Exam Domain 1 - Plan Flashcards

1
Q
1. Which component of the integrated Palo Alto Networks security solution limits network attached workstation access to a corporate mainframe?
A. threat intelligence cloud
B. advanced endpoint protection
C. next-generation firewall
D. tunnel inspection
A

C. next-generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Which Palo Alto Networks product is designed primarily to provide threat context with deeper information about attacks?
A. Prisma Cloud
B. WildFire
C. AutoFocus
D. Threat Prevention
A

C. AutoFocus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which Palo Alto Networks product is designed primarily to provide normalization of threat
    intelligence feeds with the potential for automated response?
    A. MineMeld
    B. WildFire
    C. AutoFocus
    D. Threat Prevention
A

A. MineMeld

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4. Which Palo Alto Networks product is designed primarily to prevent endpoints from
successfully running malware programs?
A. GlobalProtect
B. Cortex XDR – Analytics
C. Cortex XDR
D. Prisma Cloud
A

C. Cortex XDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. The Palo Alto Networks Cortex Data Lake can accept logging data from which two products?  (Choose two.)
A. Cortex XDR
B. next-generation firewalls
C. Prisma SaaS
D. MineMeld
E. AutoFocus
A

A. Cortex XDR

B. next-generation firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. Which Palo Alto Networks product is a cloud-based storage service designed to hold log
information?
A. Prisma Cloud
B. Cortex XDR
C. next-generation firewall
D. Cortex Data Lake
A

D. Cortex Data Lake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. Which product is an example of an application designed to analyze Cortex Data Lake information?
A. Cortex XDR – Analytics
B. Prisma Cloud
C. Cortex XDR – Automated Response
D. AutoFocus
A

A. Cortex XDR – Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. A potential customer says it wants to maximize the threat detection capability of its next generation firewall. Which three additional services should it consider implementing to enhance its firewall’s capability to detect threats? (Choose three.)
A. Cortex XDR
B. WildFire
C. URL Filtering
D. Expedition
E. DNS Security
A

B. WildFire
C. URL Filtering

E. DNS Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A VM-Series virtual firewall differs from a physical Palo Alto Networks firewall in which way?
    A. A VM-Series firewall cannot be managed by Panorama.
    B. A VM-Series firewall supports fewer traffic interface types.
    C. A VM-Series firewall cannot terminate VPN site-to-site tunnels.
    D. A VM-Series firewall cannot use dynamic routing protocols.
A

B. A VM-Series firewall supports fewer traffic interface types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. Which product would best secure east-west traffic within a public cloud implementation?
A. Prisma Cloud
B. MineMeld
C. VM-Series firewall
D. Cortex
A

C. VM-Series firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Why would you recommend an active/active firewall pair instead of an active/passive firewall pair?
    A. Active/active is the preferred solution when the firewall pair is behind a load balancer that randomizes routing, thus requiring both firewalls to be active.
    B. Active/active usually is the preferred solution because it allows for more bandwidth while both firewalls are up.
    C. Active/active is the preferred solution when the PA-7000 Series is used. Use active/passive with the PA-5200 Series or smaller form factors.
    D. Active/active is the preferred solution when the PA-5200 Series or smaller form factors are used. Use active/passive with the PA-7000 Series.
A

A. Active/active is the preferred solution when the firewall pair is behind a load balancer that randomizes routing, thus requiring both firewalls to be active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which two events can trigger an HA pair failover event? (Choose two.)
    A. An HA1 cable is disconnected from one of the firewalls.
    B. A dynamic update fails to download and install.
    C. The firewall fails to ping a path-monitored destination address successfully.
    D. OSPF implemented on the firewall determines that an available route is now down.
    E. RIP implemented on the firewall determines that an available route is now down.
A

A. An HA1 cable is disconnected from one of the firewalls.

C. The firewall fails to ping a path-monitored destination address successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
13. Which two firewall features support floating IP addresses in an active/active HA pair? (Choose two.)
A. data-plane traffic interfaces
B. source NAT
C. VPN endpoints
D. loopback interfaces
E. management port
A

B. source NAT

C. VPN endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. How are firewalls configurations in an active/passive HA pair synchronized if the firewalls are not under Panorama control?
    A. An administrator commits the changes to one, then commits them to the partner, at which time the changes are sent to the other.
    B. An administrator pushes the configuration file to both firewalls, then commits them.
    C. An administrator commits changes to one, which automatically synchronizes with the other.
    D. An administrator schedules an automatic sync frequency in the firewall configurations.
A

C. An administrator commits changes to one, which automatically synchronizes with the
other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. In which two ways is an active/passive HA pair configured in virtual firewalls deployed in any public clouds? (Choose two.)
    A. The virtual firewalls are deployed in a cloud “scale set” with a cloud-supplied load
    balancer in front to detect and manage failover.
    B. The virtual firewalls rely on a VM-Series plugin to map appropriate cloud functions to the firewall’s HA settings.
    C. Virtual firewalls use PAN-OS HA configuration combined with appropriate cloud deployments of interfaces for HA use.
    D. The virtual firewalls use an HA Compatibility module for the appropriate cloud technology
A

A. The virtual firewalls are deployed in a cloud “scale set” with a cloud-supplied load
balancer in front to detect and manage failover.
B. The virtual firewalls rely on a VM-Series plugin to map appropriate cloud functions to
the firewall’s HA settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
16. Without having to make network address configuration changes, you would use which type of network interface to insert a Palo Alto Networks firewall in front of a legacy port-based firewall to collect application information from incoming network traffic?
A. VLAN
B. tunnel
C. tap
D. virtual wire
E. Layer 2
F. Layer 3
A

D. virtual wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
17. Which type of interface do you use to connect Layer 2 and Layer 3 interfaces?
A. VLAN
B. tunnel
C. tap
D. virtual wire
E. Layer 2
F. Layer 3
A

A. VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
18. Which three types of interfaces can the firewall’s management web interface be bound to? (Choose three.)
A. VLAN
B. tunnel
C. tap
D. virtual wire
E. Layer 2
F. Layer 3
A

A. VLAN
B. tunnel

F. Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
19. Which three types of interfaces connect to a virtual router? (Choose three.)
A. VLAN
B. tunnel
C. tap
D. virtual wire
E. Layer 2
F. Layer 3
A

A. VLAN
B. tunnel

F. Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
20. Which dynamic routing protocol is not supported by the Palo Alto Networks firewall?
A. RIP
B. OSPF
C. OSPFv3
D. IGRP
E. BGP
A

D. IGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which action is not compatible with aggregate interface configuration?
    A. aggregating 18 Layer 3 interfaces
    B. aggregating four virtual wire interfaces
    C. aggregating interfaces in an HA pair
    D. aggregating two 10Gbps optical and two 10Gbps copper Ethernet ports
A

A. aggregating 18 Layer 3 interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. In a Panorama environment, how do you create and view enterprise-wide reports that include data from all managed firewalls?
    A. Run Panorama reports normally. Firewall summary reporting information is gathered
    automatically once the firewalls are managed by Panorama.
    B. Configure log forwarding on the managed firewalls to forward logs to Panorama using
    syslog formatting.
    C. Run custom Panorama reports and select remote logs as the information source.
    D. Run custom Panorama reports and select log collector as the information source.
A

A. Run Panorama reports normally. Firewall summary reporting information is gathered automatically once the firewalls are managed by Panorama.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. What must you configure to guarantee duplication of log data on Log Collectors?
    A. Log Collector settings to include “Replicate Data”
    B. Panorama HA settings to include “Duplicate Logs”
    C. Log Collector settings to include “Enable log redundancy”
    D. log forwarding settings of firewalls for two Log Collector destinations
A

C. Log Collector settings to include “Enable log redundancy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
24. Which three devices can be used as Log Collectors? (Choose three.)
A. Virtual Panorama
B. PA-220R
C. M-600
D. M-200
E. VM-300LC
A

A. Virtual Panorama

C. M-600
D. M-200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Which statement is true regarding Log Collecting in a Panorama HA pair?
    A. Both Panoramas cannot be configured to collect logs.
    B. Log collecting is handled by the active HA Panorama until a failover occurs.
    C. Both Panoramas collect independent logging traffic and are not affected by failover.
    D. Both Panoramas receive the same logging traffic and synchronize in case of HA failover.
A

C. Both Panoramas collect independent logging traffic and are not affected by failover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. How are log retention periods on Palo Alto Networks firewalls increased?
    A. add storage to any firewall model
    B. increase the allocation for overall log storage within the firewall
    C. turn on log compression
    D. forward logs to external Log Collectors
A

D. forward logs to external Log Collectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. How do you access, and view firewall log data sent to the Cortex Data Lake?
    A. direct viewing and searching with the Cortex gateway
    B. Panorama using a Log Collector configuration for access
    C. reporting in a firewall using a “remote data source” configuration
    D. reporting in a firewall equipped with a “Remote Logging” plugin
A

B. Panorama using a Log Collector configuration for access

28
Q
  1. Log retention is increased when a Dedicated Log Collector is used to collect logs from firewalls in which two ways? (Choose two.)
    A. turning on “Log Compression” in the Log Collector
    B. adding storage capacity to the Log Collector
    C. enabling “Log Storage Sharing” between the Log Collector and Panorama
    D. adding Log Collectors to the Log Collector Group
A

B. adding storage capacity to the Log Collector

D. adding Log Collectors to the Log Collector Group

29
Q
  1. The Security policy for all of a customer’s remote offices is the same, but different offices have different firewall models. If the remote offices are managed by Panorama, how might the offices share device groups and templates?
    A. same device group and same template stack
    B. same device group, different template stacks
    C. different device groups, same template stack
    D. different device groups and different template stacks
A

B. same device group, different template stacks

30
Q
  1. A Panorama template stack contains two templates and one configuration setting has a
    different value in each template. When Panorama pushes the template stack to the managed firewalls, which setting value will the firewalls receive?
    A. value from the top template of the stack
    B. value from the bottom template in the stack
    C. value from the template designated as the parent
    D. value an administrator selects from the two available values
A

A. value from the top template of the stack

31
Q
  1. Which two firewall settings are stored in Panorama templates? (Choose two.)
    A. custom Application-ID signatures
    B. Server Profile for an external LDAP server
    C. services definitions
    D. DoS Protection Profiles
    E. data-plane interface configurations
A

B. Server Profile for an external LDAP server

E. data-plane interface configurations

32
Q
  1. Where in Panorama do you enter Security policy rules to ensure that your new rules will take
    precedence over locally entered rule?
    A. Security policy rules with a targeted firewall
    B. default rules section of Security policy rules
    C. pre-rules section of Security policy rules
    D. post-rules section of Security policy rules
A

C. pre-rules section of Security policy rules

33
Q
  1. In Panorama, how would you make changes to a Security policy rule for a specific firewall?
    A. log in to Panorama, clone the rule, modify the clone, and add a target firewall to the
    new rule
    B. select the rule, click the override button, and enter the changes
    C. create a new locally defined Security policy rule that is placed higher in the rule list than
    the rule to be overridden
    D. log in to Panorama and modify the original rule
A

A. log in to Panorama, clone the rule, modify the clone, and add a target firewall to the
new rule

34
Q
34. Which three firewall settings are stored in Panorama device groups? (Choose three.)
A. User Identification configuration
B. custom Application-ID signatures
C. services definitions
D. DoS Protection Profiles
E. data-plane interface configurations
F. Zone Protection Profiles
G. Server Profile for an external LDAP server
A

B. custom Application-ID signatures
C. services definitions
D. DoS Protection Profiles

35
Q
  1. Which part of a VM-Series firewall should be updated to provide maximum feature support for a public cloud?
    A. latest PAN-OS update
    B. latest VM-Series plugin
    C. capacity license for the target public cloud.
    D. latest dynamic updates appropriate for the implemented PAN-OS version
A

B. latest VM-Series plugin

36
Q
36. Which two types of firewall interfaces are most likely to be supported in public cloud
deployments? (Choose two.)
A. tap
B. virtual wire
C. Layer 3
D. tunnel
E. aggregate Ethernet
A

C. Layer 3

D. tunnel

37
Q
  1. From where can you buy and download a VM-Series virtual firewall appliance for a public
    cloud deployment?
    A. Palo Alto Networks Support Portal
    B. cloud vendor’s “Solution Marketplace”
    C. Using the download link supplied on the same site as the license server
    D. Palo Alto Networks Product Download portal
A

B. cloud vendor’s “Solution Marketplace”

38
Q
  1. Which two conditions must be met to manage Palo Alto Networks firewalls deployed in multiple cloud environments from a central Panorama? (Choose two.)
    A. The Panorama and firewall must be able to communicate.
    B. The Panorama must be licensed for each cloud environment containing managed firewalls.
    C. The firewalls must have the latest VM-Series plugin installed.
    D. The firewalls and Panorama must be running the same version of PAN-OS software.
    E. Firewalls must be running a version of PAN-OS software equal to or less that that on Panorama.
A

A. The Panorama and firewall must be able to communicate.

E. Firewalls must be running a version of PAN-OS software equal to or less that that on Panorama.

39
Q
  1. A private cloud has 20 VLANs spread over five ESXi hypervisors, managed by a single vCenter.
    How many firewall VMs are needed to implement micro-segmentation?
    A. one
    B. four
    C. five
    D. 20
A

C. five

40
Q
  1. When you deploy the Palo Alto Networks NGFW on NSX, packets coming to an application VM
    from VMs running on different hardware go through which modules?
    A. network, vSwitch, NSX firewall, Palo Alto Networks NGFW, application VM
    B. network, vSwitch, Palo Alto Networks NGFW, NSX firewall, application VM
    C. network, vSwitch, NSX firewall, Palo Alto Networks NGFW, NSX firewall, application
    VM
    D. vSwitch, network, Palo Alto Networks NGFW, NSX firewall, application VM
A

C. network, vSwitch, NSX firewall, Palo Alto Networks NGFW, NSX firewall, application VM

41
Q
41. Which option shows the interface types that ESXi supports in the VM-Series firewalls?
A. tap, Layer 2, Layer 3, virtual wire
B. Layer 3 only
C. tap, Layer 2, Layer 3
D. Layer 3, virtual wire
A

A. tap, Layer 2, Layer 3, virtual wire

42
Q
  1. To configure multi-factor authentication for users accessing services through the firewall,
    which three configuration pieces need to be addressed? (Choose three.)
    A. GlobalProtect Portal
    B. Captive Portal
    C. Authentication Enforcement Profile
    D. Authentication Profile
    E. Response pages
A

B. Captive Portal
C. Authentication Enforcement Profile
D. Authentication Profile

43
Q
43. Which firewall configuration component is used to configure access to an external
authentication service?
A. Local User Database
B. Server Profiles
C. VM Information source
D. admin roles
E. Authentication policy rules
A

B. Server Profiles

44
Q
  1. Which two firewall functions are reserved only for administrators assigned the superuser
    dynamic role? (Choose two.)
    A. managing certificates
    B. managing firewall admin accounts
    C. editing the management interface settings
    D. creating virtual systems within a firewall
    E. accessing the configuration mode of the CLI
A

B. managing firewall admin accounts

D. creating virtual systems within a firewall

45
Q
  1. A Palo Alto Networks firewall can obtain a certificate for its internal use through which three methods? (Choose three.)
    A. import a certificate file generated by an external CA
    B. reference an externally stored certificate by a URL configured in an SSL/TLS Service
    Profile
    C. generate a certificate directly by manually entering certificate data
    D. obtain a certificate from an SCEP server using an SCEP Profile
    E. importing a certificate from an external CA by using an Authentication Profile
A

A. import a certificate file generated by an external CA

C. generate a certificate directly by manually entering certificate data
D. obtain a certificate from an SCEP server using an SCEP Profile

46
Q
  1. Which two resources must be available to successfully run certificate validation tests on a
    certificate received from an external source? (Choose two.)
    A. Root Certificate of the issuing CA
    B. public key for the received certificate
    C. OCSP connection address
    D. existing Certificate Profile that matches the received certificate’s CA identity
A

A. Root Certificate of the issuing CA

C. OCSP connection address

47
Q
47. The firewall uses which information to determine which interface to use for a packet’s egress?
A. manually configured static routes
B. routing information base (RIB)
C. appropriate Redistribution Profile
D. ECMP destination monitoring results
A

B. routing information base (RIB)

48
Q
48. A legacy virtual router can use a Redistribution Profile to share routes between which three routing protocols? (Choose three.)
A. static routes
B. IGRP
C. RIP
D. OSPF
E. multicast
A

A. static routes

C. RIP
D. OSPF

49
Q
  1. How does a firewall determine which route to use when its RIB is populated with multiple routes to the same location, but the routes were added by different routing protocol?
    A. according to the following precedence of route type: static, RIP, OSPF, BGP
    B. using the virtual router’s FIB
    C. using the associated route’s metric and choosing the lowest value
    D. using the route’s administrative distance and choosing the lowest value
A

D. using the route’s administrative distance and choosing the lowest value

50
Q
  1. For which two reasons are denial-of-service protections applied by zone? (Choose two.)
    A. because denial-of-service protections are applied early in the processing, before much
    information is known about the connection but when the ingress interface already is
    known
    B. because denial-of-service protections are applied only when manually turned on to
    avoid quota overload (which would make denial of service easier)
    C. because denial-of-service protections can depend on only the zone, and never on port
    numbers or IP addresses
    D. because denial-of-service protections on a Layer 3 interface are different from the denialof-
    service protections available on a Layer 2 interface and interfaces on virtual wires
A

A. because denial-of-service protections are applied early in the processing, before much
information is known about the connection but when the ingress interface already is
known
B. because denial-of-service protections are applied only when manually turned on to
avoid quota overload (which would make denial of service easier)

51
Q
51. SYN flood protection provides flood protection from which protocol?
A. UDP
B. TCP
C. ICMP
D. GRE
A

B. TCP

52
Q
52. To which two protocols does port scan reconnaissance protection apply? (Choose two.)
A. UDP
B. TCP
C. GRE
D. ICMP
E. IPX
A

A. UDP

B. TCP

53
Q
53. In which two places do you configure flood protection? (Choose two.)
A. DoS Protection Profile
B. QoS Profile
C. Zone Protection Profile
D. SYN Protection Profile
E. XOFF Profile
A

A. DoS Protection Profile

C. Zone Protection Profile

54
Q
54. Which two firewall features should be used to provide tailored DoS protection to a specific address? (Choose two.)
A. Zone Protection Profiles
B. virtual routers
C. Server Profiles
D. DoS policy rules
E. DoS Protection Profiles
A

D. DoS policy rules

E. DoS Protection Profiles

55
Q
55. Which feature is not negatively affected by the lack of a Decryption policy?
A. antivirus
B. App-ID
C. file blocking
D. network address translation
A

D. network address translation

56
Q
  1. How can the next-generation firewall inform web browsers that a web server’s certificate is from an unknown CA?
    A. show a “the certificate is untrusted, are you SURE you want to go there” response page
    before accessing the website
    B. relay the untrusted certificate directly to the browser
    C. have two certificates in the firewall, one used for sites whose original certificate is
    trusted, and the other for sites whose original certificate is untrusted
    D. have two certificate authority certificates in the firewall, one used to produce
    certificates for sites whose original certificate is trusted and the other used for
    certificates for sites whose original certificate is untrusted
A

D. have two certificate authority certificates in the firewall, one used to produce
certificates for sites whose original certificate is trusted and the other used for certificates for sites whose original certificate is untrusted

57
Q
  1. Which two firewall features can be used to support an organization’s requirement of
    decrypting and recording all encrypted traffic? (Choose two.)
    A. Decryption Broker
    B. Policy Based Forwarding
    C. Default Router setting of Forward Cleartext
    D. Interface setting of Decryption Port Mirroring
    E. Decryption policy rule action set to Forward Cleartext
    1.17
A

A. Decryption Broker

D. Interface setting of Decryption Port Mirroring

58
Q
  1. An App-ID used in an Application Override policy rule should have which characteristic?
    A. existing App-ID that uses the same decoder
    B. new App-ID with no signature information
    C. new App-ID with the “custom” property set to yes
    D. any existing App-ID with compatible characteristics
A

B. new App-ID with no signature information

59
Q
59. Which type of identification is disabled by Application Override?
A. Protocol-ID
B. User-ID
C. Content-ID
D. URL Filtering
A

C. Content-ID

60
Q
  1. Application Override is triggered by which configuration setting?
    A. Custom App-ID
    B. Application Override policy rule
    C. Application Override definition in Custom Objects
    D. Application Filters
A

B. Application Override policy rule

61
Q
61. Which configuration must be made on the firewall before it can read User-ID-to-IP-address mapping tables from external source?
A. Group Mapping Settings
B. Server Monitoring
C. Captive Portal
D. User-ID Agents
A

D. User-ID Agents

62
Q
  1. For an external device to consume a local User-ID-to-IP-address mapping table, which data is used for authentication between the devices?
    A. the source device’s Data Redistribution Collector Name and Pre-Shared Key
    B. User-ID agent’s Server Monitor Account information
    C. administrators account information on the source device with the User-ID role set
    D. certificates added to the User-ID agent configuration
A

A. the source device’s Data Redistribution Collector Name and Pre-Shared Key

63
Q
63. User-ID-to-IP-address mapping tables can be read by which product or service?
A. Cortex XDR
B. Panorama Log Collector
C. AutoFocus
D. Prisma Cloud
A

B. Panorama Log Collector

64
Q
  1. When will a firewall check for the presence of bootstrap volume?
    A. each time it cold-boots
    B. each time it boots from a factory default state
    C. when a firewall is started in maintenance mode
    D. each time it warm-boots
A

B. each time it boots from a factory default state

65
Q
65. Where in the bootstrap volume directories is a required dynamic update file?
A. /config
B. /license
C. /software
D. /content
A

D. /content

66
Q
  1. Can a firewall’s PAN-OS software be updated by the bootstrap process?
    A. Yes, by including a copy of the desired PAN-OS software in the /software folder of the
    bootstrap volume.
    B. Yes, by including a copy of the desired PAN-OS software in the /content folder of the
    bootstrap volume.
    C. No, it must be updated by an administrator after the firewall starts.
    D. No, the firewall must be licensed first.
A

A. Yes, by including a copy of the desired PAN-OS software in the /software folder of the
bootstrap volume.