Q_376-400 Flashcards

1
Q

Question #376 Topic 1
An engineer is troubleshooting a traffic-routing issue.
What is the correct packet-flow sequence?
A. PBF > Static route > Security policy enforcement
B. BGP < PBF > NAT
C. PBF > Zone Protection Profiles > Packet Buffer Protection
D. NAT > Security policy enforcement > OSPF

A

A. PBF > Static route > Security policy enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question #377 Topic 1
While investigating a SYN flood attack, the firewall administrator discovers that legitimate traffic is also being dropped by the DoS profile.
If the DoS profile action is set to Random Early Drop, what should the administrator do to limit the drop to only the attacking sessions?
A. Enable resources protection under the DoS Protection profile.
B. Change the SYN flood action from Random Early Drop to SYN cookies.
C. Increase the activate rate for the SYN flood protection.
D. Change the DoS Protection profile type from aggregate to classified.

A

B. Change the SYN flood action from Random Early Drop to SYN cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question #378 Topic 1
A firewall administrator wants to have visibility on one segment of the company network. The traffic on the segment is routed on the Backbone
switch. The administrator is planning to apply Security rules on segment X after getting the visibility.
There is already a PAN-OS firewall used in L3 mode as an internet gateway, and there are enough system resources to get extra traffic on the
firewall. The administrator needs to complete this operation with minimum service interruptions and without making any IP changes.
What is the best option for the administrator to take?
A. Configure the TAP interface for segment X on the firewall
B. Configure a Layer 3 interface for segment X on the firewall.
C. Configure vwire interfaces for segment X on the firewall.
D. Configure a new vsys for segment X on the firewall.

A

A. Configure the TAP interface for segment X on the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question #379 Topic 1
A company is deploying User-ID in their network. The firewall team needs to have the ability to see and choose from a list of usernames and user
groups directly inside the Panorama policies when creating new security rules.
How can this be achieved?
A. by configuring User-ID group mapping in Panorama > User Identification
B. by configuring Master Device in Panorama > Device Groups
C. by configuring User-ID source device in Panorama > Managed Devices
D. by configuring Data Redistribution Client in Panorama > Data Redistribution

A

B. by configuring Master Device in Panorama > Device Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question #380 Topic 1
After some firewall configuration changes, an administrator discovers that application identification has started failing. The administrator
investigates further and notices that a high number of sessions were going to a discard state with the application showing as unknown-tcp.
Which possible firewall change could have caused this issue?
A. enabling Forward segments that exceed the TCP App-ID inspection queue in Device > Setup > Content-ID > Content-ID Settings
B. enabling Forward segments that exceed the TCP content inspection queue in Device > Setup > Content-ID > Content-ID Settings
C. Jumbo frames were enabled on the firewall, which reduced the App-ID queue size and the number of available packet buffers.
D. Jumbo frames were disabled on the firewall, which reduced the queue sizes dedicated for out-of-order and application identification

A

A. enabling Forward segments that exceed the TCP App-ID inspection queue in Device > Setup > Content-ID > Content-ID Settings

Forward Segments Exceeding TCP App-ID™ Inspection Queue
Enable this option to forward segments and classify the application as unknown-tcp when the App-ID queue exceeds the 64-segment limit. Use the following global counter to view the number of segments in excess of this queue regardless of whether you enabled or disabled this option:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question #381 Topic 1
Which three actions can Panorama perform when deploying PAN-OS images to its managed devices? (Choose three.)
A. upload-only
B. install and reboot
C. upload and install
D. upload and install and reboot
E. verify and install

A

A. upload-only
B. install and reboot

D. upload and install and reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question #382 Topic 1
A firewall administrator is investigating high packet buffer utilization in the company firewall. After looking at the threat logs and seeing many
flood attacks coming from a single source that are dropped by the firewall, the administrator decides to enable packet buffer protection to protect
against similar attacks.
The administrator enables packet buffer protection globally in the firewall but still sees a high packet buffer utilization rate.
What else should the administrator do to stop packet buffers from being overflowed?
A. Apply DOS profile to security rules allow traffic from outside.
B. Enable packet buffer protection for the affected zones.
C. Add the default Vulnerability Protection profile to all security rules that allow traffic from outside.
D. Add a Zone Protection profile to the affected zones

A

B. Enable packet buffer protection for the affected zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question #383 Topic 1
A firewall administrator is investigating high packet buffer utilization in the company firewall. After looking at the threat logs and seeing many
flood attacks coming from a single source that are dropped by the firewall, the administrator decides to enable packet buffer protection to protect
against similar attacks.
The administrator enables packet buffer protection globally in the firewall but still sees a high packet buffer utilization rate.
What else should the administrator do to stop packet buffers from being overflowed?
A. Apply DOS profile to security rules allow traffic from outside.
B. Enable packet buffer protection for the affected zones.
C. Add the default Vulnerability Protection profile to all security rules that allow traffic from outside.
D. Add a Zone Protection profile to the affected zones.

A

B. Enable packet buffer protection for the affected zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question #384 Topic 1
What is a correct statement regarding administrative authentication using external services with a local authorization method?
A. The administrative accounts you define on an external authentication server serve as references to the accounts defined locally on the
firewall.
B. Prior to PAN-OS 10.2, an administrator used the firewall to manage role assignments, but access domains have not been supported by this
method.
C. Starting with PAN-OS 10.2, an administrator needs to configure Cloud Identity Engine to use external authentication services for
administrative authentication.
D. The administrative accounts you define locally on the firewall serve as references to the accounts defined on an external authentication
server.

A

D. The administrative accounts you define locally on the firewall serve as references to the accounts defined on an external authentication
server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question #385 Topic 1
A network administrator notices there is a false-positive situation after enabling Security profiles. When the administrator checks the threat
prevention logs, the related signature displays: threat type: spyware category: dns-c2 threat ID: 1000011111
Which set of steps should the administrator take to configure an exception for this signature?
A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the signature exceptions tab and then click show all
signatures Search related threat ID and click enable Change the default action Commit
B. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the Exceptions tab and then click show all signatures
Search related threat ID and click enable Commit
C. Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the Exceptions tab and then click show all
signatures Search related threat ID and click enable Commit
D. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS exceptions tabs Search related threat ID and click
enable Commit

A

A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the signature exceptions tab and then click show all
signatures Search related threat ID and click enable Change the default action Commit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question #386 Topic 1
-graphic-
In the screenshot above, which two pieces of information can be determined from the ACC configuration shown? (Choose two.)
A. Insecure-credentials, brute-force, and protocol-anomaly are all a part of the vulnerability Threat Type.
B. The Network Activity tab will display all applications, including FTP.
C. Threats with a severity of ג€high ג€ are always listed at the top of the Threat Name list.
D. The ACC has been filtered to only show the FTP application.

A

In the screenshot above, which two pieces of information can be determined from the ACC configuration shown? (Choose two.)

A. Insecure-credentials, brute-force, and protocol-anomaly are all a part of the vulnerability Threat Type.

D. The ACC has been filtered to only show the FTP application.

check filtered section on left - “ftp”

Threat activity bar show “Threat Type(vulnerability)
then lists Insecure-credentials, brute-force, and protocol-anomaly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question #387 Topic 1
-graphic
Given the screenshot, how did the firewall handle the traffic?
A. Traffic was allowed by policy but denied by profile as encrypted.
B. Traffic was allowed by policy but denied by profile as a threat.
C. Traffic was allowed by profile but denied by policy as a threat.
D. Traffic was allowed by policy but denied by profile as a nonstandard port.

A

B. Traffic was allowed by policy but denied by profile as a threat.

Action: allow
Action Source from-policy

session end reason is “threat”
For more details, has been blocked by an URL filtering profile, because category “proxy-avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question #388 Topic 1
Your company wants greater visibility into their traffic and has asked you to start planning an SSL Decryption project. The company does not have
a PKI infrastructure, and multiple certificates would be needed for this project. Which type of certificate can you use to generate other
certificates?
A. self-signed root CA
B. external CA certificate
C. server certificate
D. device certificate

A

A. self-signed root CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question #389 Topic 1
-graphic
Refer to the screenshots. Without the ability to use Context Switch, where do admin accounts need to be configured in order to provide admin
access to Panorama and to the managed devices?
A. The Panorama section overrides the Device section. The accounts need to be configured only in the Panorama section.
B. The sections are independent. The accounts need to be configured in both the Device and Panorama sections.
C. The Device section overrides Panorama section. The accounts need to be configured only in the Device section.
D. Configuration in the sections is merged together. The accounts need to be configured in either section.

A

B. The sections are independent. The accounts need to be configured in both the Device and Panorama sections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question #390 Topic 1
A firewall administrator needs to be able to inspect inbound HTTPS traffic on servers hosted in their DMZ to prevent the hosted service from being
exploited.
Which combination of features can allow PAN-OS to detect exploit traffic in a session with TLS encapsulation?
A. a WildFire profile and a File Blocking profile
B. a Vulnerability Protection profile and a Decryption policy
C. a Vulnerability Protection profile and a QoS policy
D. a Decryption policy and a Data Filtering profile

A

B. a Vulnerability Protection profile and a Decryption policy

“exploits” are vulnerability
File blocking is different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question #391 Topic 1
Engineer was tasked to simplify configuration of multiple firewalls with a specific set of configurations shared across all devices.
Which two advantages would be gained by using multiple templates in a stack? (Choose two.)
A. inherits address-objects from the templates
B. standardizes server profiles and authentication configuration across all stacks
C. standardizes log-forwarding profiles for security policies across all stacks
D. defines a common standard template configuration for firewalls

A

B. standardizes server profiles and authentication configuration across all stacks

D. defines a common standard template configuration for firewalls

templates !!!

17
Q

Question #392 Topic 1
Which protocol is supported by GlobalProtect Clientless VPN?
A. FTP
B. HTTPS
C. SSH
D. RDP

A

B. HTTPS

think web portal…

18
Q

Question #393 Topic 1
During the implementation of SSL Forward Proxy decryption, an administrator imports the company’s Enterprise Root CA and Intermediate CA
certificates onto the firewall. The company’s Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and
GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company’s
Intermediate CA.
Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?
A. Generate two subordinate CA certificates, one for Forward Trust and one for Forward Untrust.
B. Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.
C. Generate a single subordinate CA certificate for both Forward Trust and Forward Untrust.
D. Generate a single self-signed CA certificate for Forward Trust and another for Forward Untrust.

A

B. Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.

you don’t want clients to trust the untrust certificate. If you use subordinate certificate of the Enterprise CA that is installed on all clients, it is by definition still trusted even if you designated that certificate as the forward untrust.

Forward untrust certificate should always be
self-signed for this reason.

19
Q

Question #394 Topic 1
A firewall administrator needs to check which egress interface the firewall will use to route the IP 10.2.5.3.
Which command should they use?
A. test routing fib-lookup ip 10.2.5.0/24 virtual-router default
B. test routing route ip 10.2.5.3
C. test routing route ip 10.2.5.3 virtual-router default
D. test routing fib-lookup ip 10.2.5.3 virtual-router default

A

D. test routing fib-lookup ip 10.2.5.3 virtual-router default

20
Q

Question #395 Topic 1
A client is concerned about web shell attacks against their servers.
Which profile will protect the individual servers?
A. Anti-Spyware profile
B. Zone Protection profile
C. DoS Protection profile
D. Antivirus profile

A

A. Anti-Spyware profile

Web shells are malicious scripts that enable threat actors to compromise web servers and launch additional attacks.

21
Q

Question #396 Topic 1
Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the
management interface?
A. service route
B. data redistribution
C. SNMP setup
D. dynamic updates

A

A. service route

22
Q

Question #397 Topic 1
How is an address object of type IP range correctly defined?
A. 192 168 40 1-192 168 40 255
B. 192.168 40 1/24
C. 192.168 40 1, 192.168 40.255
D. 192 168 40 1-255

A

A. 192 168 40 1-192 168 40 255

23
Q

Question #398 Topic 1
An administrator wants to prevent users from unintentionally accessing malicious domains where data can be exfiltrated through established
connections to remote systems. From the Pre-defined Categories tab within the URL Filtering profile what is the right configuration to prevent such
connections?
A. Set the malware category to block
B. Set the Command and Control category to block
C. Set the phishing category to override
D. Set the hacking category to continue

A

B. Set the Command and Control category to block

command-and-control—Command-and-control URLs and domains used by malware and/or compromised systems to surreptitiously
communicate with an attacker’s remote server to receive malicious commands or exfiltrate data.”
so the answer is B, not A. cuz the question said: “from unintentionally accessing malicious domains”.

24
Q

Question #399 Topic 1
In order to fulfill the corporate requirement to back up the configuration of Panorama and the Panorama-managed firewalls securely which
protocol should you select when adding a new scheduled config export?
A. HTTPS
B. FTP
C. SMB v3
D. SCP

A

D. SCP

25
Q

Question #400 Topic 1
A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT, Finance, and HR. Which two
types of traffic will the rule apply to? (Choose two.)
A. traffic between zone Finance and zone HR
B. traffic between zone IT and zone Finance
C. traffic within zone HR
D. traffic within zone IT

A

C. traffic within zone HR
D. traffic within zone IT

INTRA = within the SAME zone