Q_251-275 Flashcards
Question #252 Topic 1
An organization’s administrator has the funds available to purchase more firewalls to increase the organization’s security posture.
The partner SE recommends placing the firewalls as close as possible to the resources that they protect.
Is the SE’s advice correct, and why or why not?
A. No. Firewalls provide new defense and resilience to prevent attackers at every stage of the cyberattack lifecycle, independent of placement.
B. Yes. Firewalls are session-based, so they do not scale to millions of CPS.
C. No. Placing firewalls in front of perimeter DDoS devices provides greater protection for sensitive devices inside the network.
D. Yes. Zone Protection profiles can be tailored to the resources that they protect via the configuration of specific device types and operating
systems.
Question #252 Topic 1
B. Yes. Firewalls are session-based, so they do not scale to millions of CPS.
Question #251 Topic 1
In a template, you can configure which two objects? (Choose two.)
A. Monitor profile
B. application group
C. SD-WAN path quality profile
D. IPsec tunnel
A. Monitor profile
D. IPsec tunnel
Question #253 Topic 1
DRAG DROP -
Match each GlobalProtect component to the purpose of that component.
Select and Place:
GP Portal mgt fn for GP Infra
GP Gateway sec enforcement for traffic fr GP Apps
GP App sw on endpoint that enable access to resources
GP Clientless - secure remote access to common web apps
Question #254 Topic 1
An administrator needs to validate that policies that will be deployed will match the appropriate rules in the device-group hierarchy.
Which tool can the administrator use to review the policy creation logic and verify that unwanted traffic is not allowed?
A. Preview Changes
B. Policy Optimizer
C. Managed Devices Health
D. Test Policy Match
D. Test Policy Match
Question #255 Topic 1
What is a key step in implementing WildFire best practices?
A. Configure the firewall to retrieve content updates every minute.
B. Ensure that a Threat Prevention subscription is active.
C. In a mission-critical network, increase the WildFire size limits to the maximum value.
D. n a security-first network, set the WildFire size limits to the minimum value.
B. Ensure that a Threat Prevention subscription is active.
Question #256 Topic 1
What happens when an A/P firewall cluster synchronizes IPsec tunnel security associations (SAs)?
A. Phase 2 SAs are synchronized over HA2 links.
B. Phase 1 and Phase 2 SAs are synchronized over HA2 links.
C. Phase 1 SAs are synchronized over HA1 links.
D. Phase 1 and Phase 2 SAs are synchronized over HA3 links.
A. Phase 2 SAs are synchronized over HA2 links.
Question #257 Topic 1
A security engineer needs to mitigate packet floods that occur on a set of servers behind the internet facing interface of the firewall.
Which Security Profile should be applied to a policy to prevent these packet floods?
A. Vulnerability Protection profile
B. DoS Protection profile
C. Data Filtering profile
D. URL Filtering profile
B. DoS Protection profile
Question #258 Topic 1
What are three reasons why an installed session can be identified with the “application incomplete” tag? (Choose three.)
A. There was no application data after the TCP connection was established.
B. The client sent a TCP segment with the PUSH flag set.
C. The TCP connection was terminated without identifying any application data.
D. There is not enough application data after the TCP connection was established.
E. The TCP connection did not fully establish.
A. There was no application data after the TCP connection was established.
C. The TCP connection was terminated without identifying any application data.
E. The TCP connection did not fully establish.
Incomplete means that either the three-way TCP handshake did not complete OR the three-way TCP handshake did complete but there was no enough data after the handshake to identify the application. In other words that traffic being seen is not really an application.
One example is, if a client sends a server a SYN and the Palo Alto Networks device creates a session for that SYN , but the server never sends a SYN ACK back to the client, then that session is incomplete.
Question #259 Topic 1
Which three statements correctly describe Session 380280? (Choose three.)
A. The application was initially identified as “ssl.”
B. The session has ended with the end-reason “unknown.”
C. The session cid not go through SSL decryption processing.
D. The application shifted to “web-browsing.”
E. The session went through SSL decryption processing.
A. The application was initially identified as “ssl.”
D. The application shifted to “web-browsing.”
E. The session went through SSL decryption processing.
Question #260 Topic 1
An administrator’s device-group commit push is failing due to a new URL category.
How should the administrator correct this issue?
A. update the Firewall Apps and Threat version to match the version of Panorama
B. change the new category action to “alert” and push the configuration again
C. ensure that the firewall can communicate with the URL cloud
D. verity that the URL seed tile has been downloaded and activated on the firewall
A. update the Firewall Apps and Threat version to match the version of Panorama
this issue happens when you are running an older Application and Threat version on Firewall as compared to the Panorama
Question #261 Topic 1
A security engineer needs firewall management access on a trusted interface. Which three settings are required on an SSL/TLS Service Profile to
provide secure
Web Ul authentication? (Choose three.)
A. Authentication Algorithm
B. Encryption Algorithm
C. Certificate
D. Maximum TLS version
E. Minimum TLS version
C. Certificate
D. Maximum TLS version
E. Minimum TLS version
Question #262 Topic 1
Which type of interface does a firewall use to forward decrypted traffic to a security chain for inspection?
A. Layer 3
B. Layer 2
C. Tap
D. Decryption Mirror
A. Layer 3
A firewall enabled as a decryption broker uses a pair of dedicated Layer 3 interfaces to forward decrypted traffic to a security chain for inspection.
The decryption forwarding interfaces must be assigned to a brand new virtual router
Question #263 Topic 1
An administrator cannot see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on
the firewall.
Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the NGFW to Panorama?
A
Log forwarding should be set!
Question #264 Topic 1
Which configuration task is best for reducing load on the management plane?
A. Enable session logging at start
B. Disable logging on the default deny rule
C. Set the URL filtering action to send alerts
D. Disable pre-defined reports
D. Disable pre-defined reports
Question #265 Topic 1
An engineer is in the planning stages of deploying User-ID in a diverse directory services environment. Which server OS platforms can be used for
server monitoring with User-ID?
A. Microsoft Active Directory, Red Hat Linux, and Microsoft Exchange
B. Microsoft Terminal Server, Red Hat Linux, and Microsoft Active Directory
C. Novell eDirectory, Microsoft Terminal Server, and Microsoft Active Directory
D. Microsoft Exchange, Microsoft Active Directory, and Novell eDirectory
D. Microsoft Exchange, Microsoft Active Directory, and Novell eDirectory
no RedHat nor terminal server