暗記メーカー
ログイン
PSE-Strata
  • His Taro

  • 問題数 183 • 6/14/2024

    記憶度

    完璧

    27

    覚えた

    66

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Which three actions should be taken before deploying a firewall evaluation unit in the customer's environment? (Choose three.)

    Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed , Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned , Inform the customer that they will need to provide a SPAN port for the evaluation unit assuming a TAP mode deployment

  • 2

    A prospective customer currently uses a firewall that provides only Layer 4 inspection and protections. The customer sees traffic going to an external destination, port 53, but cannot determine what Layer 7 application traffic is going over that port. Which capability of PAN-OS would address the customer's lack of visibility?

    App-ID, because it will give visibility into what exact applications are being run over that port and allow the customer to block unsanctioned applications using port 53

  • 3

    Which profile or policy should be applied to protect against port scans from the internet?

    Zone protection profile on the zone of the ingress interface

  • 4

    Which three mechanisms are valid for enabling user mapping? (Choose three.)

    client probing, domain server monitoring, Captive Portal

  • 5

    Which two actions should be taken prior to installing a decryption policy on an NGFW? (Choose two.)

    Ensure throughput will not be an issue. , Determine whether local / regional decryption laws apply.

  • 6

    A potential customer requires an NGFW solution that enables high-throughput, low-latency network security and also inspects the application. Which aspect of the Palo Alto Networks NGFW capabilities should be highlighted to help address these requirements?

    single-pass architecture (SPA)

  • 7

    Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

    Panorama VM-Series

  • 8

    Which PAN-OS feature helps prevent user credential theft?

    Advanced URL Filtering (AURLF)

  • 9

    What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two.)

    Tag the user using Panorama or the Web UI of the firewall. , Tag the user through the firewall's XML API.

  • 10

    What aspect of PAN-OS allows for the NGFW admin to create a policy that provides auto-remediation for anomalous user behavior and malicious activity while maintaining user visibility?

    Dynamic User Groups

  • 11

    What filtering criteria is used to determine what users to include as members of a dynamic user group?

    Tags

  • 12

    Which two methods will help avoid Split Brain when running HA in Active/Active mode? (Choose two.)

    Configure a Backup HA1 Interface , Configure a Heartbeat Backup

  • 13

    An Administrator needs a PDF summary report that contains information compiled from existing reports based on datafor the Top five(5) in each category. Which two timeframe options are available to send this report? (Choose two.)

    Daily, Weekly

  • 14

    Which two types of security chains are supported by the Decryption Broker? (Choose two.)

    transparent bridge, Layer 3

  • 15

    Which domain permission are required by the User-ID Agent for WMI Authentication on Windows Server?(Choose three)

    Distributed COM Users, Event Log Readers, Server Operator

  • 16

    Which two features are key in preventing unknown targeted attacks? (Choose two.)

    App-ID with the Zero Trust model, WildFire Cloud threat analysis

  • 17

    Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)

    use of device management access and settings , measure the adoption of URL filters, App-ID, User-ID, use of decryption policies

  • 18

    Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)

    HTTPS , HTTP

  • 19

    What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)

    when you're delivering a security strategy, when client's want to see the power of the platform, provide users visibility into the applications currently allowed on the network

  • 20

    A customer with a legacy firewall architecture focused on port-and-protocol-level security has heard that NGFWs open all ports by default. Which of the following statements regarding Palo Alto Networks NGFWs is an appropriate rebuttal that explains an advantage over legacy firewalls?

    They can control applications by application-default service ports or a configurable list of approved ports on a per-policy basis.

  • 21

    Which three platform components can identify and protect against malicious email links? (Choose three.)

    WildFire hybrid cloud solution, WildFire public cloud, WF-500

  • 22

    What are two advantages of the DNS Sinkholing feature? (Choose two.)

    It forges DNS replies to known malicious domains, It can work upstream from the internal DNS server.

  • 23

    The Palo Alto Networks Cloud Identity Engine (CIE) includes which service that supports Identity Providers (IdP)?

    Directory Sync and Cloud Authentication Service that support IdP using SAML 2.0

  • 24

    Which two actions can be configured in an Anti-Spyware profile to address command-and-control (C2) traffic from compromised hosts? (Choose two.)

    Alert, Reset

  • 25

    If a Palo Alto Networks Next-Generation Firewall (NGFW) already has Advanced Threat Prevention (ATP) enabled what is the throughput impact of also enabling Wildfire and Advanced URL Filtering (AURLF)?

    The throughput will remain consistent regardless of the additional subscriptions enabled.

  • 26

    In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

    command and control (C2) , malware , grayware

  • 27

    Which two of the following are required when configuring the Domain Credential Filter method for preventing phishing attacks? (Choose two.)

    IP-address-to-username mapping, Windows User-ID agent

  • 28

    You have enabled the WildFire ML for PE files in the antivirus profile and have added the profile to the appropriate firewall rules. When you go to Palo Alto Networks WildFire test av file and attempt to download the test file it is allowed through. In order to verify that the machine learning is working from the command line, which command returns a valid result?

    show mlav cloud-status

  • 29

    In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

    grayware, command and control (C2), malware

  • 30

    What is used to choose the best path on a virtual router that has two or more different routes to the same destination?

    Administrative distance

  • 31

    Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)

    use of decryption policies, measure the adoption of URL filters. App-ID. User-ID, use of device management access and settings

  • 32

    A customer requires an analytics tool with the following attributes: Uses the logs on the firewall to detect actionable events on the network. Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network. Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources. Which feature of PAN-OS will address these requirements?

    Automated correlation engine (ACE)

  • 33

    Which statement is true about deviating Devices and metrics?

    A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation

  • 34

    What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)

    Environments, Interfaces , Sessions

  • 35

    Which three features are used to prevent abuse of stolen credentials? (Choose three.)

    multi-factor authentication , URL Filtering Profiles , SSL decryption rules

  • 36

    A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions. Which Network Processing Card should be recommended in the Bill of Materials?

    A-7000-40G-NPC

  • 37

    What does WildFire block on a next-generation firewall (NGFW) that already has Advanced Threat Prevention (ATP) enabled?

    Malicious unknown files

  • 38

    A prospective customer wants to purchase a next-generation firewall (NGFW) and requires at least 2 million concurrent sessions with a minimum of 10Gbps of throughput with threat detection enabled. Which tool will help quickly determine the correct size of NGFW for this customer?

    Product Comparison tool available on the Palo Alto Networks website

  • 39

    Which step is required to ensure that web storage is not used to exfiltrate sensitive data from an enterprise that must use web storage to collaborate with business partners?

    Use Prisma SaaS to ensure that the information shared to the web storage is not sensitive.

  • 40

    Which two actions should be taken to provide some protection when a client chooses not to block uncategorized websites? (Choose two.)

    Add a URL-filtering profile with the action set to "Continue" for unknown URL categories attached to Security policy rules that allow web access. , Add a Security policy rule using only known URL categories with the action set to "Allow."

  • 41

    Which security profile on the NGFW includes signatures to protect you from brute force attacks?

    Vulnerability Protection Profile

  • 42

    WildFire subscription supports analysis of which three types? (Choose three.)

    7-Zip , Flash , ISO

  • 43

    The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security. The firewall provides which three types of reports? (Choose three.)

    PDF Summary Reports, Botnet Reports, User or Group Activity Reports

  • 44

    What is the default behavior in PAN-OS when a 12 MB portable executable (PE) file is forwarded to the WildFire cloud service?

    PE File is forwarded.

  • 45

    Which two products are included in the Prisma Brand? (Choose two.)

    Prisma Cloud Compute , Prisma Cloud Enterprise

  • 46

    There are different Master Keys on Panorama and managed firewalls. What is the result if a Panorama Administrator pushes configuration to managed firewalls?

    The push operation will fail regardless of an error or not within the configuration itself

  • 47

    Which three of the following are identified in the Best Practice Assessment tool? (Choose three.)

    use of device management access and settings, use of decryption policies, measurement of the adoption of URL filters, App-ID, and User-ID

  • 48

    Which PAN-OS feature should be discussed if a prospect wants to apply Security policy actions to traffic by using tags from their virtual environment?

    Dynamic User Groups

  • 49

    What is the correct behavior when a Palo Alto Networks next-generation firewall (NGFW) is unable to retrieve a DNS verdict from DNS service cloud in the configured lookup time?

    NGFW permit a response from the DNS server.

  • 50

    Which tool can review an imported configuration and assist with identifying which application-based rules should be implemented?

    Expedition

  • 51

    What helps avoid split brain in active/passive HA pair deployment?

    Use the management interface as the HA1 backup link

  • 52

    What are the three possible verdicts in WildFire Submissions log entries for a submitted sample? (Choose four.)

    Benign, Malicious, Phishing, Grayware

  • 53

    A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types. The customer uses a firewall with User-ID enabled Which feature must also be enabled to prevent these attacks?

    WildFire

  • 54

    A WildFire subscription is required for which two of the following activities? (Choose two.)

    Use the WildFire Application Programming Interface (API) to submit website links for analysis. , Forward advanced file types from the firewall for analysis.

  • 55

    Which two methods are used to check for Corporate Credential Submissions? (Choose two.)

    domain credential filter, IP user mapping

  • 56

    A customer is concerned about zero-day targeted attacks against its intellectual property. Which solution informs a customer whether an attack is specifically targeted at them?

    Cortex XDR Prevent

  • 57

    Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

    Inability to access websites, Exclude certain types of traffic in decryption policy , Include all traffic types in decryption policy

  • 58

    When having a customer pre-sales call, which aspects of the NGFW should be covered?

    The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks

  • 59

    Which two products can send logs to the Cortex Data Lake? (Choose two.)

    PA-3260 firewall, Prisma Access

  • 60

    Which statement is true about Deviating Devices and metrics?

    A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation

  • 61

    Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

    Connector , Operator , Attribute

  • 62

    XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer's requirements? (Choose two.)

    HA active/active, Policy-based forwarding

  • 63

    What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?

    allow the request and all subsequent responses

  • 64

    A potential customer requires an NGFW solution which enables high-throughput, low-latency network security, all while incorporating unprecedented features and technology. They need a solution that solves the performance problems that plague today's security infrastructure. Which aspect of the Palo Alto Networks NGFW capabilities can you highlight to help them address the requirements?

    SP3 (Single Pass Parallel Processing)

  • 65

    Which two platform components can identify and protect against malicious email links? (Choose two.)

    WildFire appliance, WildFire public cloud

  • 66

    What is an advantage of having WildFire machine learning (ML) capability inline on the firewall?

    It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity.

  • 67

    Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?

    User-ID and Device-ID

  • 68

    A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process?

    Categorize data and applications by levels of sensitivity

  • 69

    A WildFire subscription is required for which two of the following activities? (Choose two)

    Forward advanced file types from the firewall for analysis., Use the WildFire Application Programming Interface (API) to submit website links for analysis

  • 70

    Which three steps in the cyberattack lifecycle does Palo Alto Networks Security Operating Platform prevent? (Choose three.)

    deliver the malware , exfiltrate data , lateral movement

  • 71

    Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?

    Select Panorama > Licenses and click Activate feature using authorization code

  • 72

    The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

    DNS Security

  • 73

    Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

    Include all traffic types in decryption policy, Inability to access websites, Exclude certain types of traffic in decryption policy

  • 74

    Which deployment option of Advanced URL Filtering (AURLF) would help a prospect that actively uses PAC files?

    Explicit Proxy

  • 75

    A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds. How is this goal accomplished?

    Create a custom spyware signature matching the known signature with the time attribute

  • 76

    A packet that is already associated with a current session arrives at the firewall. What is the flow of the packet after the firewall determines that it is matched with an existing session?

    It is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through a single stream-based content inspection engine before egress.

  • 77

    What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)

    improved revenue due to more efficient network traffic throughput, Increased security due to scalable cloud delivered security Services (CDSS), Cost savings due to reduction in IT management effort and device

  • 78

    A prospective customer wants to purchase a next-generation firewall (NGFW) and requires at least 2 million concurrent sessions with a minimum of 10Gbps of throughput with threat detection enabled. Which tool will help quickly determine the correct size of NGFW for this customer?

    Product Comparison tool available on the Palo Alto Networks website

  • 79

    Which action can prevent users from unknowingly downloading potentially malicious file types from the internet?

    Apply a File Blocking profile to Security policy rules that allow general web access.

  • 80

    Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides auto remediation for anomalous user behavior and malicious activity while maintaining user visibility?

    dynamic user groups (DUGs)

  • 81

    A customer is designing a private data center to host their new web application along with a separate headquarters for users. Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?

    Advanced URL Filtering (AURLF)

  • 82

    What are the three possible verdicts in WildFire Submissions log entries for a submitted sample? (Choose three.)

    Benign, Malicious, Grayware

  • 83

    Decryption port mirroring is now supported on which platform?

    All hardware-based and VM-Series firewalls with the exception of VMware NSX. Citrix SDX, or public cloud hypervisors

  • 84

    What is an advantage of having WildFire machine learning (ML) capability inline on the firewall?

    It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity.

  • 85

    Which task would be included in the Best Practice Assessment (BPA) tool?

    Identify and provide recommendations for device configurations.

  • 86

    An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

    Remove unwanted categories listed under 'High Risk' and use relevant information

  • 87

    Which subscription allows for potential identification of zero-day malware?

    WildFire

  • 88

    Which four steps of the cyber attack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

    breach the perimeter, lateral movement, exfiltrate data, deliver the malware

  • 89

    What is the key benefit of Palo Alto Networks single-pass architecture (SPA) design?

    It requires only one processor to complete all the functions within the box.

  • 90

    Which Cloud Identity Engine service should be discussed if a prospect indicates they have an identity provider (IdP) that supports SAML 2.0?

    Directory Sync and Cloud Authentication Service

  • 91

    Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

    Define a uniform resource locator (URL) Filtering profile, Enable User-ID, Define a Secure Sockets Layer (SSL) decryption rule base

  • 92

    A customer worried about unknown attacks is hesitant to enable SSL decryption due to privacy and regulatory issues. How does the platform address the customer's concern?

    It allows a list of websites or URL categories to be defined for exclusion from decryption.

  • 93

    Which two interface types can be associated to a virtual router? (Choose two.)

    VLAN, Loopback

  • 94

    What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?

    Utilize dynamic updates with an aggressive update schedule

  • 95

    You have a prospective customer that is looking for a way to provide secure temporary access to contractors for a designated period of time. They currently add contractors to existing user groups and create ad hoc policies to provide network access. They admit that once the contractor no longer needs access to the network, administrators are usually too busy to manually delete policies that provided access to the contractor. This has resulted in over-provisioned access that has allowed unauthorized access to their systems. They are looking for a solution to automatically remove access for contractors once access is no longer required. You address their concern by describing which feature in the NGFW?

    Dynamic User Groups

  • 96

    A prospective customer with a limited budget has a remote office with 10 users and wants routing path redundancy. What should be recommended for this prospect?

    SD-WAN subscription

  • 97

    Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

    multi-factor authentication (MFA), URL Filtering Profiles

  • 98

    What are three considerations when deploying User-ID? (Choose three.)

    Specify included and excluded networks when configuring User-ID , Only enable User-ID on trusted zones , Use a dedicated service account for User-ID services with the minimal permissions necessary

  • 99

    Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

    Infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs.

  • 100

    In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

    Step 1: Define the protect surface