Exam Domain 3 – Operate Flashcards
1
Q
131. A firewall can forward log events to which two types of log formats? (Choose two.) A. XES B. SNMP C. Http D. databases using xml format E. NCSA
A
B. SNMP
C. Http
2
Q
- How does a firewall forward log events to an external destination?
A. They are sent in batches at the frequency specified in the destination’s Server Profile.
B. They are queued and sent in batches at differing intervals depending on the event
severity.
C. They are sent as quickly as the required QoS policy rule governing log event traffic allows.
D. They are sent in real time as the firewall generates them.
A
D. They are sent in real time as the firewall generates them.
3
Q
- Which two firewall logs can be exported using the Scheduled Log Export function? (Choose
two.)
A. Configuration
B. System
C. Traffic
D. URL
A
C. Traffic
D. URL
4
Q
- Which filter finds all log entries for traffic that originates from the internal device whose IP
address is 172.17.1.3 and according to the header appears to be HTTP or HTTPS?
A. ( addr.src in 172.17.1.3 ) and ( ( port.dst eq 80 ) or ( port.dst eq 443 ) )
B. ( ( addr.src in 172.17.1.3 ) and ( port.dst eq 80 ) ) or ( port.dst eq 443 )
C. ( src.addr in 172.17.1.3 ) and ( ( dst.port eq 80 ) or ( dst.port eq 443 ) )
D. ( ( src.addr in 172.17.1.3 ) and ( dst.port eq 80 ) ) or ( dst. port eq 443 )
A
A. ( addr.src in 172.17.1.3 ) and ( ( port.dst eq 80 ) or ( port.dst eq 443 ) )
5
Q
- Which two log files would you use if you suspect that a rogue administrator is modifying
the firewall’s rulebase to allow and hide illicit traffic? (Choose two.)
A. Traffic
B. Threat
C. Data Filtering
D. Configuration
E. System
A
D. Configuration
E. System
6
Q
136. Which product is required to use event correlation? A. next-generation firewall, PA-220 B. Advanced Endpoint Protection C. Panorama D. GlobalProtect
A
C. Panorama
7
Q
- How would you configure the firewall to control access to a custom DNS application that operates differently from the standard DNS application?
A. You cannot do it with the next-generation firewall. You need to manually configure a
proxy.
B. Create specific rules for the sources and destinations that run this application.
C. Create a custom DNS application and add it to separate Security policy rules.
D. Create an Application Override policy and specify the sources and destinations that run
this application.
A
C. Create a custom DNS application and add it to separate Security policy rules.
8
Q
- What are two results of using Application Override policies? (Choose two.)
A. prevent matching traffic from entering VPN tunnels
B. apply a specified App-ID label to matching traffic
C. prevent matching traffic from being logged
D. cause matching traffic to bypass Content-ID processing
A
B. apply a specified App-ID label to matching traffic
D. cause matching traffic to bypass Content-ID processing
9
Q
139. Which two types of entities can have custom signatures? (Choose two.) A. services B. URL categories C. user groups D. applications E. vulnerabilities
A
D. applications
E. vulnerabilities
10
Q
140. Match the upgrade step description with the correct step number. Upgrade PAN-OS software Step ? Reboot the firewall Step ? Update dynamic content Step ? Activate subscription licenses Step ?
A
140. Match the upgrade step description with the correct step number. Upgrade PAN-OS software Step 3 Reboot the firewall Step 4 Update dynamic content Step 2 Activate subscription licenses Step 1
11
Q
141. Match each component with the order in which the component should be upgraded to a new version of PAN-OS software. HA active firewall Step ? Panorama Step ? Log Collector Step ? HA passive firewall Step ?
A
141. Match each component with the order in which the component should be upgraded to a new version of PAN-OS software. HA active firewall Step 4 Panorama Step 1 Log Collector Step 2 HA passive firewall Step 3
12
Q
- How do you upgrade an active/passive HA firewall pair to PAN-OS 10.0 while maintaining
internet access?
A. Upgrade the active firewall first, then the passive one.
B. Upgrade the passive firewall first, then the active one.
C. Run the upgrade on the active firewall. It will manage the process and upgrade the
passive firewall.
D. You must upgrade both members of the pair at the same time, which requires an
upgrade window that allows downtime.
A
B. Upgrade the passive firewall first, then the active one.
13
Q
143. What is the format of the firewall configuration files? A. YAML B. JSON C. XML D. CSV
A
C. XML
14
Q
- Which method can be used to restore the previous configuration when a new
configuration committed on a firewall has undesired consequences?
A. Use the Load configuration version to restore the previous configuration settings, and
follow with commit.
B. Use the Rollback commit link in the commit completion message.
C. Use the Import device state to restore the pre-commit configuration.
D. Use the Load named configuration snapshot to restore the previous configuration, and
follow with a commit.
A
A. Use the Load configuration version to restore the previous configuration settings, and
follow with commit.
15
Q
145. Which CLI command do you use to move a configuration file from an external server to a firewall’s local storage? A. rdist B. ssh C. scp D. rcp
A
C. scp