210 Final Exam Flashcards
A “continue” action can be configured on the following security profiles in the Next Generation firewall:
Select one:
a. URL Filtering, File Blocking, and Data Filtering
b. URL Filtering
c. URL Filtering and Antivirus
d. URL Filtering and File Blocking
d. URL Filtering and File Blocking
A critical consideration when defining Network Segmentation is ____________.
Select one:
a. third party management
b. eliminating security zones
c. understanding your business and organizational drivers
d. password management
understanding your business and organizational drivers
A strength of the Palo Alto Networks firewall is:
Select one:
a. hardware consolidation - data and control plane processing is improved and performed in successive linear fasion
b. its single-pass parallel processing (SP3) engine and software performs operations once per packet
c. increased buffering capability.
a. its single-pass parallel processing (SP3) engine and software performs operations once per packet
A Zone Protection Profile is applied to which item?
Select one:
a. Ingress Ports
b. Egress Ports
c. Security Policy Rules
d. Address Groups
Ingress Ports
Assume you have a WildFire subscription. Which file state or condition might result in a file not being analyzed by WildFire?
Select one:
a. file size limit exceeded
b. file located in a JAR or RAR archive
c. file already has WildFire hash
d. executable file signed by trusted signer
file located in a JAR or RAR archive
For guidance on continuing to deploy the security platform features to address your network security needs, review the PAN-OS Administrator’s Guide section titled ______________________________________________.
Select one:
a. Best Practices for Completing the Firewall Deployment
b. Set Up a Basic Security Policy
c. Best Practices for Securing Administrative Access
d. Register the Firewall
Best Practices for Completing the Firewall Deployment
From the reading “Four Ps of 5G Network Security”: Which of the following is NOT one of the ‘Four Ps’?
Select one:
a. Perimeter
b. Permissions
c. Protection
d. Packets
Protection
From the reading “Securing OT to enable Manufacturing Digital Transformation”: The risk of operations managing security at the local level is the potential of having _______________ approaches to security.
Select one:
a. IT administered
b. third party management
c. centralized
d. multiple,disjointed
multiple,disjointed
Global user authentication is not supported by which authentication service?
Select one:
a. LDAP
b. TACACS +
c. RADIUS
d. SAML
LDAP
How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application?
Select one:
a. incomplete
b. insufficient-data
c. not-applicable
d. unknown-tcp
insufficient-data
In a Next Generation firewall, how many packet does it take to identify the application in a TCP exchange?
Select one:
a. Two
b. One
c. Four or five
d. Three
Four or five
In the latest Next Generation firewall version, what is the shortest time that can be configured on the firewall to check for Wildfire updates?
Select one:
a. 30 Minutes
b. 5 Minutes
c. 1 Hour
d. 15 Minutes
5 Minutes
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display?
Select one:
a. Universal
b. Global
c. Local
d. Group
Global
In the web interface, what is signified when a text box is highlighted in red?
Select one:
a. The value in the text box is an error
b. The value in the text box is required
c. The value in the text box is optional
d. The value in the text box is controlled by Panorama
The value in the text box is required
NGFW QoS policies can be configured to apply:
Select one:
a. either preferential treatment or bandwidth-limiting traffic rules
b. data encryption
c. forwarding for anti-virus screening
d. third party authentication
either preferential treatment or bandwidth-limiting traffic rules
On a Palo Alto Networks firewall, which technique is used to manage traffic through NAT policies based on destination port numbers?
Select one:
a. Port Forwarding
b. Translated Address
c. Address Translation
d. Static/Dynamic Translation
a. Port Forwarding
On the Palo Alto Networks Next Generation Firewall, which is the default port for transporting Syslog traffic?
Select one:
a. 514
b. 443
c. 8080
d. 6514
514
Select the answer that best completes this sentence. Source NAT commonly is used for _________ users to access the ________ internet.
Select one:
a. private, private
b. private, public
c. public, private
d. public, public
private, public
Select the answer that completes this sentence. DIPP source NAT will support a maximum of about ______________ concurrent sessions on each IP address configured within the NAT pool.
Select one:
a. 16,300
b. 8100
c. 64,000
d. 250
64,000
Select True or False. A Layer 3 interface can be configured as dual stack with both IPv4 and IPv6 addresses.
Select one:
a. False
b. True
True
Select True or False. All of the interfaces on a Next Generation firewall must be the same interface type.
Select one:
a. False
b. True
True
Select True or False. By default, the firewall uses the management (MGT) interface to access external services, such as DNS servers, external authentication servers, Palo Alto Networks services such as software, URL updates, licenses and AutoFocus.
Select one:
a. False
b. True
True
Select True or False. Destination NAT often is used to provide hosts on the public (external) network access to private (internal) servers.
Select one:
a. True
b. False
True
Select True or False. In a Next Generation firewall, every interface in use must be assigned to a zone in order to process traffic.
Select one:
a. False
b. True
True