Exam II Flashcards

1
Q

A Security policy rule displayed in italic font indicates which condition about the rule?

A

disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Server Profile enables a firewall to locate a server that provides which type of service?

A

remote user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In an Antivirus Security Profile, WildFire actions enable you to configure the firewall to perform which operation?

A

block traffic when a WildFire virus signature is detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An Interface Management Profile can be attached to which two interface types?

A

Layer 3

Loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

App-ID running on a firewall identifies applications using which three methods? (Choose three.)

A
  1. ) program heuristics
  2. ) application signatures
  3. ) known protocol decoders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application block pages can be enabled for which types of applications?

A

web-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Because a firewall examines every packet in a session, a firewall can detect application ________?

A

shifts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The presence of URLs matched to the not-resolved URL category in the URL Filtering log file might indicate that you should take which action?

A

Validate connectivity to the PAN-DB cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For which firewall feature should you create forward trust certificates and forward untrust certificates?

A

SSL Forward Proxy decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Security policy rule in a destination NAT configuration should be written to match which type of address and zone?

A

original pre-NAT source and destination addresses, but the post-NAT destination zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two actions does a firewall take when a Security Profile’s action is configured as Reset Server?

A
  1. ) The traffic responder is reset.

2. ) For UDP sessions, the connection is dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In an HA configuration, which three functions are associated with the HA1 Control Link?

A
  1. ) exchanging hellos
  2. ) exchanging heartbeats
  3. ) synchronizing configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In an HA configuration, which two failure detection methods rely on ICMP ping?

A

heartbeats

path groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL Inbound Inspection requires that the firewall be configured with which two components?

A

server’s private key

servers digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The firewall acts as a proxy for which two types of traffic?

A

SSH

SSH outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Threat log records events from which three Security profiles?

A

Anti-virus
Anti-spyware
Vulnerability Protection

17
Q

If there is an HA configuration mismatch between firewalls during peer negotiation, which state does the passive firewall enter?

A

NON-FUNCTIONAL

18
Q

Which two separate firewall planes comprise the PAN-OS architecture?

A
  1. ) control or management plane

2. ) data plane

19
Q

What are two benefits of attaching a Decryption Profile to a Decryption policy no decrypt rule?

A
  1. ) expired certificate checking

2. ) un-trusted certificate checking

20
Q

What is the result of performing a firewall Commit operation?

A

The candidate configuration becomes the running configuration.

21
Q

Which action in a File Blocking Security Profile results in the user being prompted to verify a file transfer?

A

Continue

22
Q

Which interface type does not require any configuration changes to adjacent network devices?

A

Virtual Wire

23
Q

Which interface type is not assigned to a security zone?

A

High-Availability (HA)

24
Q

Which statement describes a function provided by an Interface Management Profile?

A

It determines what firewall services are accessible FROM external devices.

25
Q

Which three objects can be sent to WildFire for analysis?

A

email attachment
URL links found in email
files traversing the firewall

26
Q

Which user mapping method is recommended for a highly mobile user base?

A

GlobalProtect (GP)

27
Q

Which file must be downloaded from the firewall to create a Heatmap and Best Practices Assessment report?

A

Tech Support File

28
Q

GlobalProtect clientless VPN provides secure remote access to web applications that use which three technologies?

A

Ruby
HTML
JavaScript (JS)

29
Q

Which three subscription services are included as part of GlobalProtect cloud service?

A

WildFire
URL Filtering
Threat Prevention

30
Q

What is the maximum number of WildFire appliances that can be grouped into a WildFire appliance cluster?

A

20

31
Q

Which statement is true about firewall HTTP header insertion?

A

applied only to egress packets

32
Q

Which two statements are true about sessions on the firewall?

A
  1. ) Return traffic is allowed.

2. ) FW matches network packets to an existing session ID.

33
Q

Which three MGT port configuration settings must be configured before you can remotely access the web interface?

A

netmask
IP address
default gateway

34
Q

Which statement is true about a URL Filtering Profile’s continue password?

A

There is a single, per-firewall password.