ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











A network security administrator wants to enable Packet-Based Attack Protection in a Zone Protection profile.

What are two valid ways to enable Packet-Based Attack Protection? (Choose two.)

A.
ICMP Drop
A.
ICMP Drop
Answers
B.
TCP Drop
B.
TCP Drop
Answers
C.
TCP Port Scan Block
C.
TCP Port Scan Block
Answers
D.
SYN Random Early Drop
D.
SYN Random Early Drop
Answers
Suggested answer: B, D

Explanation:

Packet-Based Attack Protection is a feature of Zone Protection Profiles that allows the firewall to drop packets that are malformed, spoofed, or part of a port scan. TCP Drop and SYN Random Early Drop are two options under Packet-Based

Attack Protection that can be enabled to protect against TCPbased attacks. TCP Drop enables the firewall to check for spoofed IP addresses, mismatched overlapping TCP segments, and invalid IP options. SYN Random Early Drop enables the firewall to drop SYN packets randomly when the SYN queue is full, preventing SYN flood attacks. ICMP Drop and TCP Port Scan Block are not valid options under Packet-Based Attack Protection

Where can a service route be configured for a specific destination IP?

A.
Use Network > Virtual Routers, select the Virtual Router > Static Routes > IPv4
A.
Use Network > Virtual Routers, select the Virtual Router > Static Routes > IPv4
Answers
B.
Use Device > Setup > Services > Services
B.
Use Device > Setup > Services > Services
Answers
C.
Use Device > Setup > Services > Service Route Configuration > Customize > Destination
C.
Use Device > Setup > Services > Service Route Configuration > Customize > Destination
Answers
D.
Use Device > Setup > Services > Service Route Configuration > Customize > IPv4
D.
Use Device > Setup > Services > Service Route Configuration > Customize > IPv4
Answers
Suggested answer: C

Explanation:

A service route is the path from the interface to the service on a server. By default, the firewall uses the management interface to communicate to various servers, including DNS, Email, Palo Alto

Updates, User-ID agent, Syslog, Panorama, dynamic updates, URL updates, licenses, and AutoFocus.

etc. Sometimes, it is necessary to use an alternative path other than Firewall management IP due to many restrictions. To configure service routes for non-predefined services, the destination addresses can be manually entered in the Destination section under Device > Setup > Services > Service Route Configuration > Customize1. Option A is incorrect because it is used to configure static routes for network traffic, not service routes for firewall services. Option B is incorrect because it is used to configure general service settings such as NTP server and proxy server, not service routes for specific destinations. Option D is incorrect because it is used to configure service routes for predefined services such as DNS and Syslog, not service routes for non-predefined services2.

Which feature of Panorama allows an administrator to create a single network configuration that can be reused repeatedly for large-scale deployments even if values of configured objects, such as routes and interface addresses, change?

A.
Template stacks
A.
Template stacks
Answers
B.
Template variables
B.
Template variables
Answers
C.
The Shared device group
C.
The Shared device group
Answers
D.
A device group
D.
A device group
Answers
Suggested answer: B

Explanation:

Template variables are placeholders that you can use in a template or a template stack to represent values that differ across firewalls, such as IP addresses, hostnames, or interface names. Template variables allow you to create a single network configuration that can be reused repeatedly for largescale deployments even if values of configured objects change1. Option A is incorrect because template stacks are used to group multiple templates together and apply them to firewalls or device groups. Template stacks do not allow you to use variables for different values2. Option C is incorrect because the Shared device group is used to push policies and objects that are common across all firewalls managed by Panoram a. The Shared device group does not allow you to use variables for different values3. Option D is incorrect because a device group is used to group firewalls that require similar policies and objects. A device group does not allow you to use variables for different values3.

A firewall administrator wants to have visibility on one segment of the company network. The traffic on the segment is routed on the Backbone switch. The administrator is planning to apply Security rules on segment X after getting the visibility.

There is already a PAN-OS firewall used in L3 mode as an internet gateway, and there are enough system resources to get extra traffic on the firewall. The administrator needs to complete this operation with minimum service interruptions and without making any IP changes.

What is the best option for the administrator to take?

A.
Configure the TAP interface for segment X on the firewall.
A.
Configure the TAP interface for segment X on the firewall.
Answers
B.
Configure vwire interfaces for segment X on the firewall.
B.
Configure vwire interfaces for segment X on the firewall.
Answers
C.
Configure a Layer 3 interface for segment X on the firewall.
C.
Configure a Layer 3 interface for segment X on the firewall.
Answers
D.
Configure a new vsys for segment X on the firewall.
D.
Configure a new vsys for segment X on the firewall.
Answers
Suggested answer: A

Explanation:

A TAP interface is a dedicated interface on the firewall that can be connected to a switch SPAN or mirror port to passively monitor traffic flows across a network. A TAP interface provides application visibility and threat detection without being in the flow of network traffic. A TAP interface does not require any IP changes or service interruptions on the network segment1. Option B is incorrect because vwire interfaces are used to create virtual wires that transparently connect two network segments. Vwire interfaces require physical cabling changes and may cause service interruptions on the network segment2. Option C is incorrect because a Layer 3 interface is used to route traffic between different subnets. A Layer 3 interface requires IP changes and may cause service interruptions on the network segment2. Option D is incorrect because a new vsys is used to create a virtual system that can have its own set of policies and objects. A new vsys does not provide visibility or security for a specific network segment3.

Refer to the exhibit.

An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported excessive traffic on the corporate WAN.

How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all the existing monitoring/security platforms?

A.
Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services
A.
Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services
Answers
B.
Configure log compression and optimization features on all remote firewalls
B.
Configure log compression and optimization features on all remote firewalls
Answers
C.
Any configuration on an M-500 would address the insufficient bandwidth concerns
C.
Any configuration on an M-500 would address the insufficient bandwidth concerns
Answers
D.
Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW
D.
Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW
Answers
Suggested answer: A

Explanation:

Forwarding logs from firewalls only to Panorama and having Panorama forward logs to other external services is the best option for the administrator to reduce WAN traffic while maintaining support for all the existing monitoring/security platforms. This option minimizes the number of log forwarding destinations on each firewall and consolidates log forwarding on Panoram a. Panorama can forward logs to external destinations such as syslog servers, email servers, SNMP trap receivers, HTTP servers, or AutoFocus1. Option B is incorrect because configuring log compression and optimization features on all remote firewalls may reduce the size of log files but does not reduce the number of log forwarding destinations. Option C is incorrect because any configuration on an M-500 would not address the insufficient bandwidth concerns. An M-500 is a dedicated log collector that can store logs from multiple firewalls and Panorama appliances. However, it does not reduce the WAN traffic generated by log forwarding2. Option D is incorrect because forwarding logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW does not reduce WAN traffic while maintaining support for all the existing monitoring/security platforms. This option would increase the WAN traffic by sending logs back and forth between Panorama and the NGFW1.

An ISP manages a Palo Alto Networks firewall with multiple virtual systems for its tenants.

Where on this firewall can the ISP configure unique service routes for different tenants?

A.
Setup > Services > Virtual Systems > Set Location > Service Route Configuration > Inherit GlobalService Route Configuration
A.
Setup > Services > Virtual Systems > Set Location > Service Route Configuration > Inherit GlobalService Route Configuration
Answers
B.
Setup > Services > Global > Service Route Configuration > Customize
B.
Setup > Services > Global > Service Route Configuration > Customize
Answers
C.
Setup > Services > Virtual Systems > Set Location > Service Route Configuration > Customize
C.
Setup > Services > Virtual Systems > Set Location > Service Route Configuration > Customize
Answers
D.
Setup > Services > Global > Service Route Configuration > Use Management Interface for all
D.
Setup > Services > Global > Service Route Configuration > Use Management Interface for all
Answers
Suggested answer: C

Explanation:

The best option for the ISP to configure unique service routes for different tenants is to use the Setup > Services > Virtual Systems > Set Location > Service Route Configuration > Customize option on the firewall. This option allows the ISP to customize the service routes for each virtual system that represents a tenant. A service route is the path from the interface to the service on a server, such as DNS, email, or Panorama. By customizing the service routes for each virtual system, the ISP can ensure that each tenant uses a different interface or IP address to access these services1. Option A is incorrect because it is used to inherit the global service route configuration for a virtual system, not to customize it.

Option B is incorrect because it is used to customize the global service route configuration for all virtual systems, not for a specific one. Option D is incorrect because it is used to use the management interface for all service routes, not to customize them1.

In the New App Viewer under Policy Optimizer, what does the compare option for a specific rule allow an administrator to compare?

A.
The running configuration with the candidate configuration of the firewall
A.
The running configuration with the candidate configuration of the firewall
Answers
B.
Applications configured in the rule with their dependencies
B.
Applications configured in the rule with their dependencies
Answers
C.
Applications configured in the rule with applications seen from traffic matching the same rule
C.
Applications configured in the rule with applications seen from traffic matching the same rule
Answers
D.
The security rule with any other security rule selected
D.
The security rule with any other security rule selected
Answers
Suggested answer: C

Explanation:

The compare option for a specific rule in the New App Viewer under Policy Optimizer allows an administrator to compare the applications configured in the rule with the applications seen from traffic matching the same rule. This option helps the administrator to identify any discrepancies between the intended and actual applications allowed by the rule. The administrator can then optimize the rule by adding or removing applications as needed1. Option A is incorrect because the compare option does not compare the running configuration with the candidate configuration of the firewall. That is done by using the Commit > Commit and Push option2. Option B is incorrect because the compare option does not compare applications configured in the rule with their dependencies. That is done by using the App Dependencies tab under Policy Optimizer1. Option D is incorrect because the compare option does not compare the security rule with any other security rule selected. That is done by using the Compare Rules option under Policies > Security3.

Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)

A.
Log Ingestion
A.
Log Ingestion
Answers
B.
HTTP
B.
HTTP
Answers
C.
Log Forwarding
C.
Log Forwarding
Answers
D.
LDAP
D.
LDAP
Answers
Suggested answer: B, C

A firewall engineer creates a destination static NAT rule to allow traffic from the internet to a webserver hosted behind the edge firewall. The pre-NAT IP address of the server is 153.6 12.10, and the post-NAT IP address is 192.168.10.10.

Refer to the routing and interfaces information below.

What should the NAT rule destination zone be set to?

A.
None
A.
None
Answers
B.
Outside
B.
Outside
Answers
C.
DMZ
C.
DMZ
Answers
D.
Inside
D.
Inside
Answers
Suggested answer: B

Explanation:

The destination zone in the NAT rule is determined after the route lookup of the destination IP address in the original packet (that is, the pre-NAT destination IP address).

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/nat-configurationexamples/destination-nat-exampleone-to-one-mapping

The NAT rule destination zone should be set to the zone where the traffic is destined before NAT. In this case, the traffic from the internet is destined to the pre-NAT IP address of the server, which is 153.6.12.10. This IP address belongs to the Outside zone, as shown in the routing and interfaces information. Therefore, the NAT rule destination zone should be set to Outside. The other options are not correct. None is not a valid option for the NAT rule destination zone. Inside and DMZ are the zones where the traffic is destined after NAT, which is 192.168.10.10. Reference: :

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/networking/nat/source-anddestination-nat/configure-destination-nat

The NAT rule destination zone should be set to Outside because that is the zone where the post-NAT IP address of the server (192.168.10.10) belongs. The destination zone of a NAT rule is the zone where the translated IP address resides.

Option A is incorrect because None is not a valid zone for a NAT rule. Option C is incorrect because DMZ is the zone where the pre-NAT IP address of the server (153.6 12.10) belongs, not the post-NAT IP address. Option D is incorrect because Inside is not a zone that is configured on the firewall.

An administrator is troubleshooting why video traffic is not being properly classified.

If this traffic does not match any QoS classes, what default class is assigned?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: D

Explanation:

The default class that is assigned to traffic that does not match any QoS classes is class 4. Class 4 is the default class for any session not matched to a QoS policy. QoS policy, like security policy, is processed top to bottom and the first policy match will be applied. If no policy match is found, the traffic is assigned to class 412. Option A is incorrect because class 1 is not the default class for unmatched traffic. Class 1 is a user-defined class that can be used to assign traffic based on QoS policy criteria. Option B is incorrect because class 2 is not the default class for unmatched traffic. Class 2 is a userdefined class that can be used to assign traffic based on QoS policy criteria. Option C is incorrect because class 3 is not the default class for unmatched traffic. Class 3 is a user-defined class that can be used to assign traffic based on QoS policy criteria3.

Total 426 questions
Go to page: of 43