210 Final Exam Flashcards
A “continue” action can be configured on the following security profiles in the Next Generation firewall:
Select one:
a. URL Filtering, File Blocking, and Data Filtering
b. URL Filtering
c. URL Filtering and Antivirus
d. URL Filtering and File Blocking
d. URL Filtering and File Blocking
A critical consideration when defining Network Segmentation is ____________.
Select one:
a. third party management
b. eliminating security zones
c. understanding your business and organizational drivers
d. password management
understanding your business and organizational drivers
A strength of the Palo Alto Networks firewall is:
Select one:
a. hardware consolidation - data and control plane processing is improved and performed in successive linear fasion
b. its single-pass parallel processing (SP3) engine and software performs operations once per packet
c. increased buffering capability.
a. its single-pass parallel processing (SP3) engine and software performs operations once per packet
A Zone Protection Profile is applied to which item?
Select one:
a. Ingress Ports
b. Egress Ports
c. Security Policy Rules
d. Address Groups
Ingress Ports
Assume you have a WildFire subscription. Which file state or condition might result in a file not being analyzed by WildFire?
Select one:
a. file size limit exceeded
b. file located in a JAR or RAR archive
c. file already has WildFire hash
d. executable file signed by trusted signer
file located in a JAR or RAR archive
For guidance on continuing to deploy the security platform features to address your network security needs, review the PAN-OS Administrator’s Guide section titled ______________________________________________.
Select one:
a. Best Practices for Completing the Firewall Deployment
b. Set Up a Basic Security Policy
c. Best Practices for Securing Administrative Access
d. Register the Firewall
Best Practices for Completing the Firewall Deployment
From the reading “Four Ps of 5G Network Security”: Which of the following is NOT one of the ‘Four Ps’?
Select one:
a. Perimeter
b. Permissions
c. Protection
d. Packets
Protection
From the reading “Securing OT to enable Manufacturing Digital Transformation”: The risk of operations managing security at the local level is the potential of having _______________ approaches to security.
Select one:
a. IT administered
b. third party management
c. centralized
d. multiple,disjointed
multiple,disjointed
Global user authentication is not supported by which authentication service?
Select one:
a. LDAP
b. TACACS +
c. RADIUS
d. SAML
LDAP
How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application?
Select one:
a. incomplete
b. insufficient-data
c. not-applicable
d. unknown-tcp
insufficient-data
In a Next Generation firewall, how many packet does it take to identify the application in a TCP exchange?
Select one:
a. Two
b. One
c. Four or five
d. Three
Four or five
In the latest Next Generation firewall version, what is the shortest time that can be configured on the firewall to check for Wildfire updates?
Select one:
a. 30 Minutes
b. 5 Minutes
c. 1 Hour
d. 15 Minutes
5 Minutes
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display?
Select one:
a. Universal
b. Global
c. Local
d. Group
Global
In the web interface, what is signified when a text box is highlighted in red?
Select one:
a. The value in the text box is an error
b. The value in the text box is required
c. The value in the text box is optional
d. The value in the text box is controlled by Panorama
The value in the text box is required
NGFW QoS policies can be configured to apply:
Select one:
a. either preferential treatment or bandwidth-limiting traffic rules
b. data encryption
c. forwarding for anti-virus screening
d. third party authentication
either preferential treatment or bandwidth-limiting traffic rules
On a Palo Alto Networks firewall, which technique is used to manage traffic through NAT policies based on destination port numbers?
Select one:
a. Port Forwarding
b. Translated Address
c. Address Translation
d. Static/Dynamic Translation
a. Port Forwarding
On the Palo Alto Networks Next Generation Firewall, which is the default port for transporting Syslog traffic?
Select one:
a. 514
b. 443
c. 8080
d. 6514
514
Select the answer that best completes this sentence. Source NAT commonly is used for _________ users to access the ________ internet.
Select one:
a. private, private
b. private, public
c. public, private
d. public, public
private, public
Select the answer that completes this sentence. DIPP source NAT will support a maximum of about ______________ concurrent sessions on each IP address configured within the NAT pool.
Select one:
a. 16,300
b. 8100
c. 64,000
d. 250
64,000
Select True or False. A Layer 3 interface can be configured as dual stack with both IPv4 and IPv6 addresses.
Select one:
a. False
b. True
True
Select True or False. All of the interfaces on a Next Generation firewall must be the same interface type.
Select one:
a. False
b. True
True
Select True or False. By default, the firewall uses the management (MGT) interface to access external services, such as DNS servers, external authentication servers, Palo Alto Networks services such as software, URL updates, licenses and AutoFocus.
Select one:
a. False
b. True
True
Select True or False. Destination NAT often is used to provide hosts on the public (external) network access to private (internal) servers.
Select one:
a. True
b. False
True
Select True or False. In a Next Generation firewall, every interface in use must be assigned to a zone in order to process traffic.
Select one:
a. False
b. True
True
Select True or False. In addition to routing to other network devices, virtual routers on the Next Generation firewall can route to other virtual routers.
Select one:
a. True
b. False
True
Select True or False. Logging on intrazone-default and interzone-default Security policy rules is enabled by default.
Select one:
a. False
b. True
False
Select True or False. On the Next Generation firewall, a commit lock blocks other administrators from committing changes until all of the locks have been released.
Select one:
a. True
b. False
True
Select True or False. On the Next Generation firewall, application groups are always automatically updated when new applications are added to the App-ID database.
Select one:
a. False
b. True
False
Select True or False. On the Next Generation firewall, if there is a NAT policy - there must also be a security policy.
Select one:
a. True
b. False
True
Select True or False. Server Profiles define connections that the firewall can make to external servers.
Select one:
a. False
b. True
True
Select True or false. Service routes can be used to configure an in-band port to access external services.
Select one:
a. False
b. True
True
Select True or False. Source NAT commonly is used for private (internal) users to access the public internet (outbound traffic).
Select one:
a. True
b. False
True
Select True or false. The CN-Series firewalls deliver the same capabilities as the PA-Series and VM-Series firewalls.
Select one:
a. True
b. False
True
Select True or False. The running configuration consists of configuration changes in progress but not active on the firewall.
Select one:
a. True
b. False
False
Select True or False. Traffic protection from external locations where the egress point is the perimeter is commonly referred to as “North-South” traffic.
Select one:
a. False
b. True
True
Select True or False. Security policy rules on the Next Generation firewall specify a source and a destination interface.
Select one:
a. True
b. False
True
The first important task of building a Zero Trust Architecture is to identify __________________.
Select one:
a. interdependencies
b. the protect surface
c. traffic
d. microperimeter
the protect surface
The Gartner Magic Quadrant for Network Firewalls rates company’s:
Select one:
a. Regulatory Compliance / Intellectual Properties
b. Growth Potential / Profitability
c. Ability to Execute / Completeness of Vision
Ability to Execute / Completeness of Vision
To properly configure DOS protection to limit the number of sessions individually from specific source IPS you would configure a DOS Protection rule with the following characteristics:
Select one:
a. Action: Protect, Classified Profile with “Resources Protection” configured, and Classified Address with “source-ip-only” configured
b. Action: Deny, Aggregate Profile with “Resources Protection” configured
c. Action: Protect, Aggregate Profile with “Resources Protection” configured
d. Action: Deny, Classified Profile with “Resources Protection” configured, and Classified Address with “source-ip-only” configured
Action: Protect, Classified Profile with “Resources Protection” configured, and Classified Address with “source-ip-only” configured
Traffic going to a public IP address is being translated by a Next Generation firewall to an internal server private IP address. Which IP address should the security policy use as the destination IP in order to allow traffic to the server?
Select one:
a. The server private IP
b. The server public IP
c. The firewall Management port IP
d. The firewall gateway IP
The server public IP
True or false? Certificate-based authentication replaces all other forms of either local or external authentication.
Select one:
a. False
b. True
True
What action will show whether a downloaded PDF file from a user has been blocked by a security profile on the Next Generation firewall?
Select one:
a. Filter the data filtering logs for the user’s traffic and the name of the PDF file
b. Filter the system log for failed download messages
c. Filter the session browser for all sessions from a user with the application adobe
d. Filter the traffic logs for all traffic from the user that resulted in a deny action
Filter the data filtering logs for the user’s traffic and the name of the PDF file
What component of the Next Generation Firewall will protect from port scans?
Select one:
a. DOS Protection
b. Anti-Virus Protection
c. Zone protection
d. Vulnerability protection
Zone protection
What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth?
Select one:
a. Quality of Service Log
b. Quality of Service Statistics
c. Applications Report
d. Application Command Center (ACC)
Application Command Center (ACC)
What feature on the Next Generation firewall will set the security policy to allow the application on the standard ports associated with the application?
Select one:
a. Application-dependent
b. Application-custom
c. Application-implicit
d. Application-default
Application-default
What is default setting for “Action” in a decryption policy rule?
Select one:
a. Any
b. No-decrypt
c. None
d. Decrypt
None
What is the maximum size of .EXE files uploaded from the Next Generation firewall to WIldfire?
Select one:
a. Configurable up to 2 megabytes
b. Always 10 megabytes
c. Always 2 megabytes
d. Configurable up to 10 megabytes
Configurable up to 10 megabytes
What is the method used to create a Zero Trust policy that answers the ‘who, what, when, where, why and how’ definition?
Select one:
a. Kipling
b. Never Trust - Always Verify
c. Logging
d. Full Authentication
Never Trust - Always Verify
What should be configured as the destination zone on the original packet tab of the NAT Policy rule in the Next Generation firewall?
Select one:
a. Trust-L3
b. Untrust-L3
c. Any
d. DMZ-L3
Untrust-L3
What type of interface allows the Next Generation firewall to provide switching between two or more networks?
Select one:
a. Layer2
b. Virtual Wire
c. Tap
d. Layer3
Layer2
When an Applications and Threats content update is performed, which is the earliest point where you can review the impact of new application signatures on existing policies?
Select one:
a. after clicking Check Now
b. after download
c. after commit
d. after install
after download
When committing changes to a firewall, what is the result of clicking the Preview Changes link?
Select one:
a. Lists the individual settings for which you are committing changes
b. Compares the candidate configuration to the running configuration
c. Displays any unresolved application dependencies
d. Shows any error messages that would appear during a commit
Compares the candidate configuration to the running configuration
When creating a custom admin role, which type of privileges can not be defined?
Select one:
a. Command Line
b. Panorama
c. WebUI
d. XML API
e. REST API
Panorama
When creating an application filter, which of the following is true?
Select one:
a. They are called dynamic because they automatically adapt to new IP addresses
b. They are called dynamic because they will automatically include new applications from an application signature update if the new application’s type is included in the filter
c. They are used by malware
d. Excessive bandwidth may be used as a filter match criteria
They are called dynamic because they will automatically include new applications from an application signature update if the new application’s type is included in the filter
When creating PAN-OS firewall administrator accounts, which configuration step is required for Non-Local Administrators, but not for Local Administrators?
Select one:
a. Directory Services Replication
b. Authentication Profile
c. API Interface
d. Authentication Sequence
Authentication Profile
When defining Security policy rules, why should you consider only the c2s flow direction, and define policy rules that allow or deny traffic from the source zone to the destination zone, that is, in the c2s direction?
Select one:
a. The return c2s flow does not require a separate rule because communications are automatically allowed.
b. Default rules are predefined to allow all interzone traffic (between zones) and deny all intrazone traffic (within a zone).
c. The return s2c flow does not require a separate rule because the return traffic automatically is allowed
d. For traffic that does not match any custom defined rules, all communications are conducted in a separate traffic buffer
The return s2c flow does not require a separate rule because the return traffic automatically is allowed
When making changes to configuration settings on the PAN-OS firewall, which of the following options lists the individual changes for which you are committing changes:
Select one:
a. Validate Commit
b. Preview Changes for selected administrators.
c. Change Summary
d. Preview Changes for all
Change Summary
When resetting the PAN-OS firewall to factory defaults, you can save all configuration settings and logs by performing the following:
Select one:
a. Pressing Shift-C when prompted
b. None of the above
c. Executing the CLI command when in maintenance mode: rebuild/FactoryReset
d. Selecting ‘yes’ when prompted
None of the above
When SSL encrypted traffic first arrives at the Next Generation Firewall, which technology initially identifies the application as web-browsing?
Select one:
a. User-ID
b. App-ID
c. Encryption-ID
d. Content-ID
App-ID
Which action in a Security policy rule results in traffic being silently rejected?
Select one:
a. Deny
b. Reset Server
c. Drop
d. Reset Client
Reset Server
Which anti-spyware feature enables an administrator to quickly identify a potentially infected host on the network?
Select one:
a. DNS SInkhole
b. CVE Number
c. continue response page
d. data filtering log entry
DNS SInkhole
Which attribute is associated with the dedicated out-of-band network management port in Palo Alto Networks firewalls?
Select one:
a. Supports only SSH connections
b. Cannot be configured as a standard traffic port
c. Requires a static, non-DHCP network configuration
d. Supports DHCP only
Cannot be configured as a standard traffic port
Which built-in administrator role allows all rights except for the creation of administrative accounts and virtual systems?
Select one:
a. superuser
b. vsysadmin
c. deviceadmin
d. Custom role
deviceadmin
Which built-in role on the Next Generation firewall is the same as superuser except for creation of administrative accounts?
Select one:
a. vsysadmin
b. deviceadmin
c. devicereader
d. sysadmin
deviceadmin
Which CLI command is used to verify successful file uploads to WildFire?
Select one:
a. debug wildfire upload-log show
b. debug wildfire upload-log
c. debug wildfire upload-threat show
d. debug wildfire download-log show
debug wildfire upload-log show
Which command will reset a next generation firewall to its factory default settings if you know the admin account password?
Select one:
a. reload
b. reset system settings
c. request system private-data-reset
d. reset startup-config
request system private-data-reset
Which feature can be configured to block sessions that the firewall cannot decrypt?
Select one:
a. Decryption profile in security policy
b. Decryption profile in security profile
c. Decryption profile in decryption policy
d. Decryption profile in PBF
Decryption profile in decryption policy
Which feature can be configured with an IPv6 address?
Select one:
a. Static Route
b. RIPv2
c. BGP
d. DHCP Server
Static Route
Which file type can a firewall send to WildFire when the firewall does not have a WildFire subscription?
Select one:
a. JAR
b. APK
c. PDF
d. EXE
EXE
Which is the correct URL matching order on a Palo Alto Networks Next Generation Firewall?
Select one:
a. Block, Allow, External Dynamic, Custom URL, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
b. Block, Allow, Custom URL, External Dynamic, PAN-DB Download, PAN-DB Cloud, PAN-DB Cache
c. Block, Allow, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
d. Allow, Block, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
Block, Allow, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
Which item is not a valid choice when the Source User field is configured in a Security policy rule?
Select one:
a. unknown
b. any
c. known-user
d. all
all
Which Next Generation Firewall URL filter setting is used to prevent users who use the Google, Yahoo, Bing, Yandex, or YouTube search engines from viewing search results unless their browser is configured with the strict safe search option.
Select one:
a. HTTP Header Logging
b. User Credential Detection
c. Safe Search Enforcement
d. Log Container Page Only
Safe Search Enforcement
Which Next Generation FW configuration type has settings active on the firewall?
Select one:
a. Startup
b. Legacy
c. Candidate
d. Running
Running
Which NGFW security policy rule applies to all matching traffic within the specified source zones?
Select one:
a. Interzone
b. Default
c. Universal
d. Intrazone
Intrazone
Which object cannot be segmented using virtual systems on a firewall?
Select one:
a. Administrative Access
b. MGT interface
c. Network Security Zone
d. Data Plane Interface
MGT interface
Which of the following are NOT traffic attributes or criteria that can be defined in a Security policy rule?
Select one:
a. Source user
b. Traffic that does not pass through the firewall data plane
c. Source / Destination zones
d. URL Catgegory
Traffic that does not pass through the firewall data plane
Which of the following is a routing protocol supported in a Next Generation firewall?
Select one:
a. IGRP
b. RIPV2
c. ISIS
d. EIGRP
RIPV2
Which of the following is NOT a PAN-OS Firewall Administrator Dynamic Role?
Select one:
a. Superuser
b. Device administrator (read-only)
c. Virtual system administrator
d. Local only administrator
Local only administrator
Which one of the following statements is true about NAT rules?
Select one:
a. NAT rules provide address translation, while security policy rules allow or deny packets.
b. The addresses used in source NAT rules always refer to the original IP address in the packet (that is, the pre-translated address).
c. NAT rules are applied after security policy rules.
d. The destination zone in the security rule is determined before the route lookup of the post-NAT destination IP address.
NAT rules provide address translation, while security policy rules allow or deny packets.
Which Palo Alto Networks Cortex technology prevents malware, blocks exploits, and analyzes suspicious patterns through behavioral threat protection?
Select one:
a. AutoFocus
b. XDR
c. Data Lake
d. XSOAR
XDR
Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user’s browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log?
Select one:
a. block
b. override
c. continue
d. alert
override
Which Palo Alto Networks Next Generation VM Series Model requires a minimum of 16 GB of memory and 60 GB of dedicated disk drive capacity?
Select one:
a. VM-100
b. VM-500
c. VM-700
d. VM-50
VM-500
Which Palo Alto Networks Prisma technology provides continuous security monitoring, compliance validation, and cloud storage security capabilities across multi-cloud environments. In addition, you can simplify security operations through effective threat protections enhanced with comprehensive cloud context?
Select one:
a. SaaS
b. Cloud
c. Compliance
d. Access
Cloud
Which Palo Alto Networks product for securing the enterprise extends the enterprise perimeter to remote offices and mobile users?
Select one:
a. Panorama
b. WildFire
c. GlobalProtect
d. VM-Series
GlobalProtect
Which port does the Palo Alto Networks Windows-based User-ID agent use by default?
Select one:
a. TCP port 5007
b. TCP port 80
c. TCP port 443
d. TCP port 4125
TCP port 5007
Which profile type is designed to protect against reconnaissance attacks such as host sweeps and port scans?
Select one:
a. Data Filtering
b. Anti-Spyware
c. DOS Protection
d. Zone Protection
Zone Protection
Which role-based privilege allows full access to the Palo Alto Networks firewall, including defining new administrator accounts and virtual systems?
Select one:
a. devicereader
b. superuser
c. deviceadmin
d. superreader
superuser
Which routing protocol is supported on a virtual router?
Select one:
a. PPP
b. EGP
c. IGRP
d. OSPF
OSPF
Which series of firewall is a high-performance physical appliance solution?
Select one:
a. HA
b. PA
c. VM
d. CN
PA
Which series of Palo Alto Networks Next Generation Firewall offers two modes, Secure Mode, and Express Mode?
Select one:
a. VM
b. CN
c. VS
d. K2
K2
Which source address translation type will allow multiple devices to share a single translated source address while using a single NAT Policy rule on the Next Generation firewall?
Select one:
a. Static IP
b. Dynamic IP and Port
c. Bi-Directional
d. Dynamic IP
Dynamic IP and Port
Which Source NAT type allows multiple clients to use the same public IP addresses with different source port numbers?
Select one:
a. Dynamic IP and Port (DIPP)
b. Static IP and Port (SIPP)
c. Static IP
d. Dynamic IP
Dynamic IP and Port (DIPP)
Which statement about the automated correlation engine is not correct?
Select one:
a. It is available only in Panorama
b. It uses correlation objects as input.
c. It detects possible infected hosts.
d. It outputs correlation events.
It is available only in Panorama
Which statement about the predefined reports is not correct?
Select one:
a. They are emailed daily to users
b. They are grouped in 5 categories
c. They are generated daily by default
d. There are more than 40 predefined reports
They are emailed daily to users
Which statement is not true regarding Safe Search Enforcement?
Select one:
a. Safe search works only in conjunction with credential submission websites
b. Safe search is a web server setting
c. Safe search is a web browser setting
d. Safe search is a best effort setting
Safe search works only in conjunction with credential submission websites
Which statement is true regarding the Palo Alto Networks Firewall candidate configuration?
Select one:
a. It does not control changes to the current configuration.
b. It controls the current operation of the firewall.
c. It always contains the factory default configuration.
d. It can be reverted to the current configuration.
It can be reverted to the current configuration.
Which statement is true regarding User-ID and Security policy rules?
Select one:
a. Users can be used in policy rules only if they are known by the firewall
b. The Source User field can match only users, not groups.
c. If the user associated with an IP address cannot be determined, all traffic from that address will be dropped.
d. The Source IP and Source User fields cannot be used in the same policy.
Users can be used in policy rules only if they are known by the firewall
Which Strata product provides centralized firewall management and logging?
Select one:
a. WildFire
b. GlobalProtect
c. Prisma Access
d. Panorama
Panorama
Which type of firewall decryption requires the administrator to import a server certificate and a private key into the firewall?
Select one:
a. SSH Tunnel Decryption
b. SSL Inbound Inspection Decryption
c. SSL Forward Proxy Decryption
d. SSH Decryption
SSL Inbound Inspection Decryption
Which type of firewall interface enables passive monitoring of network traffic?
Select one:
a. Tap
b. Virtual wire
c. Loopback
d. Tunnel
Tap
Which type of firewall license or subscription provides a graphical analysis of firewall traffic logs and identifies potential risks to your network by using threat intelligence from a portal?
Select one:
a. Threat Prevention
b. GlobalProtect
c. WildFire
d. AutoFocus
AutoFocus
Which type of interface will allow the firewall to be inserted into an existing topology without requiring any reallocation of network addresses or redesign on the network topology?
Select one:
a. Layer 2
b. Layer 3
c. Virtual Wire
d. Tap
Virtual Wire
Which type of Next Generation Firewall decryption inspects SSL traffic between an internal host and an external web server?
Select one:
a. SSH
b. SSL Outbound Inspection
c. SSL Forward Proxy
d. SSL Inbound Inspection
SSL Forward Proxy
Which type of Next Generation Firewall decryption inspects SSL traffic coming from external users to internal servers?
Select one:
a. SSL Forward Proxy
b. SSL Outbound Inspection
c. SSH
d. SSL Inbound Inspection
SSL Inbound Inspection
Which type of Security policy rule is the default rule type?
Select one:
a. Intrazone
b. Universal
c. Default
d. Interzone
Interzone
Which URL Filtering Profile action will result in a user being interactively prompted for a password?
Select one:
a. allow
b. override
c. continue
d. alert
override
Which URL filtering security profile action logs the category to the URL filtering log?
Select one:
a. Alert
b. Log
c. Allow
d. Default
Alert
Which User-ID component and mapping method is recommended for web clients that do not use the domain server?
Select one:
a. Captive Portal
b. Terminal Services agent
c. GlobalProtect
d. XML API
Captive Portal
Which WildFire verdict might indicate obtrusive behavior but not a security threat?
Select one:
a. malware
b. phishing
c. grayware
d. benign
grayware
Without a Wildfire subscription, which of the following files can be submitted by the Next Generation FIrewall to the hosted Wildfire virtualized sandbox?
Select one:
a. PE and Java Applet only
b. PDF files only
c. MS Office doc/docx, xls/xlsx, and ppt/pptx files only
d. PE files only
MS Office doc/docx, xls/xlsx, and ppt/pptx files only