PCNSE#5 Flashcards
A company has a web server behind a Palo Alto Networks next-generation firewall that it wants to make accessible to the public at 1.1.1.1. The company has decided to configure a destination NAT Policy rule. Given the following zone information: *DMZ zone: DMZ-L3*Public zone: Untrust-L3*Guest zone: Guest-L3*Web server zone: Trust-L3*Public IP address (Untrust-L3): 1.1.1.1*Private IP address (Trust-L3): 192.168.1.50What should be configured as the destination zone on the Original Packet tab of NAT Policy rule? A. Untrust-L3 B. DMZ-L3 C. Guest-L3 D. Trust-L3
A. Untrust-L3
Firewall administrators cannot authenticate to a firewall GUI.Which two logs on that firewall will contain authentication-related information useful in troubleshooting this issue? (Choose two.)
A. ms log B. authd log C. System log D. Traffic log E. dp-monitor .log
B. authd log
C. System log
The firewall is not downloading IP addresses from MineMeld. Based, on the image, what most likely is wrong?
A. A Certificate Profile that contains the client certificate needs to be selected.
B. The source address supports only files hosted with an ftp://.
C. External Dynamic Lists do not support SSL connections.
D. A Certificate Profile that contains the CA certificate needs to be selected.
D. A Certificate Profile that contains the CA certificate needs to be selected.
Which three options are available when creating a security profile? (Choose three)
A. Anti-Malware B. File Blocking C. URL Filtering D. IDS/ISPE. Threat Prevention F. Antivirus
B. File Blocking
C. URL Filtering
F. Antivirus
Which Public Key infrastructure component is used to authenticate users for GlobalProtect when the Connect Method is set to pre-logon?
A. Certificate revocation list
B. Trusted root certificate
C. Machine certificate
D. Online Certificate Status Protocol
C. Machine certificate
A client is deploying a pair of PA-5000 series firewalls using High Availability (HA) in Active/Passive mode. Which statement is true about this deployment?
A. The two devices must share a routable floating IP address
B. The two devices may be different models within the PA-5000 series
C. The HA1 IP address from each peer must be on a different subnet
D. The management port may be used for a backup control connection
D. The management port may be used for a backup control connection
When is it necessary to activate a license when provisioning a new Palo Alto Networks firewall?
A. When configuring Certificate Profiles
B. When configuring GlobalProtect portal
C. When configuring User Activity Reports
D. When configuring Antivirus Dynamic Updates
D. When configuring Antivirus Dynamic Updates
The IT department has received complaints about VoIP call jitter when the sales staff is making or receiving calls. QoS is enabled on all firewall interfaces, but there is no QoS policy written in the rule base. The IT manager wants to find out what traffic is causing the jitter in real time when a user reports the jitter. Which feature can be used to identify, in real time, the applications taking up the most bandwidth?
A. QoS Statistics
B. Applications Report
C. Application Command Center (ACC)
D. QoS Log
A. QoS Statistics
An administrator sees several inbound sessions identified as unknown-tcp in the traffic logs. The administrator determines that these sessions are from external users accessing the company’s proprietary accounting application. The administrator wants to reliably identify this as their accounting application and to scan this traffic for threats. Which option would achieve this result?
A. Create an Application Override policy and a custom threat signature for the application
B. Create an Application Override policy
C. Create a custom App-ID and use the “ordered conditions” check box
D. Create a custom App ID and enable scanning on the advanced tab
D. Create a custom App ID and enable scanning on the advanced tab
A network security engineer is asked to provide a report on bandwidth usage. Which tab in the ACC provides the information needed to create the report? A. Blocked Activity B. Bandwidth Activity C. Threat Activity D. Network Activity
D. Network Activity
A company is upgrading its existing Palo Alto Networks firewall from version 7.0.1 to 7.0.4. Which three methods can the firewall administrator use to install PAN-OS 8.0.4 across the enterprise? (Choose three)
A. Download PAN-OS 8.0.4 files from the support site and install them on each firewall after manually uploading.
B. Download PAN-OS 8.0.4 to a USB drive and the firewall will automatically update after the USB drive is inserted in the firewall.
C. Push the PAN-OS 8.0.4 updates from the support site to install on each firewall.
D. Push the PAN-OS 8.0.4 update from one firewall to all of the other remaining after updating one firewall.
E. Download and install PAN-OS 8.0.4 directly on each firewall.
F. Download and push PAN-OS 8.0.4 from Panorama to each firewall.
A. Download PAN-OS 8.0.4 files from the support site and install them on each firewall after manually uploading.
C. Push the PAN-OS 8.0.4 updates from the support site to install on each firewall.
F. Download and push PAN-OS 8.0.4 from Panorama to each firewall.
Which Panorama feature allows for logs generated by Panorama to be forwarded to an external Security Information and Event Management (SIEM) system?
A. Panorama Log Settings
B. Panorama Log Templates
C. Panorama Device Group Log Forwarding
D. Collector Log Forwarding for Collector Groups
A. Panorama Log Settings
A critical US-CERT notification is published regarding a newly discovered botnet. The malware is very evasive and is not reliably detected by endpoint antivirus software. Furthermore, SSL is used to tunnel malicious traffic to command-and-control servers on the internet and SSL Forward Proxy Decryption is not enabled. Which component once enabled on a perimeter firewall will allow the identification of existing infected hosts in an environment?
A. Anti-Spyware profiles applied outbound security policies with DNS Query action set to sinkhole
B. File Blocking profiles applied to outbound security policies with action set to alert
C. Vulnerability Protection profiles applied to outbound security policies with action set to block
D. Antivirus profiles applied to outbound security policies with action set to alert
A. Anti-Spyware profiles applied outbound security policies with DNS Query action set to sinkhole
A Network Administrator wants to deploy a Large-Scale VPN solution. The Network Administrator has chosen a Global Protect Satellite solution. This configuration needs to be deployed to multiple remote offices and the Network Administrator decides to use Panorama to deploy the configurations. How should this be accomplished?
A. Create a Template with the appropriate IKE Gateway settings
B. Create a Template with the appropriate IPsec tunnel settings
C. Create a Device Group with the appropriate IKE Gateway settings
D. Create a Device Group with the appropriate IPsec tunnel settings
B. Create a Template with the appropriate IPsec tunnel settings
Which three log-forwarding destinations require a server profile to be configured? (Choose three) A. SNMP Trap B. Email C. RADIUS D. Kerberos E. Panorama F. Syslog
A. SNMP Trap
B. Email
F. Syslog
A host attached to ethernet1/3 cannot access the internet. The default gateway is attached to ethernet1/4. After troubleshooting. It is determined that traffic cannot pass from the ethernet1/3to ethernet1/4. What can be the cause of the problem?
A. DHCP has been set to Auto.
B. Interface ethernet1/3 is in Layer 2 mode and interface ethernet1/4 is in Layer 3 mode.
C. Interface ethernet1/3 and ethernet1/4 are in Virtual Wire Mode.
D. DNS has not been properly configured on the firewall
B. Interface ethernet1/3 is in Layer 2 mode and interface ethernet1/4 is in Layer 3 mode.
A firewall administrator has completed most of the steps required to provision a standalone Palo Alto Networks Next-Generation Firewall. As a final step, the administrator wants to test one of the security policies. Which CLI command syntax will display the rule that matches the test?
A. test security-policy-match source destination destination port protocol
B. show security rule source destination destination port protocol
C. test security rule source destination destination port protocol
D. show security-policy-match source destination destination port protocol
A. test security-policy-match source destination destination port protocol
An administrator is configuring an IPSec VPN to a Cisco ASA at the administrator’s home and experiencing issues completing the connection. the following is the output from the command:What could be the cause of this problem?
A. The dead peer detection settings do not match between the Palo Alto Networks Firewall and theASA
B. The Proxy IDs on the Palo Alto Networks Firewall do not match the setting on the ASA
C. The public IP addresses do not match for both the Palo Alto Networks Firewall and the ASA.
D. The shared secrets do not match between the Palo Alto Networks Firewall and the ASA.
C. The public IP addresses do not match for both the Palo Alto Networks Firewall and the ASA.
A network security engineer has been asked to analyze Wildfire activity. However, theWildfire Submissions item is not visible form the Monitor tab.What could cause this condition?
A. The firewall does not have an active WildFire subscription
B. The engineer’s account does not have permission to view WildFire Submissions
C. A policy is blocking WildFire Submission traffic
D. Though WildFire is working, there are currently no WildFire Submissions log entries.
B. The engineer’s account does not have permission to view WildFire Submissions
A company.com wants to enable Application Override. Given the following screenshot:Which two statements are true if Source and Destination traffic match the Application Override policy?(Choose two)
A. Traffic that matches “rtp-base” will bypass the App-ID and Content-ID engines
B. Traffic will be forced to operate over UDP Port 16384
C. Traffic utilizing UDP Port 16384 will now be identified as “rtp-base”
D. Traffic utilizing UDP Port 16384 will bypass the App-ID and Content-ID engines
C. Traffic utilizing UDP Port 16384 will now be identified as “rtp-base”
D. Traffic utilizing UDP Port 16384 will bypass the App-ID and Content-ID engines.