Q_176-200 Flashcards
Question #186 Topic 1
When overriding a template configuration locally on a firewall, what should you consider?
A. Panorama will update the template with the overridden value.
B. The firewall template will show that it is out of sync within Panorama.
C. Only Panorama can revert the override.
D. Panorama will lose visibility into the overridden configuration.
D. Panorama will lose visibility into the overridden configuration.
Panorama cannot see the local configurations on the firewall.
Question #187 Topic 1
When setting up a security profile, which three items can you use? (Choose three.)
A. Wildfire analysis
B. anti-ransomware
C. antivirus
D. URL filtering
E. decryption profile
A. Wildfire analysis
C. antivirus
D. URL filtering
Question #188 Topic 1
An administrator wants to upgrade a firewall HA pair to PAN-OS 10.1. The firewalls are currently running PAN-OS 8.1.17. Which upgrade path
maintains synchronization of the HA session (and prevents network outage)?
A. Upgrade directly to the target major version.
B. Upgrade the HA pair to a base image.
C. Upgrade one major version at a time.
D. Upgrade two major versions at a time.
C. Upgrade one major version at a time.
Question #189 Topic 1
What are three types of Decryption Policy rules? (Choose three.)
A. SSL Inbound Inspection
B. SSH Proxy
C. SSL Forward Proxy
D. Decryption Broker
E. Decryption Mirror
A. SSL Inbound Inspection
B. SSH Proxy
C. SSL Forward Proxy
Question #190 Topic 1
During SSL decryption, which three factors affect resource consumption? (Choose three.)
A. key exchange algorithm
B. transaction size
C. TLS protocol version
D. applications ta non-standard ports
E. certificate issuer
A. key exchange algorithm
B. transaction size
C. TLS protocol version
The amount of SSL traffic you want to decrypt.
The TLS protocol version. Higher versions are more secure but consume more resources.
The key size. The larger the key size, t
The key exchange algorithm. PFS (DHE ECDHE) consume more than RSA_
The encryption algorithm
The certificate authentication method. RSA (not the RSA key exchange algorithm) consumes less resources than Elliptic Curve Digital Signature Algorithm (ECDSA) but ECDSA is more secure.
Question #191 Topic 1
An engineer must configure a new SSL decryption deployment.
Which profile or certificate is required before any traffic that matches an SSL decryption rule is decrypted?
A. A Decryption profile must be attached to the Decryption policy that the traffic matches.
B. There must be a certificate with both the Forward Trust option and Forward Untrust option selected.
C. A Decryption profile must be attached to the Security policy that the traffic matches.
D. There must be a certificate with only the Forward Trust option selected.
D. There must be a certificate with only the Forward Trust option selected.
a decryption profile is not needed.
Question #192 Topic 1
Which two features require another license on the NGFW? (Choose two.)
A. SSL Inbound Inspection
B. SSL Forward Proxy
C. Decryption Mirror
D. Decryption Broker
C. Decryption Mirror
D. Decryption Broker
Question #193 Topic 1
An administrator has a PA-820 firewall with an active Threat Prevention subscription. The administrator is considering adding a WildFire
subscription.
How does adding the WildFire subscription improve the security posture of the organization?
A. WildFire and Threat Prevention combine to minimize the attack surface.
B. After 24 hours, WildFire signatures are included in the antivirus update.
C. Protection against unknown malware can be provided in near real-time.
D. WildFire and Threat Prevention combine to provide the utmost security posture for the firewall.
C. Protection against unknown malware can be provided in near real-time.
fast signatures sent mimute 5 min etc.
Question #194 Topic 1
What are two characteristic types that can be defined for a variable? (Choose two.)
A. zone
B. FQDN
C. IP netmask
D. path group
B. FQDN
C. IP netmask
You can use variables to replace:
An IP address (includes IP Netmask, IP Range, and FQDN) in all areas of the configuration.
Question #195 Topic 1
A remote administrator needs access to the firewall on an untrust interface. Which three options would you configure on an Interface Management
profile to secure management access? (Choose three.)
A. Permitted IP Addresses
B. SSH
C. https
D. User-ID
E. HTTP
A. Permitted IP Addresses
B. SSH
C. https
Question #196 Topic 1
An administrator needs to troubleshoot a User-ID deployment. The administrator believes that there is an issue related to LDAP authentication.
The administrator wants to create a packet capture on the management plane.
Which CLI command should the administrator use to obtain the packet capture for validating the configuration?
A. > scp export mgmt-pcap from mgmt.pcap to (username@host:path)
B. > scp export poap-mgmt from poap.mgmt to (username@host:path)
C. > ftp export mgmt-pcap from mgmt.pcap to <FTF>
D. > scp export pcap from pcap to (username@host:path)</FTF>
A. > scp export mgmt-pcap from mgmt.pcap to (username@host:path)
SCP or TFTP, ONLY
> scp export mgmt-pcap from mgmt.pcap to
<value> Destination (username@host:path)
or
> tftp export mgmt-pcap from mgmt.pcap to
<value> tftp host
</value></value>
Question #197 Topic 1
When you configure an active/active high availability pair, which two links can you use? (Choose two.)
A. HA3
B. Console Backup
C. HSCI-C
D. HA2 backup
old q Pick bad ones out..
A. HA3
D. HA2 backup
Each firewall needs a dedicated interface for the HA3 link.
HA2 backup (not exact)
But Console and HSCI-C is wrong
Question #198 Topic 1
What are two common reasons to use a “No Decrypt” action to exclude traffic from SSL decryption? (Choose two.)
A. the web server requires mutual authentication
B. the website matches a category that is not allowed for most users
C. the website matches a high-risk category
D. the website matches a sensitive category
A. the web server requires mutual authentication
D. the website matches a sensitive category
Question #199 Topic 1
PBF can address which two scenarios? (Choose two.)
A. routing FTP to a backup ISP link to save bandwidth on the primary ISP link
B. providing application connectivity the primary circuit fails
C. enabling the firewall to bypass Layer 7 inspection
D. forwarding all traffic by using source port 78249 to a specific egress interface
A. routing FTP to a backup ISP link to save bandwidth on the primary ISP link
B. providing application connectivity the primary circuit fails
PBF does NOT parse src ports
Question #200 Topic 1
A firewall should be advertising the static route 10.2.0.0/24 into OSPF. The configuration on the neighbour is correct, but the route is not in the
neighbour’s routing table.
Which two configurations should you check on the firewall? (Choose two.)
A. Ensure that the OSPF neighbour state is “2-Way”
B. In the OSPF configuration, ensure that the correct redistribution profile is selected in the OSPF Export Rules section.
C. Within the redistribution profile ensure that Redist is selected.
D. In the redistribution profile check that the source type is set to “ospf.”
B. In the OSPF configuration, ensure that the correct redistribution profile is selected in the OSPF Export Rules section.
C. Within the redistribution profile ensure that Redist is selected.