Centralized management using Strata Cloud Manager (SCM) and Strata Logging Service
Ask AstroTutor
What is the preferred method for gathering User-ID mappings from Citrix VDI servers?
AAgentless Server Monitoring
BGlobalProtect with an internal gateway
CThe Windows User-ID agent
DThe Terminal Services agent
0
Question 2
Improve security posture
0
Question 3
Operations
0
Question 4
Troubleshooting
0
Question 5
Policy creation and application
0
That's the end of the Preview
This exam has 58 community-verified practice questions. Create a free account to access all questions, comments, and explanations.
Topics covered:
Object configuration creation and applicationPolicy creation and applicationCentralized management using Strata Cloud Manager (SCM) and Strata Logging ServiceOperationsImprove security postureTroubleshooting
What is the default port used by the Terminal Services agent to communicate with a firewall?
A5009
B5007
C636
D443
Your customer wants to implement Active/Active High Availability for their PA-5260 pair. The following conditions are true in their environment:
-They are using multiple Layer 3 interfaces to process traffic.
-Their routing topology requires the use of Network Address Translation policies to ensure that traffic can reach its destinations correctly.
-They prefer to have the session workload distributed as evenly as possible to ensure both firewalls have lower resource utilization.
-They make use of dynamic routing protocols on their virtual routers for route-based redundancy.
-They chose to go with Active/Active for failover speed reasons.
Which three of the following HA configurations should your customer ensure they use to meet these requirements? (Choose three.)
AHA1A, HA1B, and HA2 interfaces
BHA1A, HA1B, HA2, and HA3 interfaces
CSession selection algorithm – Primary Device
DActive/Active HA Binding in the NAT policies
ESession selection algorithm – First Packet
Your customer believes that the Panorama appliance is being overwhelmed by the logs from deployed Palo Alto Networks Next-Generation Firewalls.
What CLI command can you run to determine the number of logs per second sent by each firewall?
Ashow logging status
Bdebug log-receiver statistics
Cshow log traffic
Ddebug log-sender statistics
An existing customer who has deployed several Palo Alto Networks Next-Generation Firewalls would like to start using Device-ID to obtain policy rule recommendations. They have also purchased a Support license, a Threat license, a URL Filtering license, and a WildFire license for each firewall.
What additional license do they need to purchase?
Aan IoT Security license for each deployed firewall
Ba Cortex Data Lake license
Can IoT Security license for the perimeter firewall
Dan Enterprise Data Loss Prevention (DLP) license
Question 6
Operations
0
Question 7
Operations
Question 8
Troubleshooting
Question 9
Policy creation and application
Question 10
Troubleshooting
Question 11
Improve security posture
Question 12
Operations
Question 13
Policy creation and application
Question 14
Policy creation and application
Question 15
Policy creation and application
Question 16
Improve security posture
Question 17
Troubleshooting
Question 18
Troubleshooting
Question 19
Object configuration creation and application
Question 20
Improve security posture
Question 21
Policy creation and application
Question 22
Troubleshooting
Question 23
Troubleshooting
Question 24
Troubleshooting
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
In Expedition, which objects are classified as “Ghost objects”?
AAddress objects that are not part of an Address Group
BAddress objects that are not applied in Security or NAT policies
CUnused address objects
DAddresses imported from Security and NAT policies without corresponding address objects.
Which routing configuration should you recommend to a customer who wishes to actively use multiple pathways to the same destination?
ARIPv2
BBGP
CEGMP
DOSPF
A company has deployed an Active/Passive 5280 HA pair with BGP configured to the company’s ISP. The lead firewall engineer has set the HA Timer to “Recommended”. Upon failing over the HA pair, there is a two-minute outage and internet traffic is dropped.
What should the engineer do to eliminate or minimize the outage in the future?
AChange the HA Timer to “Aggressive”.
BEnable Path Monitoring to the ISP.
CEnsure that “Graceful Restart” has been enabled on all peers.
DChange the HA Timer to “Advanced” with “Preemption Hold Time” of one minute.
SSL Forward Proxy decryption is enabled on the firewall. When clients use Chrome to browse to HTTPS sites, the firewall returns the Forward Trust certificate, even when accessing websites with invalid certificates. The clients need to be presented with a browser warning error with the option to proceed to websites with invalid certificates.
Which two options will satisfy this requirement? (Choose two.)
ACreate a PKI signed Forward Untrust enabled certificate.
BCreate a self-signed Forward Untrust enabled certificate.
CCreate a Decryption Profile with the “Block sessions with expired certificates” option enabled.
DRemove the Forward Untrust option from the Forward Trust certificate.
A customer recently purchased a license for URL filtering and is having trouble activating PAN-DB. Which two commands can be used to troubleshoot this issue? (Choose two.)
Ashow system setting url-database
Bshow device setting pan-db
Crequest url-database license info
Drequest license info
What are the three predefined external dynamic lists in PAN-OS that customers receive with their content and threat updates? (Choose three.)
Ahigh-risk IP addresses
Bbulletproof IP addresses
Cknown-malicious IP addresses
Dembargoed-country IP addresses
Ecommand-and-control IP addresses
With its improved reliability and automation, Expedition 2 will install by using which of the following?
ARed Hat Enterprise Linux (RHEL) 9
BUbuntu 16.04 and higher
CWindows Server 2016
DUbuntu 20.04
Instead of disabling App-IDs regularly, a security policy rule is going to be configured to temporarily allow new App-IDs. In which two circumstances is it valid to disable App-IDs as part of content update? (Choose two.)
Awhen planning to enable the App-IDs immediately
Bwhen you want to immediately benefit from the latest threat prevention
Cwhen an organization operates a mission-critical network and has zero tolerance for downtime
Dwhen disabling facebook-base to disable all other Facebook App-IDs
DRAG DROP -
In Panorama, the web interface displays the security rules in evaluation order. Organize the security rules in the order in which they will be evaluated?
A URL is categorized as both health-and-medicine and abused-drugs. The health-and-medicine category is set to “allow” and the abused-drugs category is set to “block”.
Which two actions will be taken when this URL is visited? (Choose two.)
Ablock
Blog
Callow
Dcontinue
The corporate architect has questions about the authentication algorithms supported by TLSv1.3.
Which two authentication algorithms are supported by Palo Alto Networks in TLSv1.3? (Choose two.)
ASHA384
BSHA256
CSHA1
DMD5
A customer uses an application on the network that shows unknown-tcp application in the traffic logs.
Which two actions can the administrator take to make the application display this information? (Choose two.)
ACreate a custom application by using fingerprinting applications
BSubmit a request for a new App-ID on the Application & Threat Research Center
CCreate a customer application by using signatures
DSubmit a request for new App-ID with Unit-42
What happens when a packet from an existing session is received by a firewall that is not the owner in an HA active/active configuration?
AThe firewall requests the sender to resend the packet.
BThe firewall forwards the packet to the peer firewall over the HA3 link.
CThe firewall takes ownership of the session from the peer firewall.
DThe firewall drops the packet to prevent any L3 loops.
DRAG DROP -
Match the task for server settings in group mapping with its order in the process.
Why is a threshold used when content updates are installed?
ATo let the firewall load the content updates before it actually installs them
BTo ensure that the content update is installed only during a change window
CTo allow time to see if the content update gets redacted by Palo Alto Networks
DTo allow the content updated to be loaded on a Friday but installed over the weekend
Examine the configured Security policy rule. Which day one/Iron Skillet Security Profile Group is used to secure the traffic that is permitted through this rule?
AInternal
BInbound
CDefault
DOutbound
A customer is adding a new site-to-site tunnel from a Palo Alto Networks NGFW to a third party with a policy based VPN peer. After the initial configuration is completed and the changes are committed, phase 2 fails to establish.
Which two changes may be required to fix the issue? (Choose two.)
AAdd proxy IDs to the IPsec tunnel configuration.
BVerify that the certificate used for authentication is installed.
CEnable the NAT Traversal advanced option.
DVerify that PFS is enabled on both ends.
Review the customer scenario:
An organization has deployed an Active/Passive 7080 HA pair in their data center.
The 7080 firewall has three 100G NPCs installed in slots 1, 2, and 12.
In slots 1 and 2, the NPCs are being used to create two 200G Aggregate Ethernets with LACP to their switch infrastructure in a Layer 3 deployment with OSPF and BGP routing.
The networking team has received alerts via SolarWinds recently that the NPC in slot 1 has a high DP load and high network utilization on one of its two interfaces.
What can you recommend to the team to balance the traffic more evenly and reduce high utilization of slot 1?
AEnable ECMP with Symmetric Return.
BEnable Jumbo Packets.
CChange the Session Distribution Policy.
DAdd a 100G interface from Slot 12 to the Aggregate Ethernet to provide more bandwidth.
A firewall that was previously connected to a User-ID agent server now shows disconnected.
What is the likely cause?
AThe server has stopped listening on port 2010.
BThe Domain Controller service account has been locked out.
CThe agent is not running.
DThe firewall was upgraded to a PAN-OS version that is not compatible with the agent version.