Q_476-500 Flashcards
Question #476 Topic 1
A Security policy rule is configured with a Vulnerability Protection Profile and an action of “Deny”.
Which action will this configuration cause on the matched traffic?
A. It will cause the firewall to deny the matched sessions. Any configured Security Profiles have no effect if the Security policy rule action is
set to “Deny”.
B. The configuration will allow the matched session unless a vulnerability signature is detected. The “Deny” action will supersede the perseverity
defined actions defined in the associated Vulnerability Protection Profile.
C. It will cause the firewall to skip this Security policy rule. A warning will be displayed during a commit.
D. The Profile Settings section will be grayed out when the Action is set to “Deny”.
A. It will cause the firewall to deny the matched sessions. Any configured Security Profiles have no effect if the Security policy rule action is
set to “Deny”.
Question #477 Topic 1
Which feature detects the submission of corporate login information into website forms?
A. App-ID
B. File Blocking profile
C. Data Filtering profile
D. Credential Phishing
D. Credential Phishing
Question #478 Topic 1
Which three firewall multi-factor authentication factors are supported by PAN-OS? (Choose three.)
A. Short message service
B. Push
C. User logon
D. One-Time Password
E. SSH key
A. Short message service
B. Push
D. One-Time Password
Question #479 Topic 1
An administrator needs to identify which NAT policy is being used for internet traffic.
From the GUI of the firewall, how can the administrator identify which NAT policy is in use for a traffic flow?
A. From the Monitor tab, click Traffic view and review the information in the detailed log view.
B. From the Monitor tab, click Traffic view, ensure that the Source or Destination NAT columns are included and review the information in the
detailed log view.
C. From the Monitor tab, click App Scope > Network Monitor and filter the report for NAT rules.
D. From the Monitor tab, click Session Browser and review the session details.
D. From the Monitor tab, click Session Browser and review the session details.
Question #480 Topic 1
Which three external services perform both authentication and authorization for administration of firewalls? (Choose three.)
A. Kerberos
B. TACACS+
C. SAML
D. Radius
E. LDAP
B. TACACS+
C. SAML
D. Radius
Question #481 Topic 1
A firewall administrator has been tasked with ensuring that all firewalls forward System logs to Panorama.
In which section is this configured?
A. Monitor > Logs > System
B. Objects > Log Forwarding
C. Device > Log Settings
D. Panorama > Managed Devices
C. Device > Log Settings
Question #482 Topic 1
A customer would like to support Apple Bonjour in their environment for ease of configuration.
Which type of interface in needed on their PA-3200 Series firewall to enable Bonjour Reflector in a segmented network?
A. Virtual Wire interface
B. Layer 3 interface
C. Layer 2 interface
D. Loopback interface
B. Layer 3 interface
keyword : segmented
Question #483 Topic 1
An engineer is bootstrapping a VM-Series Firewall. Other than the /config folder, which three directories are mandatory as part of the bootstrap
package directory structure? (Choose three.)
A. /plugins
B. /license
C. /opt
D. /content
E. /software
B. /license
D. /content
E. /software
Question #484 Topic 1
A company requires the firewall to block expired certificates issued by internet-hosted websites. The company plans to implement decryption in
the future, but it does not perform SSL Forward Proxy decryption at this time.
Without the use of SSL Forward Proxy decryption, how is the firewall still able to identify and block expired certificates issued by internet-hosted
websites?
A. By having a Certificate profile that contains the website’s Root CA assigned to the respective Security policy rule
B. By using SSL Forward Proxy to decrypt SSL and TLS handshake communication and the server/client session keys in order to validate a
certificate’s authenticity and expiration
C. By using SSL Forward Proxy to decrypt SSL and TLS handshake communication in order to validate a certificates authenticity and expiration
D. By having a Decryption profile that blocks sessions with expired certificates in the No Decryption section and assigning it to a No Decrypt
policy rule
D. By having a Decryption profile that blocks sessions with expired certificates in the No Decryption section and assigning it to a No Decrypt policy rule
Question #485 Topic 1
A company is looking to increase redundancy in their network.
Which interface type could help accomplish this?
A. Tap
B. Layer 2
C. Virtual wire
D. Aggregate ethernet
D. Aggregate ethernet
Question #486 Topic 1
An auditor has requested that roles and responsibilities be split inside the security team. Group A will manage templates, and Group B will
manage device groups inside Panorama.
Which two specific firewall configurations will Group B manage? (Choose two.)
A. Routing
B. Security rules
C. Interfaces
D. Address objects
B. Security rules
D. Address objects
Question #487 Topic 1
An engineer is deploying VoIP and needs to ensure that voice traffic is treated with the highest priority on the network.
Which QoS priority should be assigned to such an application?
A. Medium
B. Low
C. High
D. Real-time
D. Real-time
Question #488 Topic 1
A network security administrator wants to enable Packet-Based Attack Protection in a Zone Protection profile.
What are two valid ways to enable Packet-Based Attack Protection? (Choose two.)
A. TCP Drop
B. ICMP Drop
C. SYN Random Early Drop
D. TCP Port Scan Block
A. TCP Drop
B. ICMP Drop
Question #489 Topic 1 /—graphic—/
Given the following snippet of a WildFire submission log, did the end-user get access to the requested information and why or why not?
A. No, because this is an example from a defeated phishing attack.
B. Yes, because the action is set to “allow”
C. No, because the severity is “high” and the verdict “malicious”
D. Yes, because the action is set to “alert”
B. Yes, because the action is set to “allow”
Question #490 Topic 1
The decision to upgrade to PAN-OS 10.2 has been approved. The engineer begins the process by upgrading the Panorama servers, but gets an
error when trying to install.
When performing an upgrade on Panorama to PAN-OS 10.2, what is the potential cause of a failed install?
A. GlobalProtect agent version
B. Outdated plugins
C. Management only mode
D. Expired certificates
B. Outdated plugins