q_201-225 Flashcards
Question #201 Topic 1
Which value in the Application column indicates UDP traffic that did not match an App-ID signature?
A. unknown-udp
B. unknown-ip
C. incomplete
D. not-applicable
A. unknown-udp
Question #202 Topic 1
What are three valid qualifiers for a Decryption Policy Rule match? (Choose three.)
A. App-ID
B. Custom URL Category
C. User-ID
D. Destination Zone
E. Source Interface
B. Custom URL Category
C. User-ID
D. Destination Zone
BCD. There no App-ID or Source Interface options for decryption policy.
A. App-ID (not decrypted ??)
E. Source Interface (not a field in rule)
Question #203 Topic 1
An administrator needs to gather information about the CPU utilization on both the management plane and the data plane.
Where does the administrator view the desired data?
A. Resources Widget on the Dashboard
B. Monitor > Utilization
C. Support > Resources
D. Application Command and Control Center
A. Resources Widget on the Dashboard
Question #204 Topic 1
Which CLI command displays the physical media that are connected to ethernet1/8?
A. > show system state filter-pretty sys.s1.p8.stats
B. > show system state filter-pretty sys.s1.p8.med
C. > show interface ethernet1/8
D. > show system state filter-pretty sys.s1.p8.phy
D. > show system state filter-pretty sys.s1.p8.phy
Question #205 Topic 1
A variable name must start with which symbol?
A. $
B. !
C. #
D. &
A. $
$$$$$$
Question #206 Topic 1
Given the following configuration, which route is used for destination 10.10.0.4? set network virtual-router 2 routing-table ip static-route “
Route 1” nexthop ip-address 192.168.1.2 set network virtual-router 2 routing-table ip static-route “Route 1” metric 30 set network virtual-router 2 routingtable ip static-route “Route 1” destination 10.10.0.0/24 set network virtual-router 2 routing-table ip static-route “Route 1” re route-table unicast
set network virtual-router 2 routing-table ip static-route “Route 2” nexthop ip-address 192.168.1.2 set network virtual-router 2 routing-table ip staticroute
“Route 2” metric 20 set network virtual-router 2 routing-table ip static-route “Route 2” destination 10.10.0.0/24 set network virtual-router 2 routing-table ip static-route “Route 2” route-table unicast
set network virtual-router 2 routing-table ip static-route “Route 3” nexthop ip-address 10.10.20.1 set network virtual-router 2 routing-table ip static-route “Route 3” metric 5 set network virtual-router 2 routing-table ip static-route “Route 3” destination 0.0.0.0/0 set network virtual-router 2 routing-table ip static-route “Route 3” route-table unicast set network virtual-router 2 routing-table ip static-route
“Route 4” nexthop ip-address 192.168.1.2 set network virtual-router 2 routing-table ip static-route “Route 4” metric 10 set network virtual-router 2 routing-table ip static-route “Route 4” destination 10.10.1.0/25 set network virtual-router 2 routing-table ip static-route “Route 4” route-table unicast
A. Route 1
B. Route 3
C. Route 2
D. Route 4
C. Route 2
Longest mask first, then lowest metric is longest mask is concurrent.
Question #207 Topic 1
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose two.)
A. self-signed CA certificate
B. server certificate
C. wildcard server certificate
D. client certificate
E. enterprise CA certificate
A. self-signed CA certificate
E. enterprise CA certificate
Question #208 Topic 1
An administrator plans to deploy 15 firewalls to act as GlobalProtect gateways around the world. Panorama will manage the firewalls.
The firewalls will provide access to mobile users and act as edge locations to on-premises infrastructure. The administrator wants to scale the
configuration out quickly and wants all of the firewalls to use the same template configuration.
Which two solutions can the administrator use to scale this configuration? (Choose two.)
A. virtual systems
B. template stacks
C. variables
D. collector groups
B. template stacks
C. variables
Template Variables allow you to assign a dynamic value in a template configuration you can overwrite later in a template stack.
This can be particularly useful for IPv4 addresses you do not know value when configuring a template.
The IPv4 template variable can be referenced in different parts of the template configuration like in Global Protect configuration.
Question #209 Topic 1
Which three statements accurately describe Decryption Mirror? (Choose three.)
A. Decryption, storage, inspection, and use of SSL traffic regulated in certain countries.
B. You should consult with your corporate counsel before activating and using Decryption Mirror in a production environment.
C. Decryption Mirror requires a tap interface on the firewall.
D. Only management consent is required to use the Decryption Mirror future.
E. Use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information that is
submitted via an encrypted channel.
A. Decryption, storage, inspection, and use of SSL traffic regulated in certain countries.
B. You should consult with your corporate counsel before activating and using Decryption Mirror in a production environment.
E. Use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information that is submitted via an encrypted channel
- the decryption, storage, inspection, and/or use of SSL traffic is governed in certain countries and
- user consent might be required in order to use the decryption mirror feature.
- Additionally, use of this feature could enable malicious users with administrative access to the firewall to harvest usernames, passwords, social
security numbers, credit card numbers, or other sensitive information submitted using an encrypted channel. - Palo Alto Networks recommends that you consult with your corporate counsel before activating and using this feature in a production environment.
Question #210 Topic 1
As a best practice, which URL category should you target first for SSL decryption?
A. Health and Medicine
B. High Risk
C. Online Storage and Backup
D. Financial Services
B. High Risk
Question #211 Topic 1
Which User-ID mapping method should be used in a high-security environment where all IP address-to-user mappings should always be explicitly known?
A. LDAP Server Profile configuration
B. GlobalProtect
C. Windows-based User-ID agent
D. PAN-OS integrated User-ID agent
B. GlobalProtect
Question #212 Topic 1
DRAG DROP -
Below are the steps in the workflow for creating a Best Practice Assessment in a firewall and Panorama configuration. Place the steps in order.
Select and Place:
Step 1. In either the NGFW or in Panorama, on the Operations/Support tab, download the technical support file.
Step 2. Log in to the Customer Support Portal (CSP) and navigate to Tools > Best Practice Assessment.
Step 3. Upload or drag and drop the technical support file.
Step 4. Map the zone type and area of the architecture to each zone.
Step 5.Follow the steps to download the BPA report bundle.
Question #213 Topic 1
DRAG DROP -
Place the steps in the WildFire process workflow in their correct order.
Select and Place:
wf upload
static analysis
wf uses heuristic
wf generates new sigs
WUP-AN-HE-GsnSig
Question #214 Topic 1
In a Panorama template, which three types of objects are configurable? (Choose three.)
A. certificate profiles
B. HIP objects
C. QoS profiles
D. security profiles
E. interface management profiles
A. certificate profiles
C. QoS profiles
E. interface management profiles
keyword “template”
Question #215 Topic 1
An internal system is not functioning. The firewall administrator has determined that the incorrect egress interface is being used. After looking at
the configuration, the administrator believes that the firewall is not using a static route.
What are two reasons why the firewall might not use a static route? (Choose two.)
A. duplicate static route
B. no install on the route
C. disabling of the static route
D. path monitoring on the static route
B. no install on the route
D. path monitoring on the static route