q_101-125 Flashcards

1
Q

Question #101 Topic 1
Which three user authentication services can be modified to provide the Palo Alto Networks NGFW with both usernames and role names? (Choose
three.)
A. TACACS+
B. Kerberos
C. PAP
D. LDAP
E. SAML
F. RADIUS

A

A. TACACS+
E. SAML
F . RADIUS

The administrative accounts are DEFINED on an external SAML, TACACS+, or RADIUS server. The server performs both authentication and
authorization. For authorization, you define Vendor-Specific Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML attributes on the SAML
server. PAN-OS maps the attributes to administrator roles, access domains, user groups, and virtual systems that you define on the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question #102 Topic 1
What is exchanged through the HA2 link?
A. hello heartbeats
B. User-ID information
C. session synchronization
D. HA state information

A

C. session synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question #103 Topic 1
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?
A. Both SSH keys and SSL certificates must be generated.
B. No prerequisites are required.
C. SSH keys must be manually generated.
D. SSL certificates must be generated.
Correct

A

B. No prerequisites are required.

Configuring SSH Proxy does not require certificates and the key used to decrypt SSH sessions is generated automatically on the firewall during
boot up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question #104 Topic 1
A customer wants to combine multiple Ethernet interfaces into a single virtual interface using link aggregation.
Which two formats are correct for naming aggregate interfaces? (Choose two.)
A. ae.8
B. aggregate.1
C. ae.1
D. aggregate.8

A

A. ae.8

C. ae.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question #105 Topic 1
Which three authentication factors does PAN-OS®ֲ software support for MFA? (Choose three.)
A. Push
B. Pull
C. Okta Adaptive
D. Voice
E. SMS

A

A. Push

D. Voice
E. SMS

Push – An endpoint device (such as a phone or tablet) prompts the user to allow or deny authentication.

Short message service (SMS) – An SMS message on the endpoint device prompts the user to allow or deny authentication. In some cases, the endpoint device provides a code that the user must enter in the MFA login page.

Voice – An automated phone call prompts the user to authenticate by pressing a key on the phone or entering a code in the MFA login page.

One-time password (OTP) – An endpoint device provides an automatically generated alphanumeric string, which the user enters in the MFA login page to enable authentication for a single transaction or session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question #106 Topic 1
VPN traffic intended for an administrator’s firewall is being maliciously intercepted and retransmitted by the interceptor.
When creating a VPN tunnel, which protection profile can be enabled to prevent this malicious behavior?
A. Zone Protection
B. Replay
C. Web Application
D. DoS Protection

A

B. Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question #107 Topic 1
Which Zone Pair and Rule Type will allow a successful connection for a user on the Internet zone to a web server hosted on the DMZ zone? The
web server is reachable using a Destination NAT policy in the Palo Alto Networks firewall.

A

B

Zone Pair
Src Z Internet dst zone DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question #108 Topic 1
An administrator has configured a QoS policy rule and a QoS Profile that limits the maximum allowable bandwidth for the YouTube application.
However, YouTube is consuming more than the maximum bandwidth allotment configured.
Which configuration step needs to be configured to enable QoS?
A. Enable QoS interface
B. Enable QoS in the Interface Management Profile
C. Enable QoS Data Filtering Profile
D. Enable QoS monitor

A

A. Enable QoS interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question #109 Topic 1
Which log file can be used to identify SSL decryption failures?
A. Traffic
B. ACC
C. Configuration
D. Threats

A

A. Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question #110 Topic 1
A customer wants to set up a site-to-site VPN using tunnel interfaces.
Which two formats are correct for naming tunnel interfaces? (Choose two.)
A. tunnel.1
B. vpn-tunnel.1
C. tunnel.1025
D. vpn-tunnel.1024

A

A. tunnel.1

C. tunnel.1025

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question #111 Topic 1
Based on the following image, what is the correct path of root, intermediate, and end-user certificate?

Cert path graphic show Verisign->Symantec->*.paloalonetworks

A. Palo Alto Networks > Symantec > VeriSign
B. VeriSign > Symantec > Palo Alto Networks
C. Symantec > VeriSign > Palo Alto Networks
D. VeriSign > Palo Alto Networks > Symantec

A

B. VeriSign > Symantec > Palo Alto Networks

it s a tree, dummy !!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question #112 Topic 1
An administrator wants a new Palo Alto Networks NGFW to obtain automatic application updates daily, so it is configured to use a scheduler for
the application database. Unfortunately, they required the management network to be isolated so that it cannot reach the Internet.
Which configuration will enable the firewall to download and install application updates automatically?
A. Download and install application updates cannot be done automatically if the MGT port cannot reach the Internet.
B. Configure a service route for Palo Alto Networks Services that uses a dataplane interface that can route traffic to the Internet, and create a
Security policy rule to allow the traffic from that interface to the update servers if necessary.
C. Configure a Policy Based Forwarding policy rule for the update server IP address so that traffic sourced from the management interfaced
destined for the update servers goes out of the interface acting as your Internet connection.
D. Configure a Security policy rule to allow all traffic to and from the update servers.

A

B. Configure a service route for Palo Alto Networks Services that uses a dataplane interface that can route traffic to the Internet, and create a Security policy rule to allow the traffic from that interface to the update servers if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question #113 Topic 1
A company wants to install a NGFW firewall between two core switches on a VLAN trunk link. They need to assign each VLAN to its own zone and
to assign untagged (native) traffic to its own zone.
Which option differentiates multiple VLANs into separate zones?
A. Create V-Wire objects with two V-Wire interfaces and define a range of ג €0-4096 ג € in the ג€Tag Allowed ג€ field of the V-Wire object.
B. Create V-Wire objects with two V-Wire subinterfaces and assign only a single VLAN ID to the ג€Tag Allowed ג€ field of the V-Wire object.
Repeat for every additional VLAN and use a VLAN ID of 0 for untagged traffic. Assign each interface/subinterface to a unique zone.
C. Create Layer 3 subinterfaces that are each assigned to a single VLAN ID and a common virtual router. The physical Layer 3 interface would
handle untagged traffic. Assign each interface/subinterface to a unique zone. Do not assign any interface an IP address.
D. Create VLAN objects for each VLAN and assign VLAN interfaces matching each VLAN ID. Repeat for every additional VLAN and use a VLAN
ID of 0 for untagged traffic. Assign each interface/subinterface to a unique zone.

A

B. Create V-Wire objects with two V-Wire subinterfaces and assign only a single VLAN ID to the “Tag Allowed” field of the V-Wire object.
Repeat for every additional VLAN and use a VLAN ID of 0 for untagged traffic. Assign each interface/subinterface to a unique zone.

!!! Key is seperate into it’s own zone…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question #114 Topic 1
Which data flow describes redistribution of user mappings?
A. User-ID agent to firewall
B. Domain Controller to User-ID agent
C. User-ID agent to Panorama
D. firewall to firewall

A

D. firewall to firewall

user-id redistribution is a Palo term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question #115 Topic 1
Where can an administrator see both the management plane and data plane CPU utilization in the WebUI?
A. System Utilization log
B. System log
C. Resources widget
D. CPU Utilization widget

A

C. Resources widget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question #116 Topic 1
Which four NGFW multi-factor authentication factors are supported by PAN-OS®ֲ? (Choose four.)
A. Short message service
B. Push
C. User logon
D. Voice
E. SSH key
F. One-Time Password

A

A. Short message service
B. Push

D. Voice

F. One-Time Password

userlogon and SSH keys are NOT MFA

17
Q

Question #117 Topic 1
Which two features does PAN-OS®ֲ software use to identify applications? (Choose two.)
A. transaction characteristics
B. session number
C. port number
D. application layer payload

A

A. transaction characteristics

D. application layer payload

18
Q

Question #118 Topic 1
An administrator wants to upgrade a firewall from PAN-OS®ֲ 9.1 to PAN-OS®ֲ 10.0. The firewall is not a part of an HA pair.
What needs to be updated first?
A. Applications and Threats
B. XML Agent
C. WildFire
D. PAN-OS Upgrade Agent

A

A. Applications and Threats

19
Q

Question #119 Topic 1
When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?
A. Load configuration version
B. Save candidate config
C. Export device state
D. Load named configuration snapshot

A

C. Export device state

20
Q

Question #120 Topic 1
Which two settings can be configured only locally on the firewall and not pushed from a Panorama template or template stack? (Choose two.)
A. HA1 IP Address
B. Master Key
C. Zone Protection Profile
D. Network Interface Type

A

A. HA1 IP Address
B. Master Key

21
Q

Question #121 Topic 1
An administrator just submitted a newly found piece of spyware for WildFire analysis. The spyware passively monitors behavior without the user’s knowledge.
What is the expected verdict from WildFire?
A. Malware
B. Grayware
C. Phishing
D. Spyware

A

B. Grayware

( Spyware is not one of wildfire verdict)
Benign—sample is safe and does not exhibit malicious behavior.

Grayware—The sample does not pose a direct security threat, but might display otherwise obtrusive behavior. Grayware typically includes adware, spyware, and Browser Helper Objects (BHOs).

Phishing—The link directs users to a phishing site and poses a security threat. Phishing sites are sites that attackers disguise as legitimate websites with the aim to steal user information, especially corporate passwords that unlock access to your network. The WildFire appliance does not support the phishing verdict and continues to classify these types of links as malicious.

Malicious—The sample is malware and poses a security threat. Malware can include viruses, worms, Trojans, Remote Access Tools (RATs), rootkits, and botnets. For files identified as malware, signatures are generated and distributed to prevent against future exposure to the threat.

22
Q

Question #122 Topic 1
When configuring the firewall for packet capture, what are the valid stage types?
A. receive, management, transmit, and non-syn
B. receive, management, transmit, and drop
C. receive, firewall, send, and non-syn
D. receive, firewall, transmit, and drop

A

D. receive, firewall, transmit, and drop

23
Q

Question #123 Topic 1
Which operation will impact the performance of the management plane?
A. DoS protection
B. WildFire submissions
C. generating a SaaS Application report
D. decrypting SSL sessions

A

C. generating a SaaS Application report

24
Q

Question #124 Topic 1
Which User-ID method maps IP addresses to usernames for users connecting through a web proxy that has already authenticated the user?
A. syslog listening
B. server monitoring
C. client probing
D. port mapping

A

A. syslog listening

25
Q

Question #125 Topic 1
The firewall determines if a packet is the first packet of a new session or if a packet is part of an existing session using which kind of match?
A. 6-tuple match: Source IP Address, Destination IP Address, Source Port, Destination Port, Protocol, and Source Security Zone
B. 5-tuple match: Source IP Address, Destination IP Address, Source Port, Destination Port, Protocol
C. 7-tuple match: Source IP Address, Destination IP Address, Source Port, Destination Port, Source User, URL Category, and Source Security
Zone
D. 9-tuple match: Source IP Address, Destination IP Address, Source Port, Destination Port, Source User, Source Security Zone, Destination
Security Zone, Application, and URL Category

A

A. 6-tuple match: Source IP Address, Destination IP Address, Source Port, Destination Port, Protocol, and Source Security Zone

On a Palo Alto Networks firewall, a session is defined by two uni-directional flows each uniquely identified by a 6-tuple key: source-address, destination-address, source-port, destination-port, protocol, and security-zone.