Palo Alto Modules 8-14

Ace your homework & exams now with Quizwiz!

Which User-ID component and mapping method is recommended for web clients that do not use the domain server?

Captive Portal

Which feature can be configured to block sessions that the firewall cannot decrypt?

Decryption profile in decryption policy

Which file type can a firewall send to WildFire when the firewall does not have a WildFire subscription?

EXE

Select True or False. On the Next Generation firewall, application groups are always automatically updated when new applications are added to the App-ID database.

False

True or false? If OCSP and CRL are configured on a firewall, CRL is consulted first.

False

True or false? When a malicious file or link is detected in an email, WildFire can update antivirus signatures in the PAN-DB database.

False

What action will show whether a downloaded PDF file from a user has been blocked by a security profile on the Next Generation firewall?

Filter the data filtering logs for the user's traffic and the name of the PDF file

In a Next Generation firewall, how many packet does it take to identify the application in a TCP exchange?

Four or five

In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display?

Global

Which statement about the automated correlation engine is not correct?

It is available only in Panorama

What is default setting for "Action" in a decryption policy rule?

None

In the latest Next Generation firewall version, what is the shortest time that can be configured on the firewall to check for Wildfire updates?

Real Time

Which type of Next Generation Firewall decryption inspects SSL traffic between an internal host and an external web server?

SSL Forward Proxy

Which type of Next Generation Firewall decryption inspects SSL traffic coming from external users to internal servers?

SSL Inbound Inspection

Which type of firewall decryption requires the administrator to import a server certificate and a private key into the firewall?

SSL Inbound Inspection Decryption

Which Next Generation Firewall URL filter setting is used to prevent users who use the Google, Yahoo, Bing, Yandex, or YouTube search engines from viewing search results unless their browser is configured with the strict safe search option.

Safe Search Enforcement

Which statement is not true regarding Safe Search Enforcement?

Safe search works only in conjunction with credential submission websites

Which port does the Palo Alto Networks Windows-based User-ID agent use by default?

TCP port 5007

When creating an application filter, which of the following is true?

They are called dynamic because they will automatically include new applications from an application signature update if the new application's type is included in the filter

The User-ID feature identifies the user and IP address of the computer the user is logged into for Next Generation firewall policy enforcement.

True

True or False. If a file type is matched in the File Blocking Profile and WildFire Analysis Profile, and if the File Blocking Profile action is set to "block," then the file is not forwarded to WildFire.

True

True or False. In the Next Generation Firewall, even if the Decryption policy rule action is "no-decrypt," the Decryption Profile attached to the rule can still be configured to block sessions with expired or untrusted certificates.

True

True or false? A Security Profile attached to a Security policy rule is evaluated only if the Security policy rule matches traffic and the rule action is set to "allow."

True

True or false? A URL Filtering license is not required to define and use custom URL categories.

True

True or false? If App-ID cannot identify the traffic, Content-ID cannot inspect the traffic for malware.

True

True or false? The SSL forward untrusted certificate should not be trusted by the client but should still be a CA certificate.

True

True or false? The firewall still can check for expired or untrusted certificates even if the SSL traffic is not being decrypted.

True

True or false? You can customize the list of logs that are aggregated into the Unified log.

True

A "continue" action can be configured on the following security profiles in the Next Generation firewall:

URL Filtering and File Blocking

Which statement is true regarding User-ID and Security policy rules?

Users can be used in policy rules only if they are known by the firewall

Without a Wildfire licensed subscription, which of the following files can be submitted by the Next Generation Firewall to the hosted Wildfire virtualized sandbox?

PE files only

What component of the Next Generation Firewall will protect from port scans?

Zone protection

Network traffic matches an "allow" rule in the Security policy, but the attached File Blocking Profile is configured with a "block" action. To which two locations will the traffic be logged? Choose the 2 correct choices.

a. Data Filtering Log b. Traffic Log

Which statement about the predefined reports is not correct?

a. They are emailed daily to users

Which item is not a valid choice when the Source User field is configured in a Security policy rule?

all

Which anti-spyware feature enables an administrator to quickly identify a potentially infected host on the network?

b. DNS Slnkhole

A Zone Protection Profile is applied to which item?

a. Ingress Ports

Which profile type is designed to protect against reconnaissance attacks such as host sweeps and port scans?

a. Zone Protection

According to best practices, which two URL filtering categories should be blocked in most URL Filtering Profiles? Choose the 2 correct choices.

a. new-registered-domain c. high-risk

Which three methods does App-ID use to identify network traffic? Choose the 3 correct choices.

a. protocol decoders c. heuristics d. signatures

What are the three pre-defined tabs in the Next Generation firewall Application Command Center (ACC)? Choose the 3 correct choices.

a. Threat Activity b. Blocked Activity c. Network Traffic

Which two types of activities does SSL/TLS decryption on the firewall help to block? Choose the 2 correct choices.

a. sensitive data exfiltration c. malware introduction

When an Applications and Threats content update is performed, which is the earliest point where you can review the impact of new application signatures on existing policies?

after download

Which two firewall features display information using widgets? Choose the 2 correct choices.

c. ACC d. Dashboard

Which two statements are true regarding User-ID and firewall configuration? Choose the 2 correct choices.

c. The firewall needs to have information for every USER-ID agent for which it will connect d. Communication between the firewall and USER-ID agent are sent over an encrypted SSL connection

Which two actions affect all of the widgets in the Application Command Center? Choose the 2 correct choices.

c. setting a time range d. setting a global filter

Which URL filtering security profile action logs the category to the URL filtering log?

d. Alert

Which URL Filtering Profile action will result in a user being interactively prompted for a password?

d. override

Which is the correct URL matching order on a Palo Alto Networks Next Generation Firewall?

d. Block, Allow, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud

Which CLI command is used to verify successful file uploads to WildFire?

debug wildfire upload-log show

Assume you have a WildFire subscription. Which file state or condition would trigger a Wildfire file analysis?

file located in a JAR or RAR archive

Which WildFire verdict might indicate obtrusive behavior but not a security threat?

grayware

How would App-ID label TCP traffic when the three-way handshake completes, but not enough data is sent to identify an application?

insufficient-data

Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user's browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log?

override

On the Palo Alto Networks Next Generation Firewall, which is the default port for transporting Syslog traffic?

514

True or false? SNMP GET requests to a firewall return operational statistics, and SNMP SET requests update the firewall configuration.

False

True or false? When migration is done from the firewall of another vendor to a Palo Alto Networks firewall, a best practice is to always migrate the existing Security policy.

True

When SSL encrypted traffic first arrives at the Next Generation Firewall, which technology initially identifies the application as web-browsing?

App-ID

What is the recommended maximum default size of PE - executable - files forwarded from the Next Generation firewall to Wildfire?

16 megabytes

To properly configure DOS protection to limit the number of sessions individually from specific source IPS you would configure a DOS Protection rule with the following characteristics:

Action: Protect, Classified Profile with "Resources Protection" configured, and Classified Address with "source-ip-only" configured

What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth?

Application Command Center (ACC)

What feature on the Next Generation firewall will set the security policy to allow the application on the standard ports associated with the application?

Application-default


Related study sets

Intro to Cisco Networking - Modules 11, 12, & 13

View Set

Earth, Space, And Science Survey Chapter 7 Study Guide

View Set

Drag the word to complete the sentences

View Set

Chapter 7 Neurological System Disorders

View Set

MARKETING CH 2 : STRATEGIC PLANNING

View Set

AP Lang Sentences, Clauses, and Phrases

View Set

anatomy & physiology lecture exam 2

View Set

ch 3 Prejudice and Discrimination

View Set

ปฏิบัติเวชกรรมไทย(รวมทั้งหมด)

View Set