ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 30

Question list
Search
Search

Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?

A.
Inline Cloud Analysis
A.
Inline Cloud Analysis
Answers
B.
Signature Exceptions
B.
Signature Exceptions
Answers
C.
Machine Learning Policies
C.
Machine Learning Policies
Answers
D.
Signature Policies
D.
Signature Policies
Answers
Suggested answer: A

Explanation:

An Anti-Spyware security profile is a set of rules that defines how the firewall detects and prevents spyware from compromising hosts on the network.Spyware is a type of malware that collects information from the infected system, such as keystrokes, browsing history, or personal data, and sends it to an external command-and-control (C2) server1.

An Anti-Spyware security profile consists of four tabs: Signature Policies, Signature Exceptions, Machine Learning Policies, and Inline Cloud Analysis1.

The Signature Policies tab allows you to configure the actions and log settings for each spyware signature category, such as adware, botnet, keylogger, phishing, or worm.You can also enable DNS Security to block malicious DNS queries and responses1.

The Signature Exceptions tab allows you to create exceptions for specific spyware signatures that you want to override the default action or log settings.For example, you can allow a signature that is normally blocked by the profile, or block a signature that is normally alerted by the profile1.

The Machine Learning Policies tab allows you to configure the actions and log settings for machine learning based signatures that detect unknown spyware variants.You can also enable WildFire Analysis to submit unknown files to the cloud for further analysis1.

The Inline Cloud Analysis tab allows you to enable machine learning based engines that detect unknown spyware variants in real time. These engines use cloud-based models to analyze the behavior and characteristics of network traffic and identify malicious patterns.You can enable inline cloud analysis for HTTP/HTTPS traffic, SMTP/SMTPS traffic, or IMAP/IMAPS traffic1.

Therefore, the tab that is used to enable machine learning based engines is the Inline Cloud Analysis tab.

References:

1:Security Profile: Anti-Spyware - Palo Alto Networks

Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)

A.
Deny
A.
Deny
Answers
B.
Sinkhole
B.
Sinkhole
Answers
C.
Override
C.
Override
Answers
D.
Block
D.
Block
Answers
Suggested answer: B, D

Explanation:

A DNS policy action is a setting in an Anti-Spyware security profile that defines how the firewall handles DNS queries to malicious domains.A malicious domain is a domain name that is associated with a known threat, such as malware, phishing, or botnet1.

There are four possible DNS policy actions: alert, allow, block, and sinkhole1.

The alert action logs the DNS query and allows it to proceed to the intended destination.This action does not prevent hacking attacks, but only notifies the administrator of the potential threat1.

The allow action allows the DNS query to proceed to the intended destination without logging it.This action does not prevent hacking attacks, but only bypasses the DNS security inspection2.

The block action blocks the DNS query and sends a response to the client with an NXDOMAIN (non-existent domain) error code.This action prevents hacking attacks by preventing the client from resolving the malicious domain1.

The sinkhole action redirects the DNS query to a predefined IP address (the sinkhole IP address) that is under the control of the administrator.This action prevents hacking attacks by isolating the client from the malicious domain and allowing the administrator to monitor and remediate the infected host1.

The override action is not a valid DNS policy action, but a setting in an Anti-Spyware security profile that allows the administrator to create exceptions for specific spyware signatures that they want to override the default action or log settings3.

Therefore, the two DNS policy actions that can prevent hacking attacks through DNS queries to malicious domains are block and sinkhole.

References:

1:Enable DNS Security - Palo Alto Networks2:How To Disable the DNS Security Feature from an Anti-Spyware Profile - Palo Alto Networks3:Security Profile: Anti-Spyware - Palo Alto Networks

Which profile should be used to obtain a verdict regarding analyzed files?

A.
WildFire analysis
A.
WildFire analysis
Answers
B.
Vulnerability profile
B.
Vulnerability profile
Answers
C.
Content-ID
C.
Content-ID
Answers
D.
Advanced threat prevention
D.
Advanced threat prevention
Answers
Suggested answer: A

Explanation:

A profile is a set of rules or settings that defines how the firewall performs a specific function, such as detecting and preventing threats, filtering URLs, or decrypting traffic1.

There are different types of profiles that can be applied to different types of traffic or scenarios, such as Antivirus, Anti-Spyware, Vulnerability Protection, URL Filtering, File Blocking, Data Filtering, Decryption, or WildFire Analysis1.

The WildFire Analysis profile is a profile that enables the firewall to submit unknown files or email links to the cloud-based WildFire service for analysis and verdict determination2.WildFire is the industry's most advanced analysis and prevention engine for highly evasive zero-day exploits and malware3.WildFire uses a variety of malware detection techniques, such as static analysis, dynamic analysis, machine learning, and intelligent run-time memory analysis, to identify and protect against unknown threats34.

The Vulnerability Protection profile is a profile that protects the network from exploits that target known software vulnerabilities.It allows the administrator to configure the actions and log settings for each vulnerability severity level, such as critical, high, medium, low, or informational5.

Content-ID is not a profile, but a feature of the firewall that performs multiple functions to identify and control applications, users, content, and threats on the network. Content-ID consists of four components: App-ID, User-ID, Content Inspection, and Threat Prevention.

Advanced Threat Prevention is not a profile, but a term that refers to the comprehensive approach of Palo Alto Networks to prevent sophisticated and unknown threats. Advanced Threat Prevention includes WildFire, but also other products and services, such as DNS Security, Cortex XDR, Cortex XSOAR, and AutoFocus.

Therefore, the profile that should be used to obtain a verdict regarding analyzed files is the WildFire Analysis profile.

References:

1:Security Profiles - Palo Alto Networks2:WildFire Analysis Profile - Palo Alto Networks3:WildFire - Palo Alto Networks4:Advanced Wildfire as an ICAP Alternative | Palo Alto Networks5:Vulnerability Protection Profile - Palo Alto Networks: [Content-ID - Palo Alto Networks] : [Advanced Threat Prevention - Palo Alto Networks]

How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?

A.
Select the unified log entry in the side menu.
A.
Select the unified log entry in the side menu.
Answers
B.
Modify the number of columns visible on the page
B.
Modify the number of columns visible on the page
Answers
C.
Modify the number of logs visible on each page.
C.
Modify the number of logs visible on each page.
Answers
D.
Select the system logs entry in the side menu.
D.
Select the system logs entry in the side menu.
Answers
Suggested answer: A

Explanation:

The best way to view a complete overview of the logs is to select the unified log entry in the side menu.The unified log is a single view that displays all the logs generated by the firewall, such as traffic, threat, URL filtering, data filtering, and WildFire logs1.The unified log allows the administrator to filter, sort, and export the logs based on various criteria, such as time range, severity, source, destination, application, or action1.

Modifying the number of columns visible on the page or the number of logs visible on each page does not provide a complete overview of the logs, but only changes the display settings of the current log view.Selecting the system logs entry in the side menu does not show all the logs generated by the firewall, but only shows the logs related to system events, such as configuration changes, system alerts, or HA status2.

References:

1:View Logs - Palo Alto Networks2:View and Manage Logs - Palo Alto Networks

How are service routes used in PAN-OS?

A.
By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network
A.
By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network
Answers
B.
To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services
B.
To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services
Answers
C.
For routing, because they are the shortest path selected by the BGP routing protocol
C.
For routing, because they are the shortest path selected by the BGP routing protocol
Answers
D.
To route management plane services through data interfaces rather than the management interface
D.
To route management plane services through data interfaces rather than the management interface
Answers
Suggested answer: D

Explanation:

Service routes are a feature of PAN-OS that allows the administrator to customize the interface that the firewall uses to send requests to external services, such as DNS, email, Palo Alto Networks updates, User-ID agent, syslog, Panorama, dynamic updates, URL updates, licenses, and AutoFocus1.

By default, the firewall uses the management interface for all service routes, unless the packet destination IP address matches the configured destination service route, in which case the source IP address is set to the source address configured for the destination1.

However, in some scenarios, the administrator may want to use a different interface for service routes, such as when the management interface does not have public internet access, or when the administrator wants to isolate or monitor the traffic for certain services23.

To configure service routes, the administrator can select Device > Setup > Services > Service Route Configuration and customize each service with a source interface and a source address.The administrator can also configure destination service routes to specify a destination IP address and a gateway for each service1.

Service routes are not related to routing protocols such as OSPF or BGP, which are used to exchange routing information between routers and determine the best path to reach a network destination. Service routes are only used to change the interface that the firewall uses to communicate with external services.

Therefore, service routes are used to route management plane services through data interfaces rather than the management interface.

References:

1:Configure Service Routes - Palo Alto Networks2:Setting a Service Route for Services to Use a Dataplane's Interface - Palo Alto Networks3:How to Perform Updates when Management Interface does not have Public Internet Access - Palo Alto Networks


In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)

A.
Objects tab > Application Filters
A.
Objects tab > Application Filters
Answers
B.
Policies tab > Security
B.
Policies tab > Security
Answers
C.
ACC tab > Global Filters
C.
ACC tab > Global Filters
Answers
D.
Objects tab > Application Groups
D.
Objects tab > Application Groups
Answers
E.
Objects tab > Applications
E.
Objects tab > Applications
Answers
Suggested answer: A, D, E

Explanation:

The application characteristics can be found in three places on the PAN-OS interface: Objects tab > Application Filters, Objects tab > Application Groups, and Objects tab > Applications. These places allow you to view and manage the applications and application groups that are used in your Security policy rules.You can also create custom applications and application filters based on various attributes, such as category, subcategory, technology, risk, and behavior1. Some of the characteristics of these places are:

Objects tab > Application Filters: An application filter is a dynamic object that groups applications based on specific criteria. You can use an application filter to match multiple applications in a Security policy rule without having to list them individually. For example, you can create an application filter that includes all applications that have a high risk level or use peer-to-peer technology.

Objects tab > Application Groups: An application group is a static object that groups applications based on your custom requirements. You can use an application group to match multiple applications in a Security policy rule without having to list them individually. For example, you can create an application group that includes all applications that are related to a specific business function or project.

Objects tab > Applications: An application is an object that identifies and classifies network traffic based on App-ID, which is a technology that uses multiple attributes to identify applications. You can use an application to match a specific application in a Security policy rule and control its access and behavior. For example, you can use an application to allow web browsing but block file sharing or social networking.

An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.

Which configuration action should the administrator take when creating the address object?

A.
Ensure that the Shared option is checked.
A.
Ensure that the Shared option is checked.
Answers
B.
Ensure that the Shared option is cleared.
B.
Ensure that the Shared option is cleared.
Answers
C.
Ensure that Disable Override is cleared.
C.
Ensure that Disable Override is cleared.
Answers
D.
Tag the address object with the Global tag.
D.
Tag the address object with the Global tag.
Answers
Suggested answer: A

Explanation:

To reference the same address object in Security policies on 100 Panorama-managed firewalls, across 10 device groups and five templates, the administrator should ensure that the Shared option is checked when creating the address object. This option allows the administrator to create a shared address object that is available to all device groups and templates on Panorama.The shared address object can then be used in multiple firewall policy rules, filters, and other functions1.This reduces the complexity and duplication of managing address objects across multiple firewalls2.Reference:Address Objects,Create a Shared Address Object,Certifications - Palo Alto Networks,Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].

What are three configurable interface types for a data-plane ethernet interface? (Choose three.)

A.
Layer 3
A.
Layer 3
Answers
B.
HSCI
B.
HSCI
Answers
C.
VWire
C.
VWire
Answers
D.
Layer 2
D.
Layer 2
Answers
E.
Management
E.
Management
Answers
Suggested answer: A, C, D

Explanation:

Three configurable interface types for a data-plane ethernet interface are Layer 3, VWire, and Layer 2. These interface types determine how the firewall processes traffic and applies security policies. Some of the characteristics of these interface types are:

Layer 3: A layer 3 interface allows the firewall to act as a router and participate in the network routing.The firewall can send and receive traffic from a layer 3 interface and apply security policies and inspect the traffic based on the source and destination IP addresses and zones of the interface1.

VWire: A virtual wire interface allows the firewall to transparently pass traffic between two network segments without modifying the packets or affecting the routing.The firewall can still apply security policies and inspect the traffic based on the source and destination zones of the virtual wire2.

Layer 2: A layer 2 interface allows the firewall to act as a switch and forward traffic based on MAC addresses.The firewall can send and receive traffic from a layer 2 interface and apply security policies and inspect the traffic based on the source and destination zones of the interface3.

Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?

A.
Panorama > Device Deployment > Dynamic Updates > Schedules > Add
A.
Panorama > Device Deployment > Dynamic Updates > Schedules > Add
Answers
B.
Panorama > Device Deployment > Content Updates > Schedules > Add
B.
Panorama > Device Deployment > Content Updates > Schedules > Add
Answers
C.
Panorama > Dynamic Updates > Device Deployment > Schedules > Add
C.
Panorama > Dynamic Updates > Device Deployment > Schedules > Add
Answers
D.
Panorama > Content Updates > Device Deployment > Schedules > Add
D.
Panorama > Content Updates > Device Deployment > Schedules > Add
Answers
Suggested answer: A

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/upgrade-panorama/deploy-updates-to-firewalls-log-collectors-and-wildfire-appliances-using-panorama/schedule-a-content-update-using-panorama

Which Security policy action will message a user's browser that their web session has been terminated?

A.
Drop
A.
Drop
Answers
B.
Deny
B.
Deny
Answers
C.
Reset client
C.
Reset client
Answers
D.
Reset server
D.
Reset server
Answers
Suggested answer: C

Explanation:

Sending a reset only to the client would ensure, for example, internal hosts receive a notification the session was reset and the browser is not left spinning or the application can close the established session while the remote server is left unaware. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClltCAC

Total 362 questions
Go to page: of 37