PCNSE#4 Flashcards
A network administrator uses Panorama to push security polices to managed firewalls at branch offices. Which policy type should be configured on Panorama if the administrators at the branch office sites to override these products? A. Pre Rules B. Post Rules C. Explicit Rules D. Implicit Rules
A. Pre Rules
Given the following table. Which configuration change on the firewall would cause it to use 10.66.24.88 as the next hop for the 192.168.93.0/30 network?
A. Configuring the administrative Distance for RIP to be lower than that of OSPF Int.
B. Configuring the metric for RIP to be higher than that of OSPF Int.
C. Configuring the administrative Distance for RIP to be higher than that of OSPF Ext.
D. Configuring the metric for RIP to be lower than that OSPF Ext.
A. Configuring the administrative Distance for RIP to be lower than that of OSPF Int.
Which Zone Pair and Rule Type will allow a successful connection for a user on the internetzone to a web server hosted in the DMZ zone? The web server is reachable using a destination Natpolicy in the Palo Alto Networks firewall.
A. Zone Pair: Source Zone: Internet Destination Zone: DMZ Rule Type: intrazone
B. Internet Destination Zone: DMZ Rule Type: Interzone or “universal”
C. Zone Pair: Source Zone: Internet Destination Zone: Internet Rule Type: intrazone or “universal”
D. Zone Pair: Source Zone: Internet Destination Zone: Internet Rule Type: intrazone
B. Internet Destination Zone: DMZ Rule Type: Interzone or “universal”(samo sam prepravio intra u interzone)
What are three possible verdicts that WildFire can provide for an analyzed sample? (Choose three) A. Clean B. Bengin C. Adware D. Suspicious E. Grayware F. Malware
B. Bengin
E. Grayware
F. Malware
Which two mechanisms help prevent a spilt brain scenario an Active/Passive High Availability (HA) pair? (Choose two)
A. Configure the management interface as HA3 Backup
B. Configure Ethernet 1/1 as HA1 Backup
C. Configure Ethernet 1/1 as HA2 Backup
D. Configure the management interface as HA2 Backup
E. Configure the management interface as HA1 Backup
F. Configure ethernet1/1 as HA3 Backup
B. Configure Ethernet 1/1 as HA1 Backup
E. Configure the management interface as HA1 Backup
Click the Exhibit button an administrator has noticed a large increase in BitTorrent activity. The administrator wants to determine where the traffic is going on the company. What would be the administrator’s next step?
A. Right-Click on the BitTorrent link and select Value from the context menu
B. Create a global filter for BitTorrent traffic and then view Traffic logs.
C. Create local filter for BitTorrent traffic and then view Traffic logs.
D. Click on the BitTorrent application link to view network activity
D. Click on the BitTorrent application link to view network activity
Which CLI command displays the current management plane memory utilization?
A. > debug management-server show
B. > show running resource-monitor
C. > show system info
D. > show system resources
D. > show system resources
How does Panorama handle incoming logs when it reaches the maximum storage capacity?
A. Panorama discards incoming logs when storage capacity full.
B. Panorama stops accepting logs until licenses for additional storage space are applied
C. Panorama stops accepting logs until a reboot to clean storage space.
D. Panorama automatically deletes older logs to create space for new ones.
D. Panorama automatically deletes older logs to create space for new ones.
. Refer to Exhibit: A firewall has three PDF rules and a default route with a next hop of 172.29.19.1 that is configured in the default VR. A user named XX-bes a PC with a 192.168.101.10 IP address. He makes an HTTPS connection to 172.16.10.29.What is the next hop IP address for the HTTPS traffic from Wills PC.
A. 172.20.30.1
B. 172.20.20.1
C. 172.20.10.1
D. 172.20.40.1
B. 172.20.20.1
Which two options are required on an M-100 appliance to configure it as a Log Collector? (Choose two)
A. From the Panorama tab of the Panorama GUI select Log Collector mode and then commit changes
B. Enter the command request system system-mode logger then enter Y to confirm the change toLog Collector mode.
C. From the Device tab of the Panorama GUI select Log Collector mode and then commit changes.
D. Enter the command logger-mode enable the enter to confirm the change to Log Collector mode.
E. Log in the Panorama CLI of the dedicated Log Collector
B. Enter the command request system system-mode logger then enter Y to confirm the change toLog
E. Log in the Panorama CLI of the dedicated Log Collector
Which two actions are required to make Microsoft Active Directory users appear in a firewall traffic log? (Choose two.)
A. Run the User-ID Agent using an Active Directory account that has “event log viewer” permissions
B. Enable User-ID on the zone object for the destination zone
C. Run the User-ID Agent using an Active Directory account that has “domain administrator” permissions
D. Enable User-ID on the zone object for the source zone
E. Configure a RADIUS server profile to point to a domain controller
A. Run the User-ID Agent using an Active Directory account that has “event log viewer” permissions
D. Enable User-ID on the zone object for the source zone
An Administrator is configuring an IPSec VPN toa Cisco ASA at the administrator’s home and experiencing issues completing the connection. The following is the output from the command:less mp-log ikemgr.log: What could be the cause of this problem?
A. The public IP addresses do not match for both the Palo Alto Networks Firewall and the ASA.
B. The Proxy IDs on the Palo Alto Networks Firewall do not match the settings on the ASA.
C. The shared secrets do not match between the Palo Alto firewall and the ASA
D. The deed peer detection settings do not match between the Palo Alto Networks Firewall and the ASA
B. The Proxy IDs on the Palo Alto Networks Firewall do not match the settings on the ASA.
Which option is an IPv6 routing protocol? A. RIPv3 B. OSPFv3 C. OSPv3 D. BGP NG
B. OSPFv3
What can missing SSL packets when performing a packet capture on data plane interfaces?
A. The packets are hardware offloaded to the offloaded processor on the data plane
B. The missing packets are offloaded to the management plane CPU
C. The packets are not captured because they are encrypted
D. There is a hardware problem with offloading FPGA on the management plane
A. The packets are hardware offloaded to the offloaded processor on the data plane
Which two features does PAN-OS software use to identify applications? (Choose two) A. port number B. session number C. transaction characteristics D. application layer payload
C. transaction characteristics
D. application layer payload
What are two prerequisites for configuring a pair of Palo Alto Networks firewalls in an active/passive High Availability (HA) pair? (Choose two.)
A. The firewalls must have the same set of licenses.
B. The management interfaces must to be on the same network.
C. The peer HA1 IP address must be the same on both firewalls.
D. HA1 should be connected to HA1. Either directly or with an intermediate Layer 2 device
A. The firewalls must have the same set of licenses.
D. HA1 should be connected to HA1. Either directly or with an intermediate Layer 2 device
Which Security Policy Rule configuration option disables antivirus and anti-spyware scanning of server-to-client flows only?
A. Disable Server Response Inspection
B. Apply an Application Override
C. Disable HIP Profile
D. Add server IP Security Policy exception
A. Disable Server Response Inspection
In an enterprise deployment, a network security engineer wants to assign to a group ofadministrators without creating local administrator accounts on the firewall.Which authentication method must be used?
A. LDAP
B. Kerberos
C. Certification based authentication
D. RADIUS with Vendor-Specific Attributes
D. RADIUS with Vendor-Specific Attributes
A network design calls for a “router on a stick” implementation with a PA-5060 performing inter-VLAN routing All VLAN-tagged traffic will be forwarded to the PA-5060 through a single dot1qtrunk interface Which interface type and configuration setting will support this design?
A. Trunk interface type with specified tag
B. Layer 3 interface type with specified tag
C. Layer 2 interface type with a VLAN assigned
D. Layer 3 sub interface type with specified tag
D. Layer 3 sub interface type with specified tag
Only two Trust to Untrust allow rules have been created in the Security policy Rule1 allows google-based Rule2 allows YouTube-base the YouTube-base App-ID depends on google-base to function. The google-base App-ID implicitly uses SSL and web-browsing. When user tries to access https://www.youtube.com in a web browser, they get an error indicating that the server cannot be found. Which action will allow YouTube.com display in the browser correctly?
A. Add SSL App-ID to Rule1
B. Create an additional Trust to Untrust Rule, add the web-browsing, and SSL App-ID’s to it
C. Add the DNS App-ID to Rule2
D. Add the Web-browsing App-ID to Rule2
A. Add SSL App-ID to Rule1