Q_551-579 Flashcards
Question #551 Topic 1
Which operation will impact the performance of the management plane?
A. Enabling DoS protection
B. Enabling packet buffer protection
C. Decrypting SSL sessions
D. Generating a Saas Application report
D. Generating a Saas Application report
Question #552 Topic 1
Which type of policy in Palo Alto Networks firewalls can use Device-ID as a match condition?
A. Tunnel inspection
B. NAT
C. QoS
D. DOS protection
C. QoS
Device ID – IOT
Question #579 Topic 1
“First shalt thou take out the Holy Pin. Then shalt thou count to three, no more no less. Three shalt be the number thou shalt count, and the number of the counting shalt be three. Four shalt thou not count, neither count thou two, excepting that thou then proceed to three. Five is right out. Once the number three, being the third number, be reached, then lobbest thou thy Holy Hand Grenade of Antioch towards thou foe, who being naughty in my sight, shall snuff it.” – Monk
So on what count did they throw the Holy Hand Grenade ?
A. one
B. four
C. three
D. two
E. five
A. one
B. four
C. three
D. two
E. five
Question #553 Topic 1
Why would a traffic log list an application as “not-applicable”?
A. There was not enough application data after the TCP connection was established.
B. The TCP connection terminated without identifying any application data.
C. The firewall denied the traffic before the application match could be performed.
D. The application is not a known Palo Alto Networks App-ID.
C. The firewall denied the traffic before the application match could be performed.
Not-applicable means that the Palo Alto device has received data that will be discarded because the port or service that the traffic is coming in on is not allowed, or there is no rule or policy allowing that port or service.
For example, if there was only one rule on the Palo Alto device and that rule allowed the application of web-browsing only on port/service 80, and traffic (web-browsing or any other application) is sent to the Palo Alto device on any other port/service besides 80, then the traffic is discarded or dropped and you’ll see sessions with “not-applicable” in the application field.
Question #554 Topic 1
What must be configured to apply tags automatically based on User-ID logs?
A. Device ID
B. Log settings
C. Group mapping
D. Log Forwarding profile
B. Log settings
For User-ID, GlobalProtect, and IP-Tag logs, configure the log settings
.
NOT Log Forwarding profile(For Authentication, Data, Threat, Traffic, Tunnel Inspection, URL, and WildFire logs, create a log forwarding profile)
Question #555 Topic 1
A firewall engineer creates a NAT rule to translate IP address 1.1.1.10 to 192.168.1.10. The engineer also plans to enable DNS rewrite so that the
firewall rewrites the IPv4 address in a DNS response based on the original destination IP address and translated destination IP address configured
for the rule. The engineer wants the firewall to rewrite a DNS response of 1.1.1.10 to 192.168.1.10.
What should the engineer do to complete the configuration?
A. Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Forward.
B. Create a U-Turn NAT to translate the destination IP address 1.1.1.10 to 192.168.1.10 with the destination port equal to UDP/53.
C. Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Reverse.
D. Create a U-Turn NAT to translate the destination IP address 192.168.1.10 to 1.1.1.10 with the destination port equal to UDP/53.
A. Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Forward.
if it matches the translate A to B, then DNS rewrite A to B (same) therefore FOREWARD
If A to B translates, and rewrite B to A, then its REVERSE
Question #556 Topic 1
An engineer is monitoring an active/active high availability (HA) firewall pair.
Which HA firewall state describes the firewall that is experiencing a failure of a monitored path?
A. Initial
B. Passive
C. Active-secondary
D. Tentative
D. Tentative
a/a Tentative state
-Failure of a firewall.
-Failure of a monitored object (a link or path).
-The firewall leaves suspended or non-functional state.
557 Topic 1
You are auditing the work of a co-worker and need to verify that they have matched the Palo Alto Networks Best Practices for Anti-Spyware
Profiles.
For which three severity levels should single-packet captures be enabled to meet the Best Practice standard? (Choose three.)
A. Critical
B. High
C. Medium
D. Informational
E. Low
A. Critical
B. High
C. Medium
firewall detects a medium, high, or critical severity threat, and enables single packet capture
why take PCAPS on Low or Info??
Question #558 Topic 1
In the New App Viewer under Policy Optimizer, what does the compare option for a specific rule allow an administrator to compare?
A. Applications configured in the rule with their dependencies
B. The security rule with any other security rule selected
C. Applications configured in the rule with applications seen from traffic matching the same rule
D. The running configuration with the candidate configuration of the firewall
C. Applications configured in the rule with applications seen from traffic matching the same rule
Question #560 Topic 1
Which two factors should be considered when sizing a decryption firewall deployment? (Choose two.)
A. Number of security zones in decryption policies
B. Encryption algorithm
C. TLS protocol version
D. Number of blocked sessions
B. Encryption algorithm
C. TLS protocol version
Question #562 Topic 1
An engineer configures a new template stack for a firewall that needs to be deployed. The template stack should consist of four templates
arranged according to the diagram.
Which template values will be configured on the firewall if each template has an SSL/TLS Service profile configured named Management?
A. Values in Global Settings
B. Values in Datacenter
C. Values in efw01ab.chi
D. Values in Chicago
C. Values in efw01ab.chi
Question #563 Topic 1
An administrator configures two VPN tunnels to provide for failover and uninterrupted VPN service.
What should an administrator configure to enable automatic failover to the backup tunnel?
A. Replay Protection
B. Zone Protection
C. Tunnel Monitor
D. Passive Mode
C. Tunnel Monitor
Question #564 Topic 1
An administrator configures a site-to-site IPsec VPN tunnel between a PA-850 and an external customer on their policy-based VPN devices.
What should an administrator configure to route interesting traffic through the VPN tunnel?
A. Proxy IDs
B. ToS Header
C. GRE Encapsulation
D. Tunnel Monitor
A. Proxy IDs
Question #565 Topic 1
A firewall engineer creates a new App-ID report under Monitor > Reports > Application Reports > New Applications to monitor new applications on
the network and better assess any Security policy updates the engineer might want to make.
How does the firewall identify the New App-ID characteristic?
A. It matches to the New App-IDs downloaded in the last 90 days.
B. It matches to the New App-IDs in the most recently installed content releases.
C. It matches to the New App-IDs downloaded in the last 30 days.
D. It matches to the New App-IDs installed since the last time the firewall was rebooted.
B. It matches to the New App-IDs in the most recently installed content releases.
Question #566 Topic 1
An engineer is monitoring an active/active high availability (HA) firewall pair.
Which HA firewall state describes the firewall that is currently processing traffic?
A. Passive
B. Initial
C. Active
D. Active-primary
D. Active-primary