ExamGecko
Question list
Search
Search

Related questions











Question 74 - PCNSE discussion

Report
Export

What is considered the best practice with regards to zone protection?

A.
Review DoS threat activity (ACC > Block Activity) and look for patterns of abuse
Answers
A.
Review DoS threat activity (ACC > Block Activity) and look for patterns of abuse
B.
Use separate log-forwarding profiles to forward DoS and zone threshold event logs separately from other threat logs
Answers
B.
Use separate log-forwarding profiles to forward DoS and zone threshold event logs separately from other threat logs
C.
If the levels of zone and DoS protection consume too many firewall resources, disable zone protection
Answers
C.
If the levels of zone and DoS protection consume too many firewall resources, disable zone protection
D.
Set the Alarm Rate threshold for event-log messages to high severity or critical severity
Answers
D.
Set the Alarm Rate threshold for event-log messages to high severity or critical severity
Suggested answer: A

Explanation:

The best practice with regards to zone protection is to review DoS threat activity (ACC > BlockActivity) and look for patterns of abuse. This way, you can identify the sources and types of DoS attacks that target your network zones and adjust your zone protection profiles and policies accordingly1. You can also use the DoS Protection dashboard widget to monitor the number of sessions that match DoS protection policies2. You do not need to use separate log-forwarding profiles to forward DoS and zone threshold event logs separately from other threat logs, as you can use a single log-forwarding profile to forward different types of logs to different destinations3. You shouldnot disable zone protection if the levels of zone and DoS protection consume too many firewall resources, as this would expose your network zones to potential DoS attacks. Instead, you shouldoptimize your zone protection profiles and policies to reduce the resource consumption4. You shouldnot set the Alarm Rate threshold for event-log messages to high severity or critical severity, as this would limit the visibility into DoS attacks that have lower severity levels. Instead, you should set theAlarm Rate threshold to a value that is appropriate for your network environment and traffic patterns. Reference: 1: https://docs.paloaltonetworks.com/best-practices/dos-and-zone-protection- best-practices/dos-and-zone-protection-best-practices/follow-post-deployment-dos-and-zone- protection-best-practices 2: https://docs.paloaltonetworks.com/pan-os/10-2/pan-os- admin/monitoring/use-the-acc-to-monitor-network-activity/use-the-acc-to-monitor-dos- protection 3: https:// docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/monitoring/configure-log-forwarding/log-forwarding-profiles 4: https://docs.paloaltonetworks.com/best-practices/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices/deploy-dos-and-zone-protection-using-best-practices : https://docs.paloaltonetworks.com/pan-os/10-2/pan-os- admin/networking/network-profiles/zone-protection-profiles/configure-a-zone-protection-profile

asked 23/09/2024
Tural Pashayev
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first