ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











A firewall engineer has determined that, in an application developed by the company's internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.

Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?

A.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
A.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
Answers
B.
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
B.
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
Answers
C.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
C.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
Answers
D.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
D.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Answers
Suggested answer: C

Explanation:

For an application that is currently identified as unknown-tcp and has sessions that often remain idle for long periods, creating a custom application and using an application override rule is the most time-efficient solution.

C) The process involves:

Creating a custom application in the Palo Alto Networks firewall and configuring it with specific timeouts to accommodate the application's idle session behavior. This step ensures that the firewall does not prematurely close the application's sessions due to inactivity.

Next, creating an application override rule that references the custom application. This rule directs the firewall to identify traffic matching the rule criteria (such as source, destination, and port information) as the custom application, bypassing the App-ID engine's regular identification process.

This approach allows for the quick implementation of a solution that ensures the application is properly identified in traffic logs without undergoing threat scanning, meeting the requirements for both identification and reporting.

What happens when the log forwarding built-in action with tagging is used?

A.
Destination IP addresses of selected unwanted traffic are blocked. *
A.
Destination IP addresses of selected unwanted traffic are blocked. *
Answers
B.
Selected logs are forwarded to the Azure Security Center.
B.
Selected logs are forwarded to the Azure Security Center.
Answers
C.
Destination zones of selected unwanted traffic are blocked.
C.
Destination zones of selected unwanted traffic are blocked.
Answers
D.
Selected unwanted traffic source zones are blocked.
D.
Selected unwanted traffic source zones are blocked.
Answers
Suggested answer: A

Explanation:

When using the log forwarding built-in action with tagging in Palo Alto Networks firewalls, the primary purpose is to dynamically respond to threats or unwanted traffic identified by the firewall's threat detection mechanisms. The action involves tagging the IP address associated with the unwanted traffic and then using that tag in dynamic security policies to block or manage the traffic.

A) Destination IP addresses of selected unwanted traffic are blocked:

When the tagging action is used, the firewall tags the IP addresses involved in the unwanted traffic (which could be the source or destination IP addresses, but in many configurations, the focus is on the source of the attack). These tags can then be referenced in Dynamic Address Groups (DAGs) within security policies. Consequently, any traffic coming from or going to these tagged IP addresses can be blocked or subjected to specific security rules, effectively mitigating the threat or unwanted behavior.

This approach allows for automated, real-time responses to identified threats, enhancing the security posture by quickly adapting to emerging threats without manual intervention.

An administrator plans to deploy 15 firewalls to act as GlobalProtect gateways around the world. Panorama will manage the firewalls.

The firewalls will provide access to mobile users and act as edge locations to on-premises infrastructure. The administrator wants to scale the configuration out quickly and wants all of the firewalls to use the same template configuration.

Which two solutions can the administrator use to scale this configuration? (Choose two.)

A.
collector groups
A.
collector groups
Answers
B.
template stacks
B.
template stacks
Answers
C.
virtual systems
C.
virtual systems
Answers
D.
variables
D.
variables
Answers
Suggested answer: B, D

Explanation:

When deploying a large number of firewalls, such as 15 GlobalProtect gateways around the world, it's crucial to have a scalable configuration approach. Panorama offers several features to help scale configurations efficiently:

B) Template stacks:

Template stacks in Panorama allow administrators to create a collection of configuration templates that can be applied to multiple firewalls or device groups. This enables the consistent deployment of shared settings (such as network configurations, security profiles, etc.) across all managed firewalls, ensuring uniformity and reducing the effort required to manage individual firewall configurations.

D) Variables:

Variables in Panorama provide a way to customize template configurations for individual firewalls or device groups without altering the overall template. For example, a variable can be used to define a unique IP address, hostname, or other specific settings within a shared template. When the template is applied, Panorama replaces the variables with the actual values specified for each device or device group, allowing for customization within a standardized framework.

By using template stacks and variables, an administrator can rapidly deploy and manage configurations across multiple GlobalProtect gateways, ensuring consistency while still accommodating site-specific requirements. This approach streamlines the deployment process and enhances the manageability of a widespread GlobalProtect infrastructure.

A network security engineer needs to ensure that virtual systems can communicate with one another within a Palo Alto Networks firewall. Separate virtual routers (VRs) are created for each virtual system.

In addition to confirming security policies, which three configuration details should the engineer focus on to ensure communication between virtual systems? {Choose three.)

A.
External zones with the virtual systems added.
A.
External zones with the virtual systems added.
Answers
B.
Layer 3 zones for the virtual systems that need to communicate.
B.
Layer 3 zones for the virtual systems that need to communicate.
Answers
C.
Add a route with next hop set to none, and use the interface of the virtual systems that need to communicate.
C.
Add a route with next hop set to none, and use the interface of the virtual systems that need to communicate.
Answers
D.
Add a route with next hop next-vr by using the VR configured in the virtual system.
D.
Add a route with next hop next-vr by using the VR configured in the virtual system.
Answers
E.
Ensure the virtual systems are visible to one another.
E.
Ensure the virtual systems are visible to one another.
Answers
Suggested answer: A, D, E

Explanation:

For virtual systems (vSys) on a Palo Alto Networks firewall to communicate with each other, especially when separate virtual routers (VRs) are used for each vSys, the configuration must facilitate proper routing and security policy enforcement. The key aspects to focus on include:

A) External zones with the virtual systems added:

External zones are special types of zones that are used to facilitate traffic flow between virtual systems within the same physical firewall. By adding virtual systems to an external zone, you enable them to communicate with each other, effectively bypassing the need for traffic to exit and re-enter the firewall.

D) Add a route with next hop next-vr by using the VR configured in the virtual system:

When using separate VRs for each vSys, it's essential to configure inter-VR routing. This is done by adding routes in each VR with the next hop set to 'next-vr', specifying the VR of the destination vSys. This setup enables traffic to be routed from one virtual system's VR to another, facilitating communication between them.

E) Ensure the virtual systems are visible to one another:

Visibility between virtual systems is a prerequisite for inter-vSys communication. This involves configuring the virtual systems in a way that they are aware of each other's existence. This is typically managed in the vSys settings, where you can specify which virtual systems can communicate with each other.

By focusing on these configuration details, the network security engineer can ensure that the virtual systems can communicate effectively, maintaining the necessary isolation while allowing the required traffic flow.

A company configures its WildFire analysis profile to forward any file type to the WildFire public cloud. A company employee receives an email containing an unknown link that downloads a malicious Portable Executable (PE) file.

What does Advanced WildFire do when the link is clicked?

A.
Performs malicious content analysis on the linked page, but not the corresponding PE file.
A.
Performs malicious content analysis on the linked page, but not the corresponding PE file.
Answers
B.
Performs malicious content analysis on the linked page and the corresponding PE file.
B.
Performs malicious content analysis on the linked page and the corresponding PE file.
Answers
C.
Does not perform malicious content analysis on either the linked page or the corresponding PE file.
C.
Does not perform malicious content analysis on either the linked page or the corresponding PE file.
Answers
D.
Does not perform malicious content analysis on the linked page, but performs it on the corresponding PE file.
D.
Does not perform malicious content analysis on the linked page, but performs it on the corresponding PE file.
Answers
Suggested answer: D

Explanation:

Palo Alto Networks' WildFire service is designed to perform advanced analysis on files to identify and protect against new and evolving threats. When a WildFire analysis profile is configured to forward any file type to the WildFire public cloud, the service analyzes files that pass through the firewall based on the policy configuration.

D) Does not perform malicious content analysis on the linked page, but performs it on the corresponding PE file:

When a user clicks on an unknown link that downloads a Portable Executable (PE) file, WildFire's primary focus is on the file itself rather than the webpage from which it originated. The service analyzes the PE file to determine if it contains malicious content. This analysis includes static and dynamic inspection techniques to uncover any malicious behavior.

The webpage hosting the link may not be analyzed as part of this process unless specific protections or URL filtering policies are in place that trigger such an analysis. The primary concern in this scenario is the PE file, which is directly analyzed by WildFire for malicious content.

By focusing on the files that could pose a direct threat to the network, WildFire provides a robust mechanism for identifying and mitigating potential security risks associated with file downloads.

A network administrator notices a false-positive state after enabling Security profiles. When the administrator checks the threat prevention logs, the related signature displays the following:

threat type: spyware category: dns-c2 threat ID: 1000011111

Which set of steps should the administrator take to configure an exception for this signature?

A.
Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS exceptions tabs Search related threat ID and click enable Commit
A.
Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS exceptions tabs Search related threat ID and click enable Commit
Answers
B.
Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the signature exceptions tab and then click show all signatures Search related threat ID and click enable Change the default action Commit
B.
Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the signature exceptions tab and then click show all signatures Search related threat ID and click enable Change the default action Commit
Answers
C.
Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the Exceptions lab and then click show all signatures Search related threat ID and click enable Commit
C.
Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the Exceptions lab and then click show all signatures Search related threat ID and click enable Commit
Answers
D.
Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the Exceptions lab and then click show all signatures Search related threat ID and click enable Commit
D.
Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the Exceptions lab and then click show all signatures Search related threat ID and click enable Commit
Answers
Suggested answer: A

Explanation:

When dealing with a false positive, particularly for a spyware threat detected through DNS queries (as indicated by the category 'dns-c2'), the correct course of action involves creating an exception in the Anti-Spyware profile, not the Vulnerability Protection profile. This is because the Anti-Spyware profile in Palo Alto Networks firewalls is designed to detect and block spyware threats, which can include command and control (C2) activities often signaled by DNS queries.

The steps to configure an exception for this specific spyware signature (threat ID: 1000011111) are as follows:

Navigate to Objects > Security Profiles > Anti-Spyware. This is where all the Anti-Spyware profiles are listed.

Select the related Anti-Spyware profile that is currently applied to the security policy which is generating the false positive.

Within the profile, go to the DNS Exceptions tab. This tab allows you to specify exceptions based on DNS signatures.

Search for the related threat ID (in this case, 1000011111) and click enable to create an exception for it. By doing this, you instruct the firewall to bypass the detection for this specific signature, effectively treating it as a false positive.

Commit the changes to make the exception active.

By following these steps, the administrator can effectively address the false positive without disabling the overall spyware protection capabilities of the firewall.

A firewall engineer is configuring quality of service (OoS) policy for the IP address of a specific server in an effort to limit the bandwidth consumed by frequent downloads of large files from the internet.

Which combination of pre-NAT and / or post-NAT information should be used in the QoS rule?

A.
Post-NAT source IP address Pre-NAT source zone
A.
Post-NAT source IP address Pre-NAT source zone
Answers
B.
Post-NAT source IP address Post-NAT source zone
B.
Post-NAT source IP address Post-NAT source zone
Answers
C.
Pre-NAT source IP address Post-NAT source zone
C.
Pre-NAT source IP address Post-NAT source zone
Answers
D.
Pre-NAT source IP address Pre-NAT source zone
D.
Pre-NAT source IP address Pre-NAT source zone
Answers
Suggested answer: D

Explanation:

When configuring Quality of Service (QoS) policies, particularly for traffic going to or from specific IP addresses and involving NAT, it's important to base the rule on how the firewall processes the traffic. For QoS, the firewall evaluates traffic using pre-NAT IP addresses and zones because QoS policies typically need to be applied before the NAT action occurs. This is especially true for inbound traffic, where the goal is to limit bandwidth before the destination IP is translated.

The correct combination for a QoS rule in this scenario, where the aim is to limit bandwidth for downloads from a specific server (implying inbound traffic to the server), would be:

D. Pre-NAT source IP address Pre-NAT source zone: Pre-NAT source IP address: This refers to the original IP address of the client or source device before any NAT rules are applied. Since QoS policies are evaluated before NAT, using the pre-NAT IP address ensures that the policy applies to the correct traffic. Pre-NAT source zone: This is the zone associated with the source interface before NAT takes place. Using the pre-NAT zone ensures that the QoS policy is applied to traffic as it enters the firewall, before any translations or routing decisions are made. By configuring the QoS rule with pre-NAT information, the firewall can accurately apply bandwidth limitations to the intended traffic, ensuring efficient use of network resources and mitigating the impact of large file downloads from the specified server. For detailed guidelines on configuring QoS policies, refer to the Palo Alto Networks documentation, which provides comprehensive instructions and best practices for managing bandwidth and traffic priorities on the network.

A firewall engineer creates a source NAT rule to allow the company's internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule.

Which set of steps should the engineer take to accomplish this objective?

A.
1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port. 2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none. 3. Place (NAT-Rule-1) above (NAT-Rule-2).
A.
1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port. 2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none. 3. Place (NAT-Rule-1) above (NAT-Rule-2).
Answers
B.
1- Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.0/23. 2. Check the box for negate option to negate this IP subnet from NAT translation.
B.
1- Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.0/23. 2. Check the box for negate option to negate this IP subnet from NAT translation.
Answers
C.
1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port. 2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none. 3. Place (NAT-Rule-2) above (NAT-Rule-1).
C.
1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port. 2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none. 3. Place (NAT-Rule-2) above (NAT-Rule-1).
Answers
D.
1. Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.10/32. 2. Check the box for negate option to negate this IP from the NAT translation.
D.
1. Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.10/32. 2. Check the box for negate option to negate this IP from the NAT translation.
Answers
Suggested answer: C

Explanation:

In Palo Alto Networks firewalls, the processing of NAT rules occurs in a top-down fashion, similar to security policies. To exclude a specific IP address from a broader source NAT rule, a more specific NAT rule must be placed above the broader rule.

C) Place a more specific NAT rule above the broader one:

Create a source NAT rule (NAT-Rule-1) to translate the broader network range (10.0.0.0/23) with dynamic IP and port translation. This rule allows the majority of the subnet to access the internet through NAT.

Create another NAT rule (NAT-Rule-2) with the source IP address in the original packet set specifically to the IP address that should not be translated (10.0.0.10/32). In this rule, set the source translation to none, indicating that this traffic should not be translated and thus not allowed to access the internet.

Place NAT-Rule-2 above NAT-Rule-1 in the NAT policy list. This ensures that the more specific rule (NAT-Rule-2) is evaluated first. If traffic matches NAT-Rule-2, it will not be translated or allowed to the internet, effectively excluding the specific server from internet access.

This configuration leverages the principle of specificity and the order of operation in NAT policies to exclude a specific IP address from source NAT translation, thereby preventing it from accessing the internet.

Which rule type controls end user SSL traffic to external websites?

A.
SSL Outbound Proxyless Inspection
A.
SSL Outbound Proxyless Inspection
Answers
B.
SSL Forward Proxy
B.
SSL Forward Proxy
Answers
C.
SSH Proxy
C.
SSH Proxy
Answers
D.
SSL Inbound Inspection
D.
SSL Inbound Inspection
Answers
Suggested answer: B

Explanation:

The SSL Forward Proxy rule type is designed to control and inspect SSL traffic from internal users to external websites. When an internal user attempts to access an HTTPS site, the Palo Alto Networks firewall, acting as an SSL Forward Proxy, intercepts the SSL request. It then establishes an SSL connection with the requested website on behalf of the user. Simultaneously, the firewall establishes a separate SSL connection with the user. This setup allows the firewall to decrypt and inspect the traffic for threats and compliance with security policies before re-encrypting and forwarding the traffic to its destination.

This process is transparent to the end user and ensures that potentially harmful content delivered over encrypted SSL connections can be identified and blocked. SSL Forward Proxy is a critical component of a comprehensive security strategy, allowing organizations to enforce security policies and protect against threats in encrypted traffic.

Forwarding of which two log types is configured in Device > Log Settings? (Choose two.)

A.
Threat
A.
Threat
Answers
B.
HIP Match
B.
HIP Match
Answers
C.
Traffic
C.
Traffic
Answers
D.
Configuration
D.
Configuration
Answers
Suggested answer: A, C
Total 426 questions
Go to page: of 43