q_151-175 Flashcards
Question #151 Topic 1
Which is not a valid reason for receiving a decrypt-cert-validation error?
A. Unsupported HSM
B. Unknown certificate status
C. Client authentication
D. Untrusted issuer
A. Unsupported HSM
“Unsupported HSM” is not a valid reason for receiving a decrypt-cert-validation error
receiving the decrypt-cert-validation error is valid for the following conditions: expired, untrusted issuer, unknown
status, or status verification time-out.
Question #152 Topic 1
In the following image from Panorama, why are some values shown in red?
Device Name Logging rate Device Throughput Session
uk3 781(red) 209 4022`
sg2 0 953 170 (red)
us3 291(red) 0 67455
A. sg2 session count is the lowest compared to the other managed devices.
B. us3 has a logging rate that deviates from the administrator-configured thresholds.
C. uk3 has a logging rate that deviates from the seven-day calculated baseline.
D. sg2 has misconfigured session thresholds.
C. uk3 has a logging rate that deviates from the seven-day calculated baseline.
deviating metrics in red. A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation.
!!! OLD DEPRECATED Question #153 Topic 1
The firewall is not downloading IP addresses from MineMeld. Based on the image, what most likely is wrong?
A. A Certificate Profile that contains the client certificate needs to be selected.
B. The source address supports only files hosted with an ftp://<address/file>.
C. External Dynamic Lists do not support SSL connections.
D. A Certificate Profile that contains the CA certificate needs to be selected.
D. A Certificate Profile that contains the CA certificate needs to be selected.
Question #154 Topic 1
Which three split tunnel methods are supported by a GlobalProtect Gateway? (Choose three.)
A. video streaming application
B. Client Application Process
C. Destination Domain
D. Source Domain
E. Destination user/group
F. URL Category
A. video streaming application
B. Client Application Process
C. Destination Domain
Question #155 Topic 1
Which two are valid ACC GlobalProtect Activity tab widgets? (Choose two.)
A. Successful GlobalProtect Deployed Activity
B. GlobalProtect Deployment Activity
C. Successful GlobalProtect Connection Activity
D. GlobalProtect Quarantine Activity
B. GlobalProtect Deployment Activity
C. Successful GlobalProtect Connection Activity
B & C
NOTICE the word ACTIVITY in the Question. That removed the Quarantine option even though it is present. It is not an Activity widget
Question #156 Topic 1
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
A. log forwarding auto-tagging
B. XML API
C. GlobalProtect agent
D. User-ID Windows-based agent
A. log forwarding auto-tagging
B. XML API
Usernames can also be tagged and untagged by using the auto-tagging feature in a Log Forwarding Profile. You also can program another utility to invoke the PAN-OS XML API commands
to tag or untag usernames
Question #157 Topic 1
SD-WAN is designed to support which two network topology types? (Choose two.)
A. point-to-point
B. hub-and-spoke
C. full-mesh
D. ring
B. hub-and-spoke
C. full-mesh
Beginning with PAN-OS 10.0.3, SD-WAN supports a full mesh topology, in addition to the hub-spoke topology. The mesh can consist of branches with or without hubs. Use full mesh when the branches need to communicate with each other directly.
Question #158 Topic 1
Which option describes the operation of the automatic commit recovery feature?
A. It enables a firewall to revert to the previous configuration if rule shadowing is detected.
B. It enables a firewall to revert to the previous configuration if application dependency errors are found.
C. It enables a firewall to revert to the previous configuration if a commit causes HA partner connectivity failure.
D. It enables a firewall to revert to the previous configuration if a commit causes Panorama connectivity failure.
D. It enables a firewall to revert to the previous configuration if a commit causes Panorama connectivity failure.
Question #159 Topic 1
Which three items are important considerations during SD-WAN configuration planning? (Choose three.)
A. branch and hub locations
B. link requirements
C. the name of the ISP
D. IP Addresses
A. branch and hub locations
B. link requirements
D. IP Addresses
Question #160 Topic 1
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
A. on the App Dependency tab in the Commit Status window
B. on the Policy Optimizer’s Rule Usage page
C. on the Application tab in the Security Policy Rule creation window
D. on the Objects > Applications browser pages
A. on the App Dependency tab in the Commit Status window
C. on the Application tab in the Security Policy Rule creation window
Question #161 Topic 1
Which two events trigger the operation of automatic commit recovery? (Choose two.)
A. when an aggregate Ethernet interface component fails
B. when Panorama pushes a configuration
C. when a firewall performs a local commit
D. when a firewall HA pair fails over
B. when Panorama pushes a configuration
C. when a firewall performs a local commit
Question #162 Topic 1
Panorama provides which two SD-WAN functions? (Choose two.)
A. network monitoring
B. control plane
C. data plane
D. physical network links
A. network monitoring
B. control plane
SD-WAN separates the control and management processes from the underlying networking hardware, making them available as software that can
be easily configured and deployed. A centralized control pane means network administrators can write new rules and policies, and then configure
and deploy them across an entire network at once.
https://www.paloaltonetworks.com/cyberpedia/what-is-a-sd-wan
Question #163 Topic 1
Updates to dynamic user group membership are automatic therefore using dynamic user groups instead of static group objects allows you to:
A. respond to changes in user behaviour or potential threats using manual policy changes
B. respond to changes in user behaviour or potential threats without manual policy changes
C. respond to changes in user behaviour or potential threats without automatic policy changes
D. respond to changes in user behaviour and confirmed threats with manual policy changes
B. respond to changes in user behaviour or potential threats without manual policy changes
Because updates to dynamic user group membership are automatic, using dynamic user groups instead of static group objects allows you to respond to changes in user behavior or potential threats without manual policy changes.
Question #164 Topic 1
How can an administrator configure the firewall to automatically quarantine a device using GlobalProtect?
A. by adding the device’s Host ID to a quarantine list and configure GlobalProtect to prevent users from connecting to the GlobalProtect
gateway from a quarantined device
B. by exporting the list of quarantined devices to a pdf or csv file by selecting PDF/CSV at the bottom of the Device Quarantine page and
leveraging the appropriate XSOAR playbook
C. by using security policies, log forwarding profiles, and log settings
D. there is no native auto-quarantine feature so a custom script would need to be leveraged
C. by using security policies, log forwarding profiles, and log settings
You can automatically quarantine a device using a log forwarding profile with a security policy rule or HIP match log settings.
Question #165 Topic 1
To protect your firewall and network from single source denial of service (DoS) attacks that can overwhelm its packet buffer and cause legitimate
traffic to drop, you can configure:
A. PBP (Protocol Based Protection)
B. BGP (Border Gateway Protocol)
C. PGP (Packet Gateway Protocol)
D. PBP (Packet Buffer Protection)
D. PBP (Packet Buffer Protection)
Packet Buffer Protection defends your firewall and network from single session DoS attacks that can overwhelm the firewall’s packet buffer and cause legitimate traffic to drop. Although you don’t configure Packet Buffer Protection in a Zone Protection profile or in a DoS Protection profile or policy rule, Packet Buffer Protection defends ingress zones. While zone and DoS protection apply to new sessions (connections) and are granular, Packet Buffer Protection applies to existing sessions and is global.