Exam II Flashcards

1
Q

A Security policy rule displayed in italic font indicates which condition about the rule?

A

disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Server Profile enables a firewall to locate a server that provides which type of service?

A

remote user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In an Antivirus Security Profile, WildFire actions enable you to configure the firewall to perform which operation?

A

block traffic when a WildFire virus signature is detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An Interface Management Profile can be attached to which two interface types?

A

Layer 3

Loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

App-ID running on a firewall identifies applications using which three methods? (Choose three.)

A
  1. ) program heuristics
  2. ) application signatures
  3. ) known protocol decoders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application block pages can be enabled for which types of applications?

A

web-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Because a firewall examines every packet in a session, a firewall can detect application ________?

A

shifts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The presence of URLs matched to the not-resolved URL category in the URL Filtering log file might indicate that you should take which action?

A

Validate connectivity to the PAN-DB cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For which firewall feature should you create forward trust certificates and forward untrust certificates?

A

SSL Forward Proxy decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Security policy rule in a destination NAT configuration should be written to match which type of address and zone?

A

original pre-NAT source and destination addresses, but the post-NAT destination zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two actions does a firewall take when a Security Profile’s action is configured as Reset Server?

A
  1. ) The traffic responder is reset.

2. ) For UDP sessions, the connection is dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In an HA configuration, which three functions are associated with the HA1 Control Link?

A
  1. ) exchanging hellos
  2. ) exchanging heartbeats
  3. ) synchronizing configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In an HA configuration, which two failure detection methods rely on ICMP ping?

A

heartbeats

path groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL Inbound Inspection requires that the firewall be configured with which two components?

A

server’s private key

servers digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The firewall acts as a proxy for which two types of traffic?

A

SSH

SSH outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Threat log records events from which three Security profiles?

A

Anti-virus
Anti-spyware
Vulnerability Protection

17
Q

If there is an HA configuration mismatch between firewalls during peer negotiation, which state does the passive firewall enter?

A

NON-FUNCTIONAL

18
Q

Which two separate firewall planes comprise the PAN-OS architecture?

A
  1. ) control or management plane

2. ) data plane

19
Q

What are two benefits of attaching a Decryption Profile to a Decryption policy no decrypt rule?

A
  1. ) expired certificate checking

2. ) un-trusted certificate checking

20
Q

What is the result of performing a firewall Commit operation?

A

The candidate configuration becomes the running configuration.

21
Q

Which action in a File Blocking Security Profile results in the user being prompted to verify a file transfer?

22
Q

Which interface type does not require any configuration changes to adjacent network devices?

A

Virtual Wire

23
Q

Which interface type is not assigned to a security zone?

A

High-Availability (HA)

24
Q

Which statement describes a function provided by an Interface Management Profile?

A

It determines what firewall services are accessible FROM external devices.

25
Which three objects can be sent to WildFire for analysis?
email attachment URL links found in email files traversing the firewall
26
Which user mapping method is recommended for a highly mobile user base? 
GlobalProtect (GP)
27
Which file must be downloaded from the firewall to create a Heatmap and Best Practices Assessment report? 
Tech Support File
28
GlobalProtect clientless VPN provides secure remote access to web applications that use which three technologies?
Ruby HTML JavaScript (JS)
29
Which three subscription services are included as part of GlobalProtect cloud service?
WildFire URL Filtering Threat Prevention
30
What is the maximum number of WildFire appliances that can be grouped into a WildFire appliance cluster?
20
31
Which statement is true about firewall HTTP header insertion?
applied only to egress packets
32
Which two statements are true about sessions on the firewall?
1. ) Return traffic is allowed. | 2. ) FW matches network packets to an existing session ID.
33
Which three MGT port configuration settings must be configured before you can remotely access the web interface?
netmask IP address default gateway
34
Which statement is true about a URL Filtering Profile’s continue password?
There is a single, per-firewall password.