Palo Alto Firewalls
A strength of the Palo Alto Networks firewall is:
Its single-pass parallel processing (SP3) engine and software performs operations once per packet
Increased buffering capability
Hardware consolidation
Select True or false. The CN-Series firewalls deliver the same capabilities as the PA-Series and VM-Series firewalls.
True
False
Select True or False. Traffic protection from external locations where the egress point is the perimeter is commonly referred to as “North-South” traffic.
True
False
The first important task of building a Zero Trust Architecture is to identify __________________.
Microperimeter
The protect surface
Traffic
Interdependencies
What is the method used to create a Zero Trust policy that answers the 'who, what, when, where, why and how' definition?
Logging
Kipling
Full Authentication
Which object cannot be segmented using virtual systems on a firewall?
MGT interface
Data Plane interface
Administrative Access
Which Palo Alto Networks Cortex technology prevents malware, blocks exploits, and analyzes suspicious patterns through behavioral threat protection?
AutoFocus
Data Lake
XDR
XSOAR
Which Palo Alto Networks Next Generation VM Series Model requires a minimum of 16 GB of memory and 60 GB of dedicated disk drive capacity?
VM-100
VM-700
VM-500
VM-50
Which Palo Alto Networks Prisma technology provides continuous security monitoring, compliance validation, and cloud storage security capabilities across multi-cloud environments? In addition, you can simplify security operations through effective threat protections enhanced with comprehensive cloud context.
Access
Cloud
SaaS
Which Palo Alto Networks product for securing the enterprise extends the enterprise perimeter to remote offices and mobile users?
WildFire
Panorama
GlobalProtect
Which series of a firewall is a high-performance physical appliance solution?
VM
CN
PA
Which series of Palo Alto Networks Next Generation Firewall offers two modes, Secure Mode, and Express Mode?
CN
VM
K2
Which Strata product provides centralized firewall management and logging?
WildFire
Panorama
Prisma Access
What are the two attributes of the dedicated out-of-band network management port in Palo Alto Networks firewalls? (Choose two.)
Labeled MGT by default
Cannot be configured as a standard traffic port
Supports only SSH connections
Requires a static, non-DHCP network configuration
Select True or False. To register a hardware firewall you will need the firewall's serial number..
True
False
Select True or False. Service routes can be used to configure an in-band port to access external services.
True
False
In the web interface, what is signified when a text box is highlighted in red?
The value in the text box is optional
The value in the text box is required
The value in the text box is an error
Which two planes are found in the Palo Alto Networks single-pass platform architecture? (Choose two.)
Control
Data
Application
Parallel processing
Which object cannot be segmented using virtual systems on a firewall?
Network security zone
Data plane interface
Administrative access
MGT interface
Which series of a firewall is a high-performance physical appliance solution?
CN
PA
VM
Select True or False. The CN-series firewalls deliver the same capabilities as the PA-series and VM-series firewalls.
True
False
Which two statements are true regarding the candidate configuration? (Choose two.)
It controls the current operation of the firewall
It contains possible changes to the current configuration
It can be reverted to the current configuration
It always contains the factory default configuration
Select True or False. The running configuration consists of configuration changes in progress but not active on the firewall.
True
False
When committing changes to a firewall, what is the result of clicking the Preview Changes link?
Shows any error messages that would appear during a commit
Lists the individual settings for which you are committing changes
Compares the candidate configuration to the running configuration
Displays any unresolved application dependencies
Select True or False. The Export operations transfer configurations as XML-formatted files from the firewall..
True
False
For guidance on continuing to deploy the security platform features to address your network security needs, review the PAN-OS Administrator's Guide section titled
Set up a basic Security Policy
Best practices for completing the Firewall Deployment
Register the Firewall
Best practices for securing Administrative Access
Select True or false. Service routes can be used to configure an in-band port to access external services.
True
False
Which command will reset a next generation firewall to its factory default settings if you know the admin account password?
Reload
Reset system settings
Request system private-data-reset
Which type of firewall license or subscription provides a graphical analysis of firewall traffic logs and identifies potential risks to your network by using threat intelligence from a portal?
AutoFocus
GlobalProtect
WildFire
When committing changes to a firewall, what is the result of clicking the Preview Changes link?
Compares the candidate configuration to the running configuration
Displays any unresolved application dependencies
Lists the individual settings for which you are committing changes
When making changes to configuration settings on the PAN-OS firewall, which of the following options lists the individual changes for which you are committing changes:
Preview changes for all
Change summary
Validate commit
Which Next Generation FW configuration type has settings active on the firewall?
Running
Legacy
Startup
Which statement is true regarding the Palo Alto Networks Firewall candidate configuration?
It controls the current operation of the firewall
It can be reverted to the current configuration
It always contains the factory default configuration
When creating a custom admin role, which four types of privileges can be defined? (Choose four.)
WebUI
Panorama
Command Line (c)
JAVA API
XML API
REST API
Global user authentication is supported by which three authentication services? (Choose three.)
SAML
LDAP
RADIUS
TACACS+
Certificate
Select True or False. Server profiles define connections that the firewall can make to external servers.
True
False
Select True or False. Certificate-based authentication replaces all other forms of either local or external authentication..
True
False
Global user authentication is not supported by which authentication service?
SAML
RADIUS
LDAP
TACACS+
Select True or False. Server Profiles define connections that the firewall can make to external servers.
True
False
When creating a custom admin role, which type of privileges can not be defined?
XML API
Panorama
WebUI
When creating PAN-OS firewall administrator accounts, which configuration step is required for Non-Local Administrators, but not for Local Administrators?
API Interface
Authentication Profile
Authentication Sequence
When resetting the PAN-OS firewall to factory defaults, you can save all configuration settings and logs by performing the following:
Pressing Shift-C when prompted
Selecting 'yes' when prompted
None of the above
Which built-in administrator role allows all rights except for the creation of administrative accounts and virtual systems?
Custom role
Device admin
Superuser
Which of the following is NOT a PAN-OS Firewall Administrator Dynamic Role?
Virtual system administrator
Local only administrator
Superuser
Which two items are supported routing protocols on a virtual router? (Choose two.)
OSPF
IGRP
BGP
Which three interface types are valid on Palo Alto Networks firewall? (Choose three.)
Layer3
FCoE
Tap
Virtual Wire
FC
Which two firewall interface types can be added to a Layer3-type security zone? (Choose two.)
Tunnel
Virtual Wire
Tap
Loopback
True or false? A Layer 3 interface can be configured as a dual stack with both IPv4 and IPv6 addresses.
True
False
Select True or False. All of the interfaces on a Next Generation firewall must be the same interface type.
True
False
Select True or False. In a Next Generation firewall, every interface in use must be assigned to a zone in order to process traffic.
True
False
Which feature can be configured with an IPv6 address?
Static Route
RIPv2
DHCP Server
BGP
Which type of interface will allow the firewall to be inserted into an existing topology without requiring any reallocation of network addresses or redesign on the network topology?
Virtual Wire
Tap
Layer 3
Which two items are required to match criteria in a Palo Alto Networks Security policy rule? (Choose two.)
Source zone
Destination zone
Destination address
Destination port
Which type of Security policy rule is the default rule type?
Intrazone
Universal
Default
Select True or false. Logging on intrazone-default and interzone-default Security policy rules is enabled by default.
True
False
Which of the following are NOT traffic attributes or criteria that can be defined in a Security policy rule?
URL Category
Traffic that does not pass through the firewall data plane
Source / Destination zones
Select True or False. Security policy rules on the Next Generation firewall specify a source and a destination interface.
True
False
Traffic going to a public IP address is being translated by a Next Generation firewall to an internal server private IP address. Which IP address should the security policy use as the destination IP in order to allow traffic to the server?
The firewall gateway IP
The server public IP
The server private IP
Which NGFW security policy rule applies to all matching traffic within the specified source zones?
Intrazone
Interzone
Universal
Which type of Security policy rule is the default rule type?
Universal
Interzone
Intrazone
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display?
Global
Group
Universal
Select the answer that best completes this sentence. Source NAT commonly is used for _________ users to access the ________ internet.
Private, private
Private, public
Public, public
Which one of the following statements is true about NAT rules?
The destination zone is determined before the route lookup
NAT rules provide address translation, while security policy rules allow or deny packets
NAT rules are applied after security policy rules
What feature on the Next Generation firewall can be used to identify, in real time, the applications taking up the most bandwidth?
Quality of service statistics
Application Command Center (ACC)
Applications report
What are the three pre-defined tabs in the Next Generation firewall Application Command Center (ACC)?
Blocked Activity
Network Traffic
Threat Activity
Application Traffic
When using config audit to compare configuration files on a Next Generation firewall, what does the yellow indication reveal?
Addition
Deletion
Change
In the Palo Alto Networks Firewall WebUI, which type of report can be compiled into a single emailed PDF?
Predefined
Group
Pdf summary
What feature on the Next Generation firewall will set the security policy to allow the application on the standard ports associated with the application?
Application-default
Application-custom
Application-implicit
When an Applications and Threats content update is performed, which is the earliest point where you can review the impact of new application signatures on existing policies?
After download
After commit
After install
Which three methods does App-ID use to identify network traffic? Choose the 3 correct choices.
Heuristics
Protocol decoders
Signatures
Url category
Which URL filtering security profile action logs the category to the URL filtering log?
Alert
Default
Allow
Which is the correct URL matching order on a Palo Alto Networks Next Generation Firewall?
Block, Allow, Custom URL, External Dynamic, PAN-DB Download, PAN-DB Cloud, PAN-DB Cache
Block, Allow, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
Allow, Block, Custom URL, External Dynamic, PAN-DB Cache, PAN-DB Download, PAN-DB Cloud
According to best practices, which two URL filtering categories should be blocked in most URL Filtering Profiles? (Choose two.)
High-risk
Adult
New-registered-domain
Medium-risk
What is the recommended maximum default size of PE - executable - files forwarded from the Next Generation firewall to Wildfire?
16 megabytes
Up to 2 megabytes
Up to 10 megabytes
Which CLI command is used to verify successful file uploads to WildFire?
Debug wildfire upload-log show
Debug wildfire download-log show
Debug wildfire upload-log
Which User-ID component and mapping method is recommended for web clients that do not use the domain server?
GlobalProtect
Captive Portal
XML API
Which port does the Palo Alto Networks Windows-based User-ID agent use by default?
TCP port 80
TCP port 4125
TCP port 570
TCP port 5007
Which two statements are true regarding User-ID and firewall configuration?
The firewall needs to have information for every USER-ID agent for which it will connect
Communication between the firewall and USER-ID agent are sent over an encrypted SSL connection
The USER-ID agent must be installed on the domain controller
Which statement is true regarding User-ID and Security policy rules?
Users can be used in policy rules only if they are known by the firewall
The Source IP and Source User fields cannot be used in the same policy.
Which item is NOT a valid choice when the Source User field is configured in a Security policy rule?
Unknown
Known-user
Any
All
Which three statements are true regarding Safe Search Enforcement? (Choose three.)
Safe search is a web server setting
Safe search is a web browser setting
Safe search is a best-effort setting
Safe search is designed to block violent web content
What component of the Next Generation Firewall will protect from port scans?
Zone protection
Vulnerability protection
DOS protection
A Zone Protection Profile is applied to which item?
Ingress ports
Egress ports
Address groups
Security policy rules
What is the default setting for "Action" in a decryption policy rule?
No-decrypt
Decrypt
None
Which two types of activities does SSL/TLS decryption on the firewall help to block?
DOS attacks
Malware introduction
Sensitive data exfiltration
Protocol-based attacks
In the Palo Alto Networks Application Command Center (ACC), which filter allows you to limit the display to the details you care about right now and to exclude the unrelated information from the current display?
Group
Universal
Global
Which two firewall features display information using widgets?
Dashboard
ACC
Traffic log
Botnet report
True or false? SNMP GET requests to a firewall return operational statistics, and SNMP SET requests update the firewall configuration.
True
False
{"name":"Palo Alto Firewalls", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A strength of the Palo Alto Networks firewall is:, Select True or false. The CN-Series firewalls deliver the same capabilities as the PA-Series and VM-Series firewalls., Select True or False. Traffic protection from external locations where the egress point is the perimeter is commonly referred to as “North-South” traffic.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
Project quiz(passion project)
8417
TITANIC
630
Κουίζ. Πόσο καλά γνωρίζετε τα σήματα κυκλοφορίας;
1050
FRIDAY OR SATURDAY, AMOUNT OF GIRLS (NIGHT-TIME, 7PM UNTIL CLOSE)
100
Tier 3 Introduction Quiz
1050
Nagyhatalmak és nemzetállamok
1580
Verificare cunostinte de baza in Metin2(Nivel Incepator)
12614
Om Cordinator
10511
The 50 Addington Housemate Quiz
1059
FUNalo ka!
105171
PRAX
1476
1580