Q_351-375 Flashcards

1
Q

Question #351 Topic 1
What can be used to create dynamic address groups?
A. tags
B. FQDN addresses
C. dynamic address
D. region objects

A

A. tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question #352 Topic 1
A firewall administrator wants to avoid overflowing the company syslog server with traffic logs.
What should the administrator do to prevent the forwarding of DNS traffic logs to syslog?
A. Disable logging on security rules allowing DNS.
B. Go to the Log Forwarding profile used to forward traffic logs to syslog. Then, under traffic logs match list, create a new filter with application
not equal to DNS.
C. Go to the Log Forwarding profile used to forward traffic logs to syslog. Then, under traffic logs match list, create a new filter with application
equal to DNS.
D. Create a security rule to deny DNS traffic with the syslog server in the destination.

A

B. Go to the Log Forwarding profile used to forward traffic logs to syslog. Then, under traffic logs match list, create a new filter with application
not equal to DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question #353 Topic 1
An administrator has configured a pair of firewalls using high availability in Active/Passive mode.
Path Monitoring has been enabled with a Failure Condition of “any.”
A path group is configured with Failure Condition of “all” and contains a destination IP of 8.8.8.8 and 4.2.2.2 with a Ping Interval of 500ms and a
Ping count of 3.
Which scenario will cause the Active firewall to fail over?
A. IP address 8.8.8.8 is unreachable for 1 second.
B. IP addresses 8.8.8.8 and 4.2.2.2 are unreachable for 2 seconds.
C. IP address 4.2.2.2 is unreachable for 2 seconds.
D. IP addresses 8.8.8.8 and 4.2.2.2 are unreachable for 1 second.

A

B. IP addresses 8.8.8.8 and 4.2.2.2 are unreachable for 2 seconds.

Question says “AND”
500 ms x 3 1.5 sec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question #354 Topic 1
A firewall administrator has been tasked with ensuring that all Panorama configuration is committed and pushed to the devices at the end of the
day at a certain time.
How can they achieve this?
A. Use the Scheduled Config Export to schedule Commit to Panorama and also Push to Devices.
B. Use the Scheduled Config Push to schedule Commit to Panorama and also Push to Devices.
C. Use the Scheduled Config Push to schedule Push to Devices and separately schedule an API call to commit all Panorama changes.
D. Use the Scheduled Config Export to schedule Push to Devices and separately schedule an API call to commit all Panorama changes.

A

B. Use the Scheduled Config Push to schedule Commit to Panorama and also Push to Devices.

must push to PANORAMA first…

PUSH not export

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question #355 Topic 1
Which configuration is backed up using the Scheduled Config Export feature in Panorama?
A. Panorama running configuration and running configuration of all managed devices
B. Panorama candidate configuration
C. Panorama candidate configuration and candidate configuration of all managed devices.
D. Panorama running configuration

A

A. Panorama running configuration and running configuration of all managed devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question #356 Topic 1
While analyzing the Traffic log, you see that some entries show “unknown-tcp” in the Application column.
What best explains these occurrences?
A. A handshake did take place, but the application could not be identified.
B. A handshake took place, but no data packets were sent prior to the timeout.
C. A handshake did not take place, and the application could not be identified.
D. A handshake took place; however, there were not enough packets to identify the application.

A

A. A handshake did take place, but the application could not be identified.

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClibCAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question #357 Topic 1
You have upgraded Panorama to 10.2 and need to upgrade six Log Collectors.
When upgrading Log Collectors to 10.2, you must do what?
A. Upgrade the Log Collectors one at a time.
B. Add Panorama Administrators to each Managed Collector.
C. Upgrade all the Log Collectors at the same time.
D. Add a Global Authentication Profile to each Managed Collector.

A

C. Upgrade all the Log Collectors at the same time.

You must upgrade all Log Collectors in a collector group at the same time to avoid losing log data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question #358 Topic 1
A firewall administrator has been tasked with ensuring that all Panorama-managed firewalls forward traffic logs to Panorama.
In which section is this configured?
A. Templates > Device > Log Settings
B. Device Groups > Objects > Log Forwarding
C. Monitor > Logs > Traffic
D. Panorama > Managed Devices

A

B. Device Groups > Objects > Log Forwarding

The profile defines the destinations for Traffic, Threat, WildFire Submission, URL Filtering, Data Filtering, Tunnel and Authentication logs.
Select Objects > Log Forwarding, select the Device Group of the firewalls that will forward logs, and Add a profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question #359 Topic 1
An engineer is pushing configuration from Panorama to a managed firewall.
What happens when the pushed Panorama configuration has Address Object names that duplicate the Address Objects already configured on the
firewall?
A. The firewall ignores only the pushed objects that have the same name as the locally configured objects, and it will commit the rest of the
pushed configuration.
B. The firewall rejects the pushed configuration, and the commit fails.
C. The firewall fully commits all of the pushed configuration and overwrites its locally configured objects.
D. The firewall renames the duplicate local objects with “-1” at the end signifying they are clones; it will update the references to the objects
accordingly and fully commit the pushed configuration.

A

A. The firewall ignores only the pushed objects that have the same name as the locally configured objects, and it will commit the rest of the pushed configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question #360 Topic 1
Which Panorama feature protects logs against data loss if a Panorama server fails?
A. Panorama Collector Group with Log Redundancy ensures that no logs are lost if a server fails inside the Collector Group.
B. Panorama Collector Group automatically ensures that no logs are lost if a server fails inside the Collector Group.
C. Panorama HA with Log Redundancy ensures that no logs are lost if a server fails inside the HA Cluster.
D. Panorama HA automatically ensures that no logs are lost if a server fails inside the HA Cluster.

A

A. Panorama Collector Group with Log Redundancy ensures that no logs are lost if a server fails inside the Collector Group.

Enable log redundancy across collectors if you are adding multiple Log Collectors to a single Collector group.
Redundancy ensures that no logs are lost if any one Log Collector becomes unavailable. Each log will have two copies and each copy will reside on a different Log Collector. For example, if you have two Log Collectors in the collector group the log is written to both Log Collectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question #361 Topic 1
A network administrator troubleshoots a VPN issue and suspects an IKE Crypto mismatch between peers.
Where can the administrator find the corresponding logs after running a test command to initiate the VPN?
A. Traffic logs
B. System logs
C. Tunnel Inspection logs
D. Configuration logs

A

B. System logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question #362 Topic 1
An administrator is required to create an application-based Security policy rule to allow Evernote. The Evernote application implicitly uses SSL and
web browsing.
What is the minimum the administrator needs to configure in the Security rule to allow only Evernote?
A. Create an Application Override using TCP ports 443 and 80.
B. Add the HTPP, SSL, and Evernote applications to the same Security policy.
C. Add the Evernote application to the Security policy rule, then add a second Security policy rule containing both HTTP and SSL.
D. Add only the Evernote application to the Security policy rule.

A

D. Add only the Evernote application to the Security policy rule.

implicitly: depend on other applications but you don’t need to allow it.
explicitly: you need to allow the other application it depends on to work as expected [add it to the same rule.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question #363 Topic 1
Which Panorama mode should be used so that all logs are sent to, and only stored in, Cortex Data Lake?
A. Legacy
B. Management Only
C. Log Collector
D. Panorama

A

B. Management Only

eliminate any on-board logging - legacy,panorama..Loc collector turnd the panromaa into ONLY a log collector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question #364 Topic 1
A network administrator configured a site-to-site VPN tunnel where the peer device will act as initiator. None of the peer addresses are known.
What can the administrator configure to establish the VPN connection?
A. Use the Dynamic IP address type.
B. Enable Passive Mode.
C. Set up certificate authentication.
D. Configure the peer address as an FQDN.

A

A. Use the Dynamic IP address type.

Dynamic—Select this option if the peer IP address or FQDN value is unknown. When the peer IP address type is Dynamic, it is up to the peer to initiate the IKE gateway negotiation.” and

“Enable Passive Mode Click (NOT Cfg BS ques) to have the firewall only respond to IKE connections and never initiate them.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question #365 Topic 1
An administrator is seeing one of the firewalls in a HA active/passive pair moved to “suspended” state due to Non-functional loop.
Which three actions will help the administrator resolve this issue? (Choose three.)
A. Check the HA Link Monitoring interface cables.
B. Check High Availability > Active/Passive Settings > Passive Link State
C. Check the High Availability > Link and Path Monitoring settings.
D. Check the High Availability > HA Communications > Packet Forwarding settings.
E. Use the CLI command show high-availability flap-statistics

A

A. Check the HA Link Monitoring interface cables.

C. Check the High Availability > Link and Path Monitoring settings.

E. Use the CLI command show high-availability flap-statistics

TRICK —ivalid path —-High Availability > Active/Passive Settings > Passive Link State doesn’t exist on PAN ???

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question #366 Topic 1
Which CLI command is used to determine how much disk space is allocated to logs?
A. debug log-receiver show
B. show system info
C. show system logdb-quota
D. show logging-status

A

C. show system logdb-quota

17
Q

Question #367 Topic 1
An administrator has configured a pair of firewalls using high availability in Active/Passive mode.
Link and Path Monitoring is enabled with the Failure Condition set to any.
There is one link group configured containing member interfaces ethernet1/1 and ethernet1/2 with a Group Failure Condition set to all.
Which HA state will the Active firewall go into if ethernet1/1 link goes down due to a failure?
A. Active
B. Passive
C. Active-Secondary
D. Non-functional

A

A. Active\

18
Q

Question #368 Topic 1
Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall’s
management-plane resources are lightly utilized.
Given the size of this environment, which User-ID collection method is sufficient?
A. Windows-based agent deployed on each domain controller
B. PAN-OS integrated agent deployed on the firewall
C. a syslog listener
D. Citrix terminal server agent deployed on the network

A

B. PAN-OS integrated agent deployed on the firewall

19
Q

Question #369 Topic 1
Which statement best describes the Automated Commit Recovery feature?
A. It performs a connectivity check between the firewall and Panorama after every configuration commit on the firewall. It reverts the
configuration changes on the firewall if the check fails.
B. It restores the running configuration on a firewall if the last configuration commit fails.
C. It restores the running configuration on a firewall and Panorama if the last configuration commit fails.
D. It performs a connectivity check between the firewall and Panorama after every configuration commit on the firewall. It reverts the
configuration changes on the firewall and on Panorama if the check fails

A

A. It performs a connectivity check between the firewall and Panorama after every configuration commit on the firewall. It reverts the configuration changes on the firewall if the check fails.

ONLY the FW

admin guide-“When you enable automated commit recovery, the managed firewall configuration reverts and not the Panorama configuration.” https://docs.paloaltonetworks.com/panorama/10-2/panorama-admin/administer-panorama/enable-automated-commit-recovery

20
Q

Question #370 Topic 1
An engineer has been tasked with reviewing traffic logs to find applications the firewall is unable to identify with App-ID.
Why would the application field display as incomplete?
A. There is insufficient application data after the TCP connection was established.
B. The TCP connection was terminated without identifying any application data.
C. The TCP connection did not fully establish.
D. The client sent a TCP segment with the PUSH flag set.

A

C. The TCP connection did not fully establish.

91 % weird quesiton
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClibCAC

21
Q

Question #371 Topic 1
Which Security profile generates a packet threat type found in threat logs?
A. WildFire
B. Zone Protection
C. Anti-Spyware
D. Antivirus

A

Question #371 Topic 1
kwyworkd is “packet “threat type found in threat logs?

B. Zone Protection

22
Q

Question #372 Topic 1
What can an engineer use with GlobalProtect to assign user-specific client certificates to each GlobalProtect user?
A. SCEP
B. SSL/TLS Service profile
C. OCSP Responder
D. Certificate profile

A

A. SCEP

23
Q

Question #373 Topic 1
An engineer was tasked to simplify configuration of multiple firewalls with a specific set of configurations shared across all devices.
Which two advantages would be gained by using multiple templates in a stack? (Choose two.)
A. standardizes log-forwarding profiles for security policies across all stacks
B. defines a common standard template configuration for firewalls
C. inherits address-objects from the templates
D. standardizes server profiles and authentication configuration across all stacks

A

B. defines a common standard template configuration for firewalls

D. standardizes server profiles and authentication configuration across all stacks

24
Q

Question #374 Topic 1
A network engineer is troubleshooting a VPN and wants to verify whether the decapsulation/encapsulation counters are increasing.
Which CLI command should the engineer run?
A. Show running tunnel flow lookup
B. Show vpn flow name <tunnel>
C. Show vpn ipsec-sa tunnel <tunnel>
D. Show vpn tunnel name | match encap</tunnel></tunnel>

A

B. Show vpn flow name <tunnel></tunnel>

25
Q

Question #375 Topic 1
How would an administrator configure a Bidirectional Forwarding Detection profile for BGP after enabling the Advance Routing Engine run on PANOS
10.2?
A. create a BFD profile under Network > Routing > Routing Profiles > BFD and then select the BFD profile under Network > Virtual Router > BGP
> General > Global BFD Profile
B. create a BFD profile under Network > Routing > Routing Profiles > BFD and then select the BFD profile under Network > Routing > Logical
Routers > BGP > General > Global BFD Profile
C. create a BFD profile under Network > Network Profiles > BFD Profile and then select the BFD profile under Network > Virtual Router > BGP >
BFD
D. create a BFD profile under Network > Network Profiles > BFD Profile and then select the BFD profile under Network > Routing > Logical
Routers > BGP > BFD

A

B. create a BFD profile under Network > Routing > Routing Profiles > BFD and then select the BFD profile under Network > Routing > Logical Routers > BGP > General > Global BFD Profile