Exam Domain 5 – Core Concepts Flashcards
1
Q
- What is the correct order of evaluation between the Security policy and the NAT policy?
A. NAT policy evaluated, Security policy evaluated, NAT policy applied, Security policy
applied
B. NAT policy evaluated, NAT policy applied, Security policy evaluated, Security policy
applied
C. NAT policy evaluated, Security policy evaluated, Security policy applied, NAT policy
applied
D. Security policy evaluated, NAT evaluated, NAT policy applied, Security policy applied
A
C. NAT policy evaluated, Security policy evaluated, Security policy applied, NAT policy applied
2
Q
- Which two statements are true regarding firewall policy? (Choose two.)
A. All policy rules are evaluated, and the most specific rule will match.
B. Policy rules are evaluated from the top down, and the first rule matched processes the
traffic.
C. Interzone traffic is allowed by default.
D. Intrazone traffic is allowed by default.
E. Outbound traffic is allowed by default. Only inbound traffic is evaluated.
A
B. Policy rules are evaluated from the top down, and the first rule matched processes the traffic.
D. Intrazone traffic is allowed by default.
3
Q
- Which firewall operation order correct?
A. decryption, check allowed ports, App-ID identification, check Security policy
B. decryption, App-ID identification, check allowed ports, check Security policy
C. check allowed ports, decryption, App-ID identification, check Security policy
D. decryption, App-ID identification, check Security policy, check allowed ports
A
C. check allowed ports, decryption, App-ID identification, check Security policy
4
Q
178. Packet Buffer Protection defends against which type of denial-of-service attack? A. from distributed sessions B. from a single App-ID source C. from multiple App-ID sources D. from a single session
A
D. from a single session
5
Q
- Which defense is turned on when a Packet Buffer Protection event is detected?
A. SYN cookie management of attacking session traffic
B. Random Early Drop of packets from the attacking session
C. block all packets from the attacking session for the configured duration
D. block all packets from the attacking IP address for the configured duration
A
B. Random Early Drop of packets from the attacking session
6
Q
180. A URL Filtering Profile is part of which type of identification? A. App-ID B. Content-ID C. User-ID D. Service
A
B. Content-ID
7
Q
181. Which stage of the attack lifecycle is most likely to be stopped by dividing the network into separate security zones and enabling packet-based zone protection? A. Reconnaissance B. Execution C. Lateral movement D. Data exfiltration
A
A. Reconnaissance
8
Q
182. Which component can tell you if an attack is an APT or a broad attack designed to produce a botnet for future abuse? A. next-generation firewall B. WildFire C. MineMeld D. AutoFocus
A
D. AutoFocus
9
Q
183. User-ID maps users to which type of information? A. MAC addresses B. IP addresses C. IP address and port number D. port numbers
A
B. IP addresses
10
Q
184. User-ID uses which protocol to map between user identities and groups? A. NetBIOS B. LDAP C. syslog D. HTTPS
A
B. LDAP
11
Q
185. What format do you use when calling the API to inform the firewall of a new IP address-to- User-ID mapping? A. XML B. JSON C. YAML D. Base64
A
A. XML
12
Q
186. On a PA-7000 Series firewall, which management function runs on a separate, dedicated card? A. configuration management B. logging C. reporting D. management web service
A
B. logging
13
Q
- Do some next-generation firewall models use FPGA chips?
A. no, never
B. yes, on the data plane, but only on higher-end models
C. yes, on the management plane, but only on higher-end models
D. on both data the data plane and the management plane, but only on higher-end models
A
B. yes, on the data plane, but only on higher-end models
14
Q
188. Which function resides on the management plane? A. App-ID matching B. route lookup C. policy match D. logging
A
D. logging
15
Q
189. Which parameter is important for QoS policy match decisions? A. App-ID B. Content-ID C. User-ID D. Ingress interface
A
A. App-ID