Q_26-50 Flashcards
//-img—/Question #26 Topic 1
If the firewall has the following link monitoring configuration, what will cause a failover?
A. ethernet1/3 and ethernet1/6 going down
B. ethernet1/3 going down
C. ethernet1/3 or ethernet1/6 going down
D. ethernet1/6 going down
Correct
A. ethernet1/3 and ethernet1/6 going down
/—-img—-/Question #27 Topic 1
In the image, what caused the commit warning?
A. The CA certificate for FWDtrust has not been imported into the firewall.
B. The FWDtrust certificate has not been flagged as Trusted Root CA.
C. SSL Forward Proxy requires a public certificate to be imported into the firewall.
D. The FWDtrust certificate does not have a certificate chain.
Correct
(cannot find copmplete chain for FWDTrusty image)
A. The CA certificate for FWDtrust has not been imported into the firewall.
Question #28 Topic 1
Which method does an administrator use to integrate all non-native MFA platforms in PAN-OS®ֲ software?
A. Okta
B. DUO
C. RADIUS
D. PingID
C. RADIUS
Question #29 Topic 1
How would an administrator monitor/capture traffic on the management interface of the Palo Alto Networks NGFW?
A. Use the debug dataplane packet-diag set capture stage firewall file command.
B. Enable all four stages of traffic capture (TX, RX, DROP, Firewall).
C. Use the debug dataplane packet-diag set capture stage management file command.
D. Use the tcpdump command.
D. Use the tcpdump command.
Question #30 Topic 1
An administrator needs to optimize traffic to prefer business-critical applications over non-critical applications.
QoS natively integrates with which feature to provide service quality?
A. Port Inspection
B. Certificate revocation
C. Content-ID
D. App-ID
D. App-ID
Question #31 Topic 1
A session in the Traffic log is reporting the application as incomplete.
What does incomplete
mean?
A. The three-way TCP handshake was observed, but the application could not be identified.
B. The three-way TCP handshake did not complete.
C. The traffic is coming across UDP, and the application could not be identified.
D. Data was received but was instantly discarded because of a Deny policy was applied before App-ID could be applied.
B. The three-way TCP handshake did not complete.
/—-img—-/Question #32 Topic 1
Refer to the exhibit.
An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the
application, where Host
A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
A. Untrust (Any) to Untrust (10.1.1.1), web-browsing ג€” Allow
B. Untrust (Any) to Untrust (10.1.1.1), ssh Allow
C. Untrust (Any) to DMZ (1.1.1.100), web-browsing ג€” Allow
D. Untrust (Any) to DMZ (1.1.1.100), ssh ג€” Allow
E. Untrust (Any) to DMZ (10.1.1.100, 10.1.1.101), ssh, web-browsing ג€” Allow
READ context and NAT rule at top…Public (prte-nat IPS are 1.1.1.100
C. Untrust (Any) to DMZ (1.1.1.100), web-browsing Allow
D. Untrust (Any) to DMZ (1.1.1.100), ssh Allow
/—img—/An administrator needs to determine why users on the trust zone cannot reach certain websites. The only information available is shown on the
following image.
Which configuration change should the administrator make?
A.
answer is BO form v9 exam - possilbe
changing site access to category gambling to allow…
Question #34 Topic 1
Which three settings are defined within the Templates object of Panorama? (Choose three.)
A. Setup
B. Virtual Routers
C. Interfaces
D. Security
E. Application Override
A. Setup
B. Virtual Routers
C. Interfaces
Question #35 Topic 1
A customer has an application that is being identified as unknown-tcp for one of their custom PostgreSQL database connections.
Which two configuration options can be used to correctly categorize their custom database application? (Choose two.)
A. Application Override policy.
B. Security policy to identify the custom application.
C. Custom application.
D. Custom Service object.
Choose two.)
A. Application Override policy.
C. Custom application.
Question #36 Topic 1
An administrator logs in to the Palo Alto Networks NGFW and reports that the WebUI is missing the Policies tab.
Which profile is the cause of the missing Policies tab?
A. Admin Role
B. WebUI
C. Authentication
D. Authorization
A. Admin Role
Question #37 Topic 1
An administrator has left a firewall to use the default port for all management services.
Which three functions are performed by the dataplane? (Choose three.)
A. WildFire updates
B. NAT
C. NTP
D. antivirus
E. file blocking
B. NAT
D. antivirus
E. file blocking
misdirection - dataplane vs mgt plane
Question #38 Topic 1
An administrator is using Panorama and multiple Palo Alto Networks NGFWs. After upgrading all devices to the latest PAN-OS®ֲ software, the
administrator enables log forwarding from the firewalls to Panorama. Pre-existing logs from the firewalls are not appearing in Panorama.
Which action would enable the firewalls to send their pre-existing logs to Panorama?
A. Use the import option to pull logs into Panorama.
B. A CLI command will forward the pre-existing logs to Panorama.
C. Use the ACC to consolidate pre-existing logs.
D. The log database will need to exported form the firewalls and manually imported into Panorama.
B. A CLI command will forward the pre-existing logs to Panorama.
CLI commands:
request logdb migrate-to-panorama start end-timestart-timetype
Question #39 Topic 1
A firewall just submitted a file to WildFire for analysis. Assume a 5-minute window for analysis. The firewall is configured to check for verdicts
every 5 minutes.
How quickly will the firewall receive back a verdict?
A. More than 15 minutes
B. 5 minutes
C. 10 to 15 minutes
D. 5 to 10 minutes
D. 5 to 10 minutes
/—-?—-/Question #40 Topic 1
What are the differences between using a service versus using an application for Security Policy match?
A. Use of aservice enables the firewall to take immediate action with the first observed packet based on port numbers. Use of an
application allows the firewall to take immediate action if the port being used is a member of the application standard port list.
B. There are no differences between service or application. Use of an pplication simplifies configuration by allowing use of a
friendly application name instead of port numbers.
C. Use of a service enables the firewall to take immediate action with the first observed packet based on port numbers. Use of an
application allows the firewall to take action after enough packets allow for App-ID identification regardless of the ports being used
D. Use of a service enables the firewall to take action after enough packets allow for App-ID identification
C. Use of a service enables the firewall to take immediate action with the first observed packet based on port numbers. Use of an
application allows the firewall to take action after enough packets allow for App-ID identification regardless of the ports being used