Q_451-475 Flashcards
Question #451 Topic 1
Which feature checks Panorama connectivity status after a commit?
A. HTTP Server profiles
B. Device monitoring data under Panorama settings
C. Automated commit recovery
D. Scheduled config export
C. Automated commit recovery
Question #452 Topic 1 /—grap[hic—/
“ : High-availability ha1-backup interface configuration requires a peer-ip-backup address to be configured(Module: ha_agent)”
What are two explanations for this type of issue? (Choose two.)
A. Either management or a data-plane interface is used as HA1-backup.
B. One of the firewalls has gone into the suspected state.
C. The peer IP is not included in the permit list on Management Interface Settings.
D. The Backup Peer HA1 IP Address was not configured when the commit was issued.
A. Either management or a data-plane interface is used as HA1-backup.
D. The Backup Peer HA1 IP Address was not configured when the commit was issued.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UmPCAU
Question #453 Topic 1
A network administrator wants to deploy SSL Forward Proxy decryption. What two attributes should a forward trust certificate have? (Choose
two.)
A. A certificate authority (CA) certificate
B. A private key
C. A server certificate
D. A subject alternative name
Question #453 Topic 1
A. A certificate authority (CA) certificate
B. A private key
Question #454 Topic 1
An administrator is assisting a security engineering team with a decryption rollout for inbound and forward proxy traffic. Incorrect firewall sizing is
preventing the team from decrypting all of the traffic they want to decrypt.
Which three items should be prioritized for decryption? (Choose three.)
A. Financial, health, and government traffic categories
B. Less-trusted internal IP subnets
C. Known malicious IP space
D. High-risk traffic categories
E. Public-facing servers
B. Less-trusted internal IP subnets
D. High-risk traffic categories
E. Public-facing servers
you would already block “known malicious IP space”
Question #455 Topic 1
During a laptop-replacement project, remote users must be able to establish a GlobalProtect VPN connection to the corporate network before
logging in to their new Windows 10 endpoints.
The new laptops have the 5.2.10 GlobalProtect Agent installed, so the administrator chooses to use the Connect Before Logon feature to solve
this issue.
What must be configured to enable the Connect Before Logon feature?
A. The Certificate profile in the GlobalProtect Portal Authentication Settings.
B. Registry keys on the Windows system.
C. The GlobalProtect Portal Agent App Settings Connect Method to Pre-logon then On-demand.
D. X-Auth Support in the GlobalProtect Gateway Tunnel Settings.
B. Registry keys on the Windows system.
from the gp release notes
Question #456 Topic 1
Using the above screenshot of the ACC, what is the best method to set a global filter, narrow down Blocked User Activity, and locate the user(s)
that could be compromised by a botnet?
A. Click the hyperlink for the ZeroAccess.Gen threat.
B. Click the source user with the highest threat count.
C. Click the left arrow beside the ZeroAccess.Gen threat.
D. Click the hyperlink for the botnet Threat Category.
D. Click the hyperlink for the botnet Threat Category.
other options not broad enough
Question #457 Topic 1
What is the best description of the Cluster Synchronization Timeout (min)?
A. The maximum interval between hello packets that are sent to verify that the HA functionality on the other firewall is operational
B. The maximum time that the local firewall waits before going to Active state when another cluster member is preventing the cluster from
fully synchronizing
C. The timeframe within which the firewall must receive keepalives from a cluster member to know that the cluster member is functional
D. The time that a passive or active-secondary firewall will wait before taking over as the active or active-primary firewall
B. The maximum time that the local firewall waits before going to Active state when another cluster member is preventing the cluster from fully synchronizing
rtfm baby - Cluster Synchronization Timeout (min)—Maximum number of minutes that the local firewall waits before going to Active state when another cluster member (for example, in unknown state) is preventing the cluster from fully synchronizing (range is 0 to 30; default is 0).
Question #458 Topic 1
Which two policy components are required to block traffic in real time using a dynamic user group (DUG)? (Choose two.)
A. A Decryption policy to decrypt the traffic and see the tag
B. A Deny policy with the “tag” App-ID to block the tagged traffic
C. An Allow policy for the initial traffic
D. A Deny policy for the tagged traffic
C. An Allow policy for the initial traffic
D. A Deny policy for the tagged traffic
You will need to configure at least two rules: one to allow initial traffic to populate the dynamic user group and one to deny traffic for the activity you want to prevent..
459 Topic 1
An administrator is receiving complaints about application performance degradation. After checking the ACC, the administrator observes that
there is an excessive amount of SSL traffic.
Which three elements should the administrator configure to address this issue? (Choose three.)
A. QoS on the egress interface for the traffic flows
B. QoS on the ingress interface for the traffic flows
C. A QoS profile defining traffic classes
D. A QoS policy for each application ID
E. An Application Override policy for the SSL traffic
A. QoS on the egress interface for the traffic flows
C. A QoS profile defining traffic classes
D. A QoS policy for each application ID
QOS is only on egress
ssl app override- not a thing
Question #460 Topic 1
An administrator creates a custom application containing Layer 7 signatures. The latest application and threat dynamic update is downloaded to
the same firewall. The update contains an application that matches the same traffic signatures as the custom application.
Which application will be used to identify traffic traversing the firewall?
A. Custom application
B. Unknown application
C. Downloaded application
D. Incomplete application
A. Custom application
Question #461 Topic 1
An administrator creates an application-based security policy rule and commits the change to the firewall.
Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)
A. Review the App Dependency application list from the Commit Status view.
B. Open the security policy rule and review the Depends On application list.
C. Reference another application group containing similar applications.
D. Use the show predefined xpath command and review the output.
A. Review the App Dependency application list from the Commit Status view.
B. Open the security policy rule and review the Depends On application list.
Question #462 Topic 1
An engineer is creating a template and wants to use variables to standardize the configuration across a large number of devices.
Which two variable types can be defined? (Choose two.)
A. IP netmask
B. Zone
C. Path group
D. FQDN
A. IP netmask
D. FQDN
Question #463 Topic 1
Users have reported an issue when they are trying to access a server on your network. The requests aren’t taking the expected route. You discover
that there are two different static routes on the firewall for the server.
What is used to determine which route has priority?
A. The first route installed
B. Bidirectional Forwarding Detection
C. The route with the lowest administrative distance
D. The route with the highest administrative distance
C. The route with the lowest administrative distance
Question #464 Topic 1
A company has configured GlobalProtect to allow their users to work from home. A decrease in performance for remote workers has been
reported during peak-use hours.
Which two steps are likely to mitigate the issue? (Choose two.)
A. Enable decryption
B. Exclude video traffic
C. Create a Tunnel Inspection policy
D. Block traffic that is not work-related
B. Exclude video traffic
D. Block traffic that is not work-related
Question #465 Topic 1
Which log type would provide information about traffic blocked by a Zone Protection profile?
A. Data Filtering
B. IP-Tag
C. Threat
D. Traffic
C. Threat