NAT | |||
Question 39 of 60.
A company is deploying a pair of PA-5060 firewalls in an environment requiring support for asymmetric routing. Which High Availability (HA) mode best supports this design requirement? |
Active-Passive mode with "tcp-reject-non-syn" set to "no" | |||
HA-LiteActive-Passivemode | |||
Active-Passive mode | |||
Active-Active mode | |||
Question 40 of 60.
Which action will allow a firewall administrator to determine which NAT rules have NOT been matched since the last reboot? |
From the CLI, issue the command test nat-policy-match against each configured rule. | |||
In the GUI, select the Highlight Unused Rules option under Policies -> NAT. | |||
From the CLI, issue the command show session all filter nat-rule command. | |||
From the CLI, issue the command show running nat-policy command. | |||
Question 41 of 60.
A user is reporting that they cannot download a PDF file from the internet. Which option will show whether the downloaded file has been blocked by a Security Profile? |
Filter the System log for "Download Failed" messages. | |||
Filter the Traffic logs for all traffic from the user that resulted in a deny action. | |||
Filter the Data Filtering logs for the user's traffic and the name of the PDF file. | |||
Filter the Session Browser for all sessions from the user with the application "adobe". | |||
Question 42 of 60.
Given the Application Override policy shown above, what will be the effect of this policy? |
Traffic matching the Application Override policy will be assigned to the application "web-browsing". | |||
Traffic to the WebTrends server from the DMZ zone will be subject to content and threat detection. | |||
Traffic destined to TCP port 8888 will be assigned to the application "web-browsing" and discarded by the firewall. | |||
Traffic matching the policy will be assigned to the "web-browsing" application, bypassing content and threat detection. | |||
Question 43 of 60.
A company has decided to install a Palo Alto Networks firewall using VWire interfaces. Because of pre-existing network configurations, the traffic on the upstream and downstream devices can have 802.1Q tags with the following values: 5 10 11 12 13 14 15 25 30 - How should the network administrator configure the Tag Allowed field of the VWire to allow only traffic with 802.1Q tag values of 11, 12, and 14? |
0 | |||
[10-15] | |||
{11-14} | |||
11,12,14 | |||
Question 44 of 60.
A Security policy accepts new FTP traffic sessions between 8:00 a.m. and 5:00 p.m. What happens to an already-accepted and running FTP session at 5:01 p.m.? |
The session is terminated, and the initiator must establish a new session. | |||
The session continues to run, because already-accepted sessions are not re- evaluated. | |||
The session is re-evaluated to determine whether it is allowed under a different policy rule. | |||
The session is re-evaluated if the default configuration setting “Rematch all sessions on config policy change” is enabled. | |||
Question 45 of 60.
Which two functions can be performed with a next-generation firewall but NOT with a legacy firewall? (Choose two.) |
Checking for suspicious, but technically compliant, protocol behavior | |
Inspecting traffic at the application layer | |
Temporarily allowing an external web server to send inbound packets after an outbound request for a web page | |
Creating virtual connections out of UDP traffic | |
Question 46 of 60.
Which interface type provides support for point-to-point protocol over Ethernet (PPPoE)? |
Layer3 | |||
PPP | |||
Virtual wire | |||
Layer2 | |||
Question 47 of 60.
Which statement is true if a Security policy contains two rules that would both match a proposed new session? |
The rule with the most restrictive action will be applied. | |||
Both rules will be applied. | |||
The first rule that matches while evaluating the rules from top to bottom is the one that will be applied. | |||
Deny rules are evaluated first, and then Accept rules. | |||
Question 48 of 60.
Which source address translation type will allow multiple devices to share a single translated source address while using a single NAT Policy rule? |
Bidirectional | |||
Static IP | |||
Dynamic IP and Port | |||
Dynamic IP | |||
Question 49 of 60.
You are analyzing a specific device group from Panorama and notice there are a very large number of "insufficient-data" log entries. What is known for certain about the "insufficient-data" in this display? Consider the following data: |
The number of bytes sent in packets where the application could not be identified | |||
The number of bytes sent in sessions that were never fully opened with a SYN, SYN- ACK, ACK sequence | |||
The number of bytes in the extra packets sent in a DoS attack | |||
The number of bytes sent by hosts attempting to transmit malware | |||
Question 50 of 60.
A workstation at a company was infected with malware on September 18, 2014. Palo Alto Networks released an antivirus signature for that malware on September 17, 2014. The company's firewall is licensed with Threat Prevention and URL Filtering. The Threat log in the Monitor tab of the firewall shows no indications of traffic related to the infection. However, the Traffic log shows traffic between the workstation and the command-and-control server. Given the company's Dynamic Updates configuration: What is the cause of traffic not matching a malware signature? |
The update schedule is set to "download only" and not to "download and install". | |||
The infection occurred during the hourly update window when the malware was identified. | |||
A WildFire subscription is needed to detect malware. | |||
The most recent updates were incremental and not full updates. | |||
Question 51 of 60.
A Management Profile to allow SSH access has been created and applied to interface ethernet1/1. A security rule with the action "deny" is applied to packets from "any" source zone to "any" destination zone. What will happen when someone attempts to initiate an SSH connection to ethernet1/1? |
SSH access to the interface will be allowed because intra-zone traffic is allowed by default. | |||
SSH access to the interface will be allowed because the Management Profile is applied before the Security policy. | |||
SSH access to the interface will be denied because intra-zone traffic is denied. | |||
SSH access to the interface will be allowed because inter-zone traffic is allowed. | |||
Question 52 of 60.
Which URL Filtering Security Profile action logs the URL Filtering category to the URL Filtering log? |
Allow | |||
Default | |||
Log | |||
Alert | |||
Question 53 of 60.
A Security Operations Center (SOC) has been provided a list of 10,000 malicious URLs. They were asked not to share this list outside of the organization. The Chief Information Security Officer has requested that all user access to these URLs be filtered and blocked immediately to prevent potential breaches. However, the inline Palo Alto Networks firewall is NOT licensed for URL Filtering. What is an efficient method for blocking access to these URLs? |
Import the URLs to a Dynamic Block List and reference the Dynamic Block List in a Security policy rule set to deny. | |||
Submit a Bulk Change Request via the Palo Alto Networks Support Portal containing the list of the URLs, request that the URLs be categorized as “Malware,” and set the action to "block" for the Malware category in a URL Filtering profile. | |||
Use a script to automatically import each URL domain as an FQDN address object. | |||
Import the URLs to a Custom URL Category and reference the URL Category in a Security policy rule set to deny. | |||
Question 54 of 60.
A Palo Alto Networks firewall is being targeted by a DoS attack from the Internet that is creating a flood of bogus TCP connections to internal servers behind the firewall. This traffic is allowed by security policies, and other than creating half-open TCP connections, it is indistinguishable from legitimate inbound traffic. Which Zone Protection Profile with SYN Flood Protection action, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic? |
SYN Cookies applied on the internal zone | |||
Random Early Drop applied on the internet-facing zone | |||
SYN Cookies applied on the internet-facing zone | |||
Random Early Drop applied on the internal zone | |||
Question 55 of 60.
A US-CERT notification is published regarding a newly discovered piece of malware. The infection is spread using spear phishing emails that prompt users to click an HTTP hyperlink, which then downloads the malware. Palo Alto Networks has just released signatures to detect this malware as a high severity threat and the firewall is configured to dynamically update to the latest databases automatically. Which component and implementation will detect and prevent this threat? |
Antivirus Profiles applied to inbound Security policies with action set to block high-severity threats | |||
Zone Protection Profiles applied to the external zone with Packet Based Attack Protection with action set to block high-severity threats | |||
Vulnerability Protection Profiles applied to inbound and outbound Security policies with action set to block high-severity threats | |||
Antivirus Profiles applied to outbound Security policy rules with action set to block high-severity threats | |||
Question 56 of 60.
A company wants to run their pair of PA-200 firewalls in a High Availability active/passive mode and will be using HA-Lite. Which capability can be used in this situation? |
Session Sync | |||
Configuration Sync | |||
Link Aggregation | |||
Jumbo Frames | |||
Question 57 of 60.
When would there be a benefit from the creation of a custom application signature? |
When the application can be used to send and receive malware | |||
When a company wants to know who is watching World Cup soccer matches during work hours | |||
When the risk level of a Palo Alto Networks-provided application signature needs to be changed | |||
When the ability of an application to port hop needs to be eliminated | |||
Question 58 of 60.
What statement is true about the Highlight Unused Rules option for a Security Policy? |
A management plane restart will clear the counters for used/unused rules. | |||
A dataplane restart will clear the counters for used/unused rules. | |||
The counters for used/unused rules can be cleared using the "reset counter global name rule-use" CLI command. | |||
The counters for used/unused rules can be cleared using the reset counter global name rule-use CLI command. | |||
Question 59 of 60.
A security engineer has been asked by management to optimize how Palo Alto Networks firewall syslog messages are forwarded to a syslog receiver. There are currently 20 PA-5060 firewalls, each of which is configured to forward syslogs individually. The security engineer wants to leverage their two M-100 appliances to send syslog messages from a single source and already has deployed one in Panorama mode and the other as a Log Collector. What is the remaining step in this solution? |
Configure a Syslog Proxy Profile | |||
EnableSyslogAggregation | |||
Configure a Panorama Log Forwarding Profile | |||
Configure Collector Log Forwarding | |||
Question 60 of 60.
Which Interface Type can be used to manage a firewall via SSH or HTTPS? |
Virtual Wire | |||
Tap | |||
HA | |||
Layer3 | |||
Layer2 | |||
Save / Return Later |
Next Generation firewalls are used to protect the system from being harmed. These firewalls filter the traffic configured on the system and checks for the faults by monitoring the data and do deep inspection by spotting malware.
ReplyDeleteGreat Post!!! thanks for sharing with us.
ReplyDeleteWhy Java is Called Platform Independent
How is Java Platform Independent
This comment has been removed by the author.
ReplyDelete