PCNSE(201-248)
問題一覧
1
Virtual router, Security zone
2
Create V-Wire objects with two V-Wire subinterfaces and assign only a single VLAN ID to the "Tag Allowed" field of the V-Wire object. Repeat for every additional VLAN and use a VLAN ID of 0 for untagged traffic. Assign each interface/subinterface to unique zone
3
Virtual systems that do not have a specific service routes configured inherit the global service and service route settings for the firewall.
4
Custom application
5
A self-signed Certificate Authority certificate generated by the firewall
6
Active
7
Address Objects -Shared Address 1 -Shared Address 2 -Branch Address 1 Policies -Shared Policy 1 -Branch Policy 1
8
Add the IP address to the reconnaissance protection source address exclusion in the DoS protection profile
9
The USB must be formatted using the ext3 file system, FAT32 is not supported
10
link requirements, IP Addresses, branch and hub locations
11
Use the CLI command show high-availability flap-statistics, Check the HA Link Monitoring interface cables, Check the High Availability > Link and Path Monitoring seeings
12
Layer 3 security chain
13
verify and install, upload and install, install and reboot
14
hot potato routing
15
on-demand (manual user initiated connection), user-logon (always on), pre-logon then on-demand
16
App-ID
17
It shows how your current configuration compares to PaloAlto Networks recommendations
18
The IP-address and corresponding server type (Microsoft Active Directory or Microsoft Exchange) for each of the six servers
19
You must use a static IP address
20
Change the HA timer profile to "user-defined" and manually set the timers
21
server certificate
22
NAT Rule : Source Zone : Trust Source IP : Any Destination Zone : Server Destination IP : 172.16.15.10 Source Translation : dynamic-ip-and-port ethernet1/4 Security Rule : Security Zone : Trust Source IP : Any Destination Zone : Server Destination IP : 172.16.15.10 Application : SSH
23
mismatched Proxy-IDs
24
Use PFS in a Decryption for higher-priority and higher risk traffic, and use the less processor-intensive decryption for lower-risk traffic
25
Aggregate ethernet
26
①In eitherthe NGFW or in Panorama, on the Operations/Support tab, download the technical support file, ②Log in the Customer Support Portal(CSP) and negotiate to Tools > Best Practice Assessment, Upload or drag and drop the technical support file, Map the zone type and area of the architecture to each zone, Follow the steps to download the BPA report bundle
27
Choose the download and install action for both members of the HA pair in the Schedule object
28
Create an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy
29
Use the Recommended profile for typical failover timer settings
30
Ensure that a Threat Prevention subscription is active
31
Source IP : Any Destination IP : 206.15.22.9 Source Zone : Internet Destination Zone : Internet Destination Service : 80/TCP Action : Destination NAT Translated IP : 10.1.1.22 Translated Port : Zone
32
The /content folder is missing from the bootstrap package
33
Layer, Virtual Wire, Layer 3
34
System logs, Task Manager
35
GrobalProtect portal
36
Guest devices may not trust the CA certificate used for the forward trust certificate
37
unsupported ciphers, mutual authentication, certificate pinning
38
Disable pre-defined reports
39
Enable PFS under the IKE gateway advanced options
40
PAN-DB URL category in URL filtering profile
41
Zone Protection
42
certificate profile, certificate authority (CA) certificate
43
files matching Anti-Virus signatures
44
The firewall rejects the pushed configuration, and the commit fails
45
①The firewall hashes the firewall and looks up a verdict in the WildFire database. However, the firewall does not find a match, ②WildFire uses static analysis based on machine learning to analyze the file, in order to classify malicious features, ③Regardless of the verdict, WildFire uses a heuristic engine to examine the file and determines that the file exhibits suspicious behavior, ④WildFire genrates a new DNS, URL categorization, and antivirus signatures for the new threat
46
Configure mobile users with trust-to-untrust Security policy rules to allow the desired traffic outbound to the internet, Configure mobile users with a service connection and trust-to-trust Security policy rules to allow the desired traffic outbound to the internet, Configure remote networks with a service connection and trust-to-untrust Security policy rules to allow the desired traffic outbound to the internet, Configure remote networks with trust-to-trust Security policy rules to allow the desired traffic outbound to the internet
問題一覧
1
Virtual router, Security zone
2
Create V-Wire objects with two V-Wire subinterfaces and assign only a single VLAN ID to the "Tag Allowed" field of the V-Wire object. Repeat for every additional VLAN and use a VLAN ID of 0 for untagged traffic. Assign each interface/subinterface to unique zone
3
Virtual systems that do not have a specific service routes configured inherit the global service and service route settings for the firewall.
4
Custom application
5
A self-signed Certificate Authority certificate generated by the firewall
6
Active
7
Address Objects -Shared Address 1 -Shared Address 2 -Branch Address 1 Policies -Shared Policy 1 -Branch Policy 1
8
Add the IP address to the reconnaissance protection source address exclusion in the DoS protection profile
9
The USB must be formatted using the ext3 file system, FAT32 is not supported
10
link requirements, IP Addresses, branch and hub locations
11
Use the CLI command show high-availability flap-statistics, Check the HA Link Monitoring interface cables, Check the High Availability > Link and Path Monitoring seeings
12
Layer 3 security chain
13
verify and install, upload and install, install and reboot
14
hot potato routing
15
on-demand (manual user initiated connection), user-logon (always on), pre-logon then on-demand
16
App-ID
17
It shows how your current configuration compares to PaloAlto Networks recommendations
18
The IP-address and corresponding server type (Microsoft Active Directory or Microsoft Exchange) for each of the six servers
19
You must use a static IP address
20
Change the HA timer profile to "user-defined" and manually set the timers
21
server certificate
22
NAT Rule : Source Zone : Trust Source IP : Any Destination Zone : Server Destination IP : 172.16.15.10 Source Translation : dynamic-ip-and-port ethernet1/4 Security Rule : Security Zone : Trust Source IP : Any Destination Zone : Server Destination IP : 172.16.15.10 Application : SSH
23
mismatched Proxy-IDs
24
Use PFS in a Decryption for higher-priority and higher risk traffic, and use the less processor-intensive decryption for lower-risk traffic
25
Aggregate ethernet
26
①In eitherthe NGFW or in Panorama, on the Operations/Support tab, download the technical support file, ②Log in the Customer Support Portal(CSP) and negotiate to Tools > Best Practice Assessment, Upload or drag and drop the technical support file, Map the zone type and area of the architecture to each zone, Follow the steps to download the BPA report bundle
27
Choose the download and install action for both members of the HA pair in the Schedule object
28
Create an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy
29
Use the Recommended profile for typical failover timer settings
30
Ensure that a Threat Prevention subscription is active
31
Source IP : Any Destination IP : 206.15.22.9 Source Zone : Internet Destination Zone : Internet Destination Service : 80/TCP Action : Destination NAT Translated IP : 10.1.1.22 Translated Port : Zone
32
The /content folder is missing from the bootstrap package
33
Layer, Virtual Wire, Layer 3
34
System logs, Task Manager
35
GrobalProtect portal
36
Guest devices may not trust the CA certificate used for the forward trust certificate
37
unsupported ciphers, mutual authentication, certificate pinning
38
Disable pre-defined reports
39
Enable PFS under the IKE gateway advanced options
40
PAN-DB URL category in URL filtering profile
41
Zone Protection
42
certificate profile, certificate authority (CA) certificate
43
files matching Anti-Virus signatures
44
The firewall rejects the pushed configuration, and the commit fails
45
①The firewall hashes the firewall and looks up a verdict in the WildFire database. However, the firewall does not find a match, ②WildFire uses static analysis based on machine learning to analyze the file, in order to classify malicious features, ③Regardless of the verdict, WildFire uses a heuristic engine to examine the file and determines that the file exhibits suspicious behavior, ④WildFire genrates a new DNS, URL categorization, and antivirus signatures for the new threat
46
Configure mobile users with trust-to-untrust Security policy rules to allow the desired traffic outbound to the internet, Configure mobile users with a service connection and trust-to-trust Security policy rules to allow the desired traffic outbound to the internet, Configure remote networks with a service connection and trust-to-untrust Security policy rules to allow the desired traffic outbound to the internet, Configure remote networks with trust-to-trust Security policy rules to allow the desired traffic outbound to the internet