210 Final Exam Flashcards
A “continue” action can be configured on the following security profiles in the Next Generation firewall:
Select one:
a. URL Filtering, File Blocking, and Data Filtering
b. URL Filtering
c. URL Filtering and Antivirus
d. URL Filtering and File Blocking
d. URL Filtering and File Blocking
A critical consideration when defining Network Segmentation is ____________.
Select one:
a. third party management
b. eliminating security zones
c. understanding your business and organizational drivers
d. password management
understanding your business and organizational drivers
A strength of the Palo Alto Networks firewall is:
Select one:
a. hardware consolidation - data and control plane processing is improved and performed in successive linear fasion
b. its single-pass parallel processing (SP3) engine and software performs operations once per packet
c. increased buffering capability.
a. its single-pass parallel processing (SP3) engine and software performs operations once per packet
A Zone Protection Profile is applied to which item?
Select one:
a. Ingress Ports
b. Egress Ports
c. Security Policy Rules
d. Address Groups
Ingress Ports
Assume you have a WildFire subscription. Which file state or condition might result in a file not being analyzed by WildFire?
Select one:
a. file size limit exceeded
b. file located in a JAR or RAR archive
c. file already has WildFire hash
d. executable file signed by trusted signer
file located in a JAR or RAR archive
For guidance on continuing to deploy the security platform features to address your network security needs, review the PAN-OS Administrator’s Guide section titled ______________________________________________.
Select one:
a. Best Practices for Completing the Firewall Deployment
b. Set Up a Basic Security Policy
c. Best Practices for Securing Administrative Access
d. Register the Firewall
Best Practices for Completing the Firewall Deployment
From the reading “Four Ps of 5G Network Security”: Which of the following is NOT one of the ‘Four Ps’?
Select one:
a. Perimeter
b. Permissions
c. Protection
d. Packets
Protection
From the reading “Securing OT to enable Manufacturing Digital Transformation”: The risk of operations managing security at the local level is the potential of having _______________ approaches to security.
Select one:
a. IT administered
b. third party management
c. centralized
d. multiple,disjointed
multiple,disjointed
Global user authentication is not supported by which authentication service?
Select one:
a. LDAP
b. TACACS +
c. RADIUS
d. SAML
LDAP
How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application?
Select one:
a. incomplete
b. insufficient-data
c. not-applicable
d. unknown-tcp
insufficient-data
In a Next Generation firewall, how many packet does it take to identify the application in a TCP exchange?
Select one:
a. Two
b. One
c. Four or five
d. Three
Four or five
In the latest Next Generation firewall version, what is the shortest time that can be configured on the firewall to check for Wildfire updates?
Select one:
a. 30 Minutes
b. 5 Minutes
c. 1 Hour
d. 15 Minutes
5 Minutes
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display?
Select one:
a. Universal
b. Global
c. Local
d. Group
Global
In the web interface, what is signified when a text box is highlighted in red?
Select one:
a. The value in the text box is an error
b. The value in the text box is required
c. The value in the text box is optional
d. The value in the text box is controlled by Panorama
The value in the text box is required
NGFW QoS policies can be configured to apply:
Select one:
a. either preferential treatment or bandwidth-limiting traffic rules
b. data encryption
c. forwarding for anti-virus screening
d. third party authentication
either preferential treatment or bandwidth-limiting traffic rules
On a Palo Alto Networks firewall, which technique is used to manage traffic through NAT policies based on destination port numbers?
Select one:
a. Port Forwarding
b. Translated Address
c. Address Translation
d. Static/Dynamic Translation
a. Port Forwarding
On the Palo Alto Networks Next Generation Firewall, which is the default port for transporting Syslog traffic?
Select one:
a. 514
b. 443
c. 8080
d. 6514
514
Select the answer that best completes this sentence. Source NAT commonly is used for _________ users to access the ________ internet.
Select one:
a. private, private
b. private, public
c. public, private
d. public, public
private, public
Select the answer that completes this sentence. DIPP source NAT will support a maximum of about ______________ concurrent sessions on each IP address configured within the NAT pool.
Select one:
a. 16,300
b. 8100
c. 64,000
d. 250
64,000
Select True or False. A Layer 3 interface can be configured as dual stack with both IPv4 and IPv6 addresses.
Select one:
a. False
b. True
True
Select True or False. All of the interfaces on a Next Generation firewall must be the same interface type.
Select one:
a. False
b. True
True
Select True or False. By default, the firewall uses the management (MGT) interface to access external services, such as DNS servers, external authentication servers, Palo Alto Networks services such as software, URL updates, licenses and AutoFocus.
Select one:
a. False
b. True
True
Select True or False. Destination NAT often is used to provide hosts on the public (external) network access to private (internal) servers.
Select one:
a. True
b. False
True
Select True or False. In a Next Generation firewall, every interface in use must be assigned to a zone in order to process traffic.
Select one:
a. False
b. True
True
Select True or False. In addition to routing to other network devices, virtual routers on the Next Generation firewall can route to other virtual routers.
Select one:
a. True
b. False
True
Select True or False. Logging on intrazone-default and interzone-default Security policy rules is enabled by default.
Select one:
a. False
b. True
False
Select True or False. On the Next Generation firewall, a commit lock blocks other administrators from committing changes until all of the locks have been released.
Select one:
a. True
b. False
True
Select True or False. On the Next Generation firewall, application groups are always automatically updated when new applications are added to the App-ID database.
Select one:
a. False
b. True
False
Select True or False. On the Next Generation firewall, if there is a NAT policy - there must also be a security policy.
Select one:
a. True
b. False
True
Select True or False. Server Profiles define connections that the firewall can make to external servers.
Select one:
a. False
b. True
True
Select True or false. Service routes can be used to configure an in-band port to access external services.
Select one:
a. False
b. True
True
Select True or False. Source NAT commonly is used for private (internal) users to access the public internet (outbound traffic).
Select one:
a. True
b. False
True
Select True or false. The CN-Series firewalls deliver the same capabilities as the PA-Series and VM-Series firewalls.
Select one:
a. True
b. False
True
Select True or False. The running configuration consists of configuration changes in progress but not active on the firewall.
Select one:
a. True
b. False
False
Select True or False. Traffic protection from external locations where the egress point is the perimeter is commonly referred to as “North-South” traffic.
Select one:
a. False
b. True
True
Select True or False. Security policy rules on the Next Generation firewall specify a source and a destination interface.
Select one:
a. True
b. False
True
The first important task of building a Zero Trust Architecture is to identify __________________.
Select one:
a. interdependencies
b. the protect surface
c. traffic
d. microperimeter
the protect surface
The Gartner Magic Quadrant for Network Firewalls rates company’s:
Select one:
a. Regulatory Compliance / Intellectual Properties
b. Growth Potential / Profitability
c. Ability to Execute / Completeness of Vision
Ability to Execute / Completeness of Vision
To properly configure DOS protection to limit the number of sessions individually from specific source IPS you would configure a DOS Protection rule with the following characteristics:
Select one:
a. Action: Protect, Classified Profile with “Resources Protection” configured, and Classified Address with “source-ip-only” configured
b. Action: Deny, Aggregate Profile with “Resources Protection” configured
c. Action: Protect, Aggregate Profile with “Resources Protection” configured
d. Action: Deny, Classified Profile with “Resources Protection” configured, and Classified Address with “source-ip-only” configured
Action: Protect, Classified Profile with “Resources Protection” configured, and Classified Address with “source-ip-only” configured
Traffic going to a public IP address is being translated by a Next Generation firewall to an internal server private IP address. Which IP address should the security policy use as the destination IP in order to allow traffic to the server?
Select one:
a. The server private IP
b. The server public IP
c. The firewall Management port IP
d. The firewall gateway IP
The server public IP
True or false? Certificate-based authentication replaces all other forms of either local or external authentication.
Select one:
a. False
b. True
True
What action will show whether a downloaded PDF file from a user has been blocked by a security profile on the Next Generation firewall?
Select one:
a. Filter the data filtering logs for the user’s traffic and the name of the PDF file
b. Filter the system log for failed download messages
c. Filter the session browser for all sessions from a user with the application adobe
d. Filter the traffic logs for all traffic from the user that resulted in a deny action
Filter the data filtering logs for the user’s traffic and the name of the PDF file
What component of the Next Generation Firewall will protect from port scans?
Select one:
a. DOS Protection
b. Anti-Virus Protection
c. Zone protection
d. Vulnerability protection
Zone protection
What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth?
Select one:
a. Quality of Service Log
b. Quality of Service Statistics
c. Applications Report
d. Application Command Center (ACC)
Application Command Center (ACC)