PCNSE Exam Topics
PCNSE Exam Topics
Question #1
Which CLI command is used to simulate traffic going through the firewall and determine
which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the
traffic?
A. check
B. find
C. test
D. sim
Question #2
Refer to the exhibit.
An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and
security management platforms. The network team has reported excessive traffic on the
corporate WAN. How could the Palo Alto Networks NGFW administrator reduce WAN traffic
while maintaining support for all the existing monitoring/security platforms?
A. Forward logs from firewalls only to Panorama and have Panorama forward logs to
other external services.
B. Forward logs from external sources to Panorama for correlation, and from
Panorama send them to the NGFW.
A. Virtual router
B. Security zone
C. ARP entries
D. Netflow Profile
Question #4
An administrator has been asked to configure a Palo Alto Networks NGFW to provide
protection against worms and trojans.
Which Security Profile type will protect against worms and trojans?
A. Anti-Spyware
B. Instruction Prevention
C. File Blocking
D. Antivirus
Question #5
A company needs to preconfigure firewalls to be sent to remote sites with the least amount
of preconfiguration. Once deployed, each firewall must establish secure tunnels back to
multiple regional data centers to include the future regional data centers.
Which VPN configuration would adapt to changes when deployed to the future site?
A. 0
B. 99
C. 1
D. 255
Question #7
An administrator pushes a new configuration from Panorama to a pair of firewalls that are
configured as an active/passive HA pair.
Which NGFW receives the configuration from Panorama?
C. Both the active and passive firewalls, which then synchronize with each other.
A.
B.
C.
D
Question #10
If a template stack is assigned to a device and the stack includes three templates with
overlapping settings, which settings are published to the device when the template stack is
pushed?
B. The administrator will be promoted to choose the settings for that chosen
firewall.
Question #11
Which method will dynamically register tags on the Palo Alto Networks NGFW?
A. Restful API or the VMware API on the firewall or on the User-ID agent or the
ready-only domain controller (RODC)
B. Restful API or the VMware API on the firewall or on the User-ID agent
C. XML API or the VMware API on the firewall or on the User-ID agent or the CLI
D. XML API or the VM Monitoring agent on the NGFW or on the User-ID agent
Question #12
How does an administrator schedule an Applications and Threats dynamic update while
delaying installation of the update for a certain amount of time?
C. Automatically ג€download only€ and then install Applications and Threats later,
after the administrator approves the update.
D. Automatically ג€download and installג€ but with the ג€disable new applicationsג€
option used.
Question #13
To connect the Palo Alto Networks firewall to AutoFocus, which setting must be enabled?
A. Device>Setup>Services>AutoFocus
B. Device> Setup>Management >AutoFocus
D. Device>Setup>WildFire>AutoFocus
Question #14
An administrator encountered problems with inbound decryption. Which option should the
administrator investigate as part of triage?
D. Microsoft Hyper-V
Question #16
Which User-ID method maps IP addresses to usernames for users connecting through an
802.1x-enabled wireless network device that has no native integration with PAN-OSֲ®
software?
A. XML API
B. Port Mapping
C. Client Probing
D. Server Monitoring
Question #17
Decrypted packets from the website https://www.microsoft.com will appear as which
application and service within the Traffic log?
A. web-browsing and 443
B. SSL and 80
D. web-browsing and 80
Question #18
Which PAN-OSֲ® policy must you configure to force a user to provide additional credentials
before he is allowed to access an internal application that contains highly-sensitive business
data?
A. Security policy
B. Decryption policy
C. Authentication policy
A. The configuration is invalid. The Profile Settings section will be grayed out when
the Action is set to ג€Denyג€.
B. The configuration will allow the matched session unless a vulnerability signature is
detected. The ג€Denyג€ action will supersede the per-severity defined actions defined
in the associated Vulnerability Protection Profile.
C. The configuration is invalid. It will cause the firewall to skip this Security policy
rule. A warning will be displayed during a commit.
D. The configuration is valid. It will cause the firewall to deny the matched sessions.
Any configured Security Profiles have no effect if the Security policy rule action is set to
ג€Denyג€.
Question #20
A user's traffic traversing a Palo Alto Networks NGFW sometimes can reach
http://www.company.com. At other times the session times out. The NGFW has been
configured with a PBF rule that the user's traffic matches when it goes to
http://www.company.com.How can the firewall be configured automatically disable the PBF
rule if the next hop goes down?
A. Create and add a Monitor Profile with an action of Wait Recover in the PBF rule in
question.
B. Create and add a Monitor Profile with an action of Fail Over in the PBF rule in
question.
C. Enable and configure a Link Monitoring Profile for the external interface of the
firewall.
D. Configure path monitoring for the next hop gateway on the default route in the
virtual router.
Question #21
What are two benefits of nested device groups in Panorama? (Choose two.)
A. NTLM
B. Redirect
C. Single Sign-On
D. Transparent
Question #23
An administrator needs to implement an NGFW between their DMZ and Core network.
A. Virtual Wire interfaces to permit EIGRP routing to remain between the Core and
DMZ
A Security policy rule allowing access from the Trust zone to the DMZ zone need to be
configured to enable we browsing access to the server.
Which application and service need to be configured to allow only cleartext web-browsing
traffic to thins server on tcp/8080?
A. The CA certificate for FWDtrust has not been imported into the firewall.
B. The FWDtrust certificate has not been flagged as Trusted Root CA.
C. SSL Forward Proxy requires a public certificate to be imported into the firewall.
A. Okta
B. DUO
C. RADIUS
D. PingID
Question #29
How would an administrator monitor/capture traffic on the management interface of the
Palo Alto Networks NGFW?
A. Use the debug dataplane packet-diag set capture stage firewall file command.
B. Enable all four stages of traffic capture (TX, RX, DROP, Firewall).
C. Use the debug dataplane packet-diag set capture stage management file
command.
A. Port Inspection
B. Certificate revocation
C. Content-ID
D. App-ID
Question #31
A session in the Traffic log is reporting the application as `incomplete.`
What does `incomplete` mean?
A. The three-way TCP handshake was observed, but the application could not be
identified.
B. The three-way TCP handshake did not complete.
C. The traffic is coming across UDP, and the application could not be identified.
D. Data was received but was instantly discarded because of a Deny policy was
applied before App-ID could be applied.
Question #32
Refer to the exhibit.
where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
A. Untrust (Any) to Untrust (10.1.1.1), web-browsing ג€" Allow
Question #33
An administrator needs to determine why users on the trust zone cannot reach certain
websites. The only information available is shown on the following image.
B.
C.
D.
E.
Question #34
Which three settings are defined within the Templates object of Panorama? (Choose three.)
A. Setup
B. Virtual Routers
C. Interfaces
D. Security
E. Application Override
Question #35
A customer has an application that is being identified as unknown-tcp for one of their
custom PostgreSQL database connections.
Which two configuration options can be used to correctly categorize their custom database
application? (Choose two.)
C. Custom application.
A. Admin Role
B. WebUI
C. Authentication
D. Authorization
Question #37
An administrator has left a firewall to use the default port for all management services.
Which three functions are performed by the dataplane? (Choose three.)
A. WildFire updates
B. NAT
C. NTP
D. antivirus
E. file blocking
Question #38
An administrator is using Panorama and multiple Palo Alto Networks NGFWs. After
upgrading all devices to the latest PAN-OSֲ® software, the administrator enables log
forwarding from the firewalls to Panorama.
Which action would enable the firewalls to send their pre-existing logs to Panorama?
D. The log database will need to exported form the firewalls and manually imported
into Panorama.
Question #39
A firewall just submitted a file to WildFire for analysis. Assume a 5-minute window for
analysis. The firewall is configured to check for verdicts every 5 minutes.
B. 5 minutes
C. 10 to 15 minutes
D. 5 to 10 minutes
Question #40
What are the differences between using a service versus using an application for Security
Policy match?
A. Use of a ג€serviceג€ enables the firewall to take immediate action with the first
observed packet based on port numbers. Use of an ג€applicationג€ allows the firewall
to take immediate action if the port being used is a member of the application
standard port list.
C. Use of a ג€serviceג€ enables the firewall to take immediate action with the first
observed packet based on port numbers. Use of an ג€applicationג€ allows the firewall
to take action after enough packets allow for App-ID identification regardless of the
ports being used
D. Use of a ג€serviceג€ enables the firewall to take action after enough packets allow
for App-ID identification
Question #41
Which Palo Alto Networks VM-Series firewall is valid?
A. VM-25
B. VM-800
C. VM-50
D. VM-400
Question #42
An administrator wants multiple web servers in the DMZ to receive connections initiated
from the internet.
Traffic destined for 206.15.22.9 port 80/TCP needs to be forwarded to the server at
10.1.1.22
Based on the information shown in the image, which NAT rule will forward web-browsing
traffic correctly?
A.
B.
C.
D.
Question #43
An administrator creates a custom application containing Layer 7 signatures. The latest
application and threat dynamic update is downloaded to the same NGFW.
The update contains an application that matches the same traffic signatures as the custom
application.
Which application should be used to identify traffic traversing the NGFW?
A. Custom application
D. Custom and downloaded application signature files are merged and both are used
Question #44
Starting with PAN-OS version 9.1, GlobalProtect logging information is now recorded in
which firewall log?
A. GlobalProtect
B. System
C. Authentication
D. Configuration
Question #45
Refer to the exhibit.
Which will be the egress interface if the traffic's ingress interface is ethernet1/7 sourcing
from 192.168.111.3 and to the destination 10.46.41.113?
A. ethernet1/6
B. ethernet1/3
C. ethernet1/7
D. ethernet1/5
Question #46
Which three authentication services can an administrator use to authenticate admins into
the Palo Alto Networks NGFW without defining a corresponding admin account on the local
firewall? (Choose three.)
A. Kerberos
B. PAP
C. SAML
D. TACACS+
E. RADIUS
F. LDAP
Question #47
Which event will happen if an administrator uses an Application Override Policy?
C. The application name assigned to the traffic by the security rule is written to the
Traffic log.
Question #48
Which Security policy rule will allow an admin to block facebook chat but allow Facebook in
general?
B. First four letters of the username matching any valid corporate username.
A. Client Probing
C. GlobalProtect
D. Syslog Monitoring
Question #52
An administrator needs to upgrade a Palo Alto Networks NGFW to the most current version
of PAN-OSֲ® software.
The firewall has internet connectivity through an Ethernet interface, but no internet
connectivity from the management interface.
The Security policy has the default security rules and a rule that allows all web- browsing
traffic from any to any zone.
What must the administrator configure so that the PAN-OSֲ® software can be upgraded?
B. CRL
C. Service route
D. Scheduler
Question #53
Which feature prevents the submission of corporate login information into website forms?
A. Data filtering
B. User-ID
C. File blocking
Question #54
Which option is part of the content inspection process?
A. MIB
B. RIB
C. SIP
D. FIB
Question #56
An administrator creates an SSL decryption rule decrypting traffic on all ports.
The administrator also creates a Security policy rule allowing only the applications
DNS, SSL, and web-browsing.
The administrator generates three encrypted BitTorrent connections and checks the Traffic
logs.
There are three entries. The first entry shows traffic dropped as application Unknown.
A. Create a decryption rule matching the encrypted BitTorrent traffic with action
ג€No-Decrypt,ג€ and place the rule at the top of the Decryption policy.
D. Create a Decryption Profile to block traffic using unsupported cyphers, and attach
the profile to the decryption rule.
Question #57
Refer to the exhibit.
B. Domain Sub-CA
C. Forward-Trust
D. Domain-Root-Cert
Question #58
Which option would an administrator choose to define the certificate and protocol that
Panorama and its managed devices use for SSL/TLS services?
A. ACC
B. System Logs
C. App Scope
D. Session Browser
Question #60
Which protection feature is available only in a Zone Protection Profile?
D. download mgmt-pcap
Question #62
An administrator has configured the Palo Alto Networks NGFW's management interface to
connect to the internet through a dedicated path that does not traverse back through the
NGFW itself. Which configuration setting or step will allow the firewall to get automatic
application signature updates?
B. A Security policy rule will need to be configured to allow the update requests from
the firewall to the update servers.
A. Virtual link
B. Active/passive deployment
D. Configuration synchronization
E. Session synchronization
Question #64
Which CLI command enables an administrator to view details about the firewall including
uptime, PAN-OSֲ® version, and serial number?
A. Session Browser
C. TCP Dump
D. Packet Capture
Question #67
The certificate information displayed in the following image is for which type of certificate?
The administrator determines that these sessions are form external users accessing the
company's proprietary accounting application.
The administrator wants to reliably identify this traffic as their accounting application and to
scan this traffic for threats.
C. Create a custom App-ID and use the ג€ordered conditionsג€ check box.
D. Create an Application Override policy and a custom threat signature for the
application.
Question #73
The administrator has enabled BGP on a virtual router on the Palo Alto Networks NGFW, but
new routes do not seem to be populating the virtual router.
Which two options would help the administrator troubleshoot this issue? (Choose two.)
A. View the System logs and look for the error messages about BGP.
C. View the Runtime Stats and look for problems with BGP configuration.
A. Active
B. Functional
C. Pending
D. Passive
E. Suspended
Question #76
Which virtual router feature determines if a specific destination IP address is reachable?
A. Heartbeat Monitoring
B. Failover
C. Path Monitoring
D. Ping-Path
Question #77
An administrator has a requirement to export decrypted traffic from the Palo Alto Networks
NGFW to a third-party, deep-level packet inspection appliance.
Which interface type and license feature are necessary to meet the requirement?
D. Decryption Mirror interface with the associated Decryption Port Mirror license
Question #78
When is the content inspection performed in the packet flow process?
B. Decryption log
A. Vulnerability Protection
B. Anti-Spyware
C. URL Filtering
D. Antivirus
Question #81
Which processing order will be enabled when a Panorama administrator selects the setting
`Objects defined in ancestors will take higher precedence?`
B. ethernet1/5
C. ethernet1/6
D. ethernet1/3
Question #84
Refer to the exhibit. A web server in the DMZ is being mapped to a public address through
DNAT.
Which Security policy rule will allow traffic to flow to the web server?
The web server hosts its contents over HTTP(S). Traffic from Trust to DMZ is being decrypted
with a Forward Proxy rule.
Which combination of service and application, and order of Security policy rules, needs to
be configured to allow cleartext web-browsing traffic to this server on tcp/443?
B. Rule #1: application: web-browsing; service: service-http; action: allow Rule #2:
application: ssl; service: application-default; action: allow
A. application override
C. content inspection
Question #90
Which User-ID method should be configured to map IP addresses to usernames for users
connected through a terminal server?
A. port mapping
B. server monitoring
C. client probing
D. XFF headers
Question #91
Which feature can be configured on VM-Series firewalls?
A. aggregate interfaces
B. machine learning
D. GlobalProtect
Question #92
In High Availability, which information is transferred via the HA data link?
A. session information
B. heartbeats
C. HA state information
D. User-ID information
Question #93
The firewall identifies a popular application as an unknown-tcp.
Which two options are available to identify the application? (Choose two.)
Question #95
A client has a sensitive application server in their data center and is particularly concerned
about resource exhaustion because of distributed denial-of-service attacks.
How can the Palo Alto Networks NGFW be configured to specifically protect this server
against resource exhaustion originating from multiple IP addresses (DDoS attack)?
A. Define a custom App-ID to ensure that only legitimate application traffic reaches
the server.
B. Flood Protection
C. Resource Protection
A. Content-ID
B. User-ID
D. Antivirus
Question #100
View the GlobalProtect configuration screen capture.What is the purpose of this
configuration?
A. TACACS+
B. Kerberos
C. PAP
D. LDAP
E. SAML
F. RADIUS
Question #102
What is exchanged through the HA2 link?
A. hello heartbeats
B. User-ID information
C. session synchronization
D. HA state information
Question #103
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?
A. ae.8
B. aggregate.1
C. ae.1
D. aggregate.8
Question #105
Which three authentication factors does PAN-OSֲ® software support for MFA? (Choose
three.)
A. Push
B. Pull
C. Okta Adaptive
D. Voice
E. SMS
Question #106
VPN traffic intended for an administrator's firewall is being maliciously intercepted and
retransmitted by the interceptor.
When creating a VPN tunnel, which protection profile can be enabled to prevent this
malicious behaviour?
A. Zone Protection
B. Replay
C. Web Application
D. DoS Protection
Question #107
Which Zone Pair and Rule Type will allow a successful connection for a user on the Internet
zone to a web server hosted on the DMZ zone? The web server is reachable using a
Destination NAT policy in the Palo Alto Networks firewall.
A.
B.
C.
D.
Question #108
An administrator has configured a QoS policy rule and a QoS Profile that limits the maximum
allowable bandwidth for the YouTube application. However, YouTube is consuming more
than the maximum bandwidth allotment configured.
Which configuration step needs to be configured to enable QoS?
A. Traffic
B. ACC
C. Configuration
D. Threats
Question #110
A customer wants to set up a site-to-site VPN using tunnel interfaces.
Which two formats are correct for naming tunnel interfaces? (Choose two.)
A. tunnel.1
B. vpn-tunnel.1
C. tunnel.1025
D. vpn-tunnel.1024
Question #111
Based on the following image, what is the correct path of root, intermediate, and end-user
certificate?
A. Palo Alto Networks > Symantec > VeriSign
B. Configure a service route for Palo Alto Networks Services that uses a dataplane
interface that can route traffic to the Internet, and create a Security policy rule to allow
the traffic from that interface to the update servers if necessary.
C. Configure a Policy Based Forwarding policy rule for the update server IP address
so that traffic sourced from the management interfaced destined for the update
servers goes out of the interface acting as your Internet connection.
D. Configure a Security policy rule to allow all traffic to and from the update servers.
Question #113
A company wants to install a NGFW firewall between two core switches on a VLAN trunk
link. They need to assign each VLAN to its own zone and to assign untagged (native) traffic
to its own zone.
Which option differentiates multiple VLANs into separate zones?
A. Create V-Wire objects with two V-Wire interfaces and define a range of ג€0-
4096ג€ in the ג€Tag Allowedג€ field of the V-Wire object.
B. Create V-Wire objects with two V-Wire subinterfaces and assign only a single
VLAN ID to the ג€Tag Allowedג€ field of the V-Wire object. Repeat for every additional
VLAN and use a VLAN ID of 0 for untagged traffic. Assign each interface/subinterface to
a unique zone.
C. Create Layer 3 subinterfaces that are each assigned to a single VLAN ID and a
common virtual router. The physical Layer 3 interface would handle untagged traffic.
Assign each interface/subinterface to a unique zone. Do not assign any interface an IP
address.
D. Create VLAN objects for each VLAN and assign VLAN interfaces matching each
VLAN ID. Repeat for every additional VLAN and use a VLAN ID of 0 for untagged traffic.
Assign each interface/subinterface to a unique zone.
Question #114
Which data flow describes redistribution of user mappings?
B. System log
C. Resources widget
B. Push
C. User logon
D. Voice
E. SSH key
F. One-Time Password
Question #117
Which two features does PAN-OSֲ® software use to identify applications? (Choose two.)
A. transaction characteristics
B. session number
C. port number
D. application layer payload
Question #118
An administrator wants to upgrade a firewall from PAN-OSֲ® 9.1 to PAN-OSֲ® 10.0. The
firewall is not a part of an HA pair.
What needs to be updated first?
B. XML Agent
C. WildFire
A. HA1 IP Address
B. Master Key
A. Malware
B. Grayware
C. Phishing
D. Spyware
Question #122
When configuring the firewall for packet capture, what are the valid stage types?
A. DoS protection
B. WildFire submissions
A. syslog listening
B. server monitoring
C. client probing
D. port mapping
Question #125
The firewall determines if a packet is the first packet of a new session or if a packet is part of
an existing session using which kind of match?
A. At-boot
B. Pre-logon
D. On-demand
Question #127
Which feature can provide NGFWs with User-ID mapping information?
A. Web Captcha
C. GlobalProtect
A. Role Based
C. Device Group
D. Dynamic
E. Template Admin
Question #129
Which option enables a Palo Alto Networks NGFW administrator to schedule Application
and Threat updates while applying only new content-IDs to traffic?
A. Select download-and-install
B. Select download-only
D. Select disable application updates and select ג€Install only Threat updatesג€
Question #130
Which is the maximum number of samples that can be submitted to WildFire per day, based
on a WildFire subscription?
A. 10,000
B. 15,000
C. 7,500
D. 5,000
Question #131
In which two types of deployment is active/active HA configuration supported?
(Choose two.)
A. Layer 3 mode
B. TAP mode
D. Layer 2 mode
Question #132
For which two reasons would a firewall discard a packet as part of the packet flow
sequence? (Choose two.)
D. equal-cost multipath
Question #133
Which logs enable a firewall administrator to determine whether a session was decrypted?
A. Traffic
B. Security Policy
C. Decryption
D. Correlated Event
Question #134
An administrator needs to upgrade an NGFW to the most current version of PAN-OSֲ®
software. The following is occurring:
✑ Firewall has internet connectivity through e 1/1.
✑ Default security rules and security rules allowing all SSL and web-browsing traffic to and
from any zone.
✑ Service route is configured, sourcing update traffic from e1/1.
✑ A communication error appears in the System logs when updates are performed.
✑ Download does not complete.
What must be configured to enable the firewall to download the current version of PAN-OS
software?
How can the Palo Alto Networks NGFW be configured to specifically protect this server
against session floods originating from a single IP address?
B. Define a custom App-ID to ensure that only legitimate application traffic reaches
the server
The devices are not participating in dynamic routing, and preemption is disabled.
What must be verified to upgrade the firewalls to the most recent version of PAN-OSֲ®
software?
C. User-ID agent.
A. Anti-Spyware
B. WildFire
C. Vulnerability Protection
D. Antivirus
Question #138
What should an administrator consider when planning to revert Panorama to a pre-PAN-OS
8.1 version?
B. An administrator must use the Expedition tool to adapt the configuration to the
pre-PAN-OS 8.1 state.
A. CRL
B. CRT
C. OCSP
D. Cert-Validation-Profile
A. Certificates
B. LDAP
C. RADIUS
D. SSH keys
Question #141
Which three file types can be forwarded to WildFire for analysis as a part of the basic
WildFire service? (Choose three.)
A. .dll
B. .exe
C. .fon
D. .apk
E. .pdf
F. .jar
Question #142
An administrator has been asked to configure active/active HA for a pair of firewalls.
The firewalls use Layer 3 interfaces to send traffic to a single gateway IP for the pair.
A. The two firewalls will share a single floating IP and will use gratuitous ARP to share
the floating IP.
B. Each firewall will have a separate floating IP, and priority will determine which
firewall has the primary IP.
C. The firewalls do not use floating IPs in active/active HA.
D. The firewalls will share the same interface IP address, and device 1 will use the
floating IP if device 0 fails.
Question #143
Which version of GlobalProtect supports split tunneling based on destination domain, client
process, and HTTP/HTTPS video streaming application?
Question #145
An administrator accidentally closed the commit window/screen before the commit was
finished. Which two options could the administrator use to verify the progress or success of
that commit task? (Choose two.)
A.
B.
C.
D.
Question #146
Which two actions would be part of an automatic solution that would block sites with
untrusted certificates without enabling SSL Forward Proxy? (Choose two.)
When platform utilization is considered, which steps must the administrator take to
configure and apply packet buffer protection?
A. Enable and configure the Packet Buffer Protection thresholds. Enable Packet
Buffer Protection per ingress zone.
B. Enable and then configure Packet Buffer thresholds. Enable Interface Buffer
protection.
C. Create and Apply Zone Protection Profiles in all ingress zones. Enable Packet
Buffer Protection per ingress zone.
D. Configure and apply Zone Protection Profiles for all egress zones. Enable Packet
Buffer Protection per egress zone.
E. Enable per-vsys Session Threshold alerts and triggers for Packet Buffer Limits. Enable Zone
Buffer Protection per zone.
Question #148
What is the purpose of the firewall decryption broker?
A. decrypt SSL traffic and then send it as cleartext to a security chain of inspection
tools.
Question #149
SAML SLO is supported for which two firewall features? (Choose two.)
A. GlobalProtect Portal
B. CaptivePortal
C. WebUI
D. CLI
Question #150
What are the two behavior differences between Highlight Unused Rules and the Rule Usage
Hit counter when a firewall is rebooted? (Choose two.)
Question #151
Which is not a valid reason for receiving a decrypt-cert-validation error?
A. Unsupported HSM
C. Client authentication
D. Untrusted issuer
Question #152
In the following image from Panorama, why are some values shown in red?
A. sg2 session count is the lowest compared to the other managed devices.
B. us3 has a logging rate that deviates from the administrator-configured thresholds.
C. uk3 has a logging rate that deviates from the seven-day calculated baseline.
D. sg2 has misconfigured session thresholds.
Question #153
The firewall is not downloading IP addresses from MineMeld. Based on the image, what
most likely is wrong?
C. Destination Domain
D. Source Domain
E. Destination user/group
F. URL Category
Question #155
Which two are valid ACC GlobalProtect Activity tab widgets? (Choose two.)
B. XML API
C. GlobalProtect agent
A. point-to-point
B. hub-and-spoke
C. full-mesh
D. ring
Question #158
Which option describes the operation of the automatic commit recovery feature?
B. link requirements
D. IP Addresses
Question #160
Starting with PAN-OS version 9.1, application dependency information is now reported in
which two locations? (Choose two.)
Question #161
Which two events trigger the operation of automatic commit recovery? (Choose two.)
Question #162
Panorama provides which two SD-WAN functions? (Choose two.)
A. network monitoring
B. control plane
C. data plane
Question #163
Updates to dynamic user group membership are automatic therefore using dynamic user
groups instead of static group objects allows you to:
Question #164
How can an administrator configure the firewall to automatically quarantine a device using
GlobalProtect?
B. Firewall must be in factory default state or have all private data deleted for
bootstrapping
D. The USB must be formatted using the ext3 file system. FAT32 is not supported
Question #167
An Administrator is configuring Authentication Enforcement and they would like to create
an exemption rule to exempt a specific group from authentication. Which authentication
enforcement object should they select?
A. default-no-captive-portal
B. default-authentication-bypass
C. default-browser-challenge
D. default-web-form
Question #168
A bootstrap USB flash drive has been prepared using a Linux workstation to load the initial
configuration of a Palo Alto Networks firewall. The USB flash drive was formatted using file
system ntfs and the initial configuration is stored in a file named init-cfg.txt.
The contents of init-cfg.txt in the USB flash drive are as follows:
The USB flash drive has been inserted in the firewalls' USB port, and the firewall has been
powered on. Upon boot, the firewall fails to begin the bootstrapping process. The failure is
caused because:
D. There must be commas between the parameter names and their values instead of
the equal symbols
E. The USB drive has been formatted with an unsupported file system
Question #169
To more easily reuse templates and template stacks, you can create template variables in
place of firewall-specific and appliance-specific IP literals in your configurations.
Which one is the correct configuration?
A. &Panorama
B. @Panorama
C. $Panorama
D. #Panorama
Question #170
On the NGFW, how can you generate and block a private key from export and thus harden
your security posture and prevent rogue administrators or other bad actors from misusing
keys?
A. 1. Select Device > Certificate Management > Certificates > Device > Certificates 2.
Import the certificate 3. Select Import Private key 4. Click Generate to generate the
new certificate
C. 1. Select Device > Certificate Management > Certificates > Device > Certificates 2.
Generate the certificate 3. Select Block Private Key Export 4. Click Generate to generate
the new certificate
A. 1,000
B. 2,000
C. 5,000
D. 15,000
Question #172
What file type upload is supported as part of the basic WildFire service?
A. ELF
B. BAT
C. PE
D. VBS
Question #173
An administrator accidentally closed the commit window/screen before the commit was
finished.
Which two options could the administrator use to verify the progress or success of that
commit task? (Choose two.)
A. Task Manager
B. System Logs
C. Traffic Logs
D. Configuration Logs
Question #174
Before an administrator of a VM-500 can enable DoS and zone protection, what actions
need to be taken?
C. Replace the hardware firewall, because DoS and zone protection are not available
with VM-Series systems.
D. Measure and monitor the CPU consumption of the firewall data plane to ensure
that each firewall is properly sized to support DoS and zone protection.
Question #175
An organization has recently migrated its infrastructure and configuration to NGFWs, for
which Panorama manages the devices. The organization is coming from a
L2-L4 firewall vendor, but wants to use App-ID while identifying policies that are no longer
needed.
Which Panorama tool can help this organization?
B. Application Groups
C. Policy Optimizer
D. Config Audit
Question #176
DRAG DROP -
Please match the terms to their corresponding definitions.
Question #177
An organization is building a Bootstrap Package to deploy Palo Alto Networks VM-Series
firewalls into their AWS tenant.
Which two statements are correct regarding the bootstrap package contents? (Choose two.)
C. The /config, /content and /software folders are mandatory while the /license and
/plugin folders are optional.
D. The init-cfg.txt and bootstrap.xml files are both optional configuration items for
the /config folder.
E. The directory structure must include a /config, /content, /software and /license
folders.
Question #178
Which Panorama objects restrict administrative access to specific device-groups?
A. admin roles
B. authentication profiles
C. templates
D. access domains
Question #179
An engineer is planning an SSL decryption implementation.
Which of the following statements is a best practice for SSL decryption?
C. Use the same Forward Trust certificate on all firewalls in the network.
D. Obtain a certificate from a publicly trusted root CA for the Forward Trust
certificate.
Question #180
An administrator receives the following error message:
"IKE phase-2 negotiation failed when processing Proxy ID. Received local id 192.
168.33.33/24 type IPv4 address protocol 0 port 0, received remote id
172.16.33.33/24 type IPv4 address protocol 0 port 0."
How should the administrator identify the root cause of this error message?
A. Verify that the IP addresses can be pinged and that routing issues are not causing
the connection failure.
B. Check whether the VPN peer on one end is set up correctly using policy-based
VPN.
C. In the IKE Gateway configuration, verify that the IP address for each VPN peer is
accurate.
D. In the IPSec Crypto profile configuration, verify that PFS is either enabled on both
VPN peers or disabled on both VPN peers.
Question #181
The following objects and policies are defined in a device group hierarchy.
A. To comply with data privacy regulations, WildFire signatures and verdicts are not
shared globally.
B. Palo Alto Networks owns and maintains one global cloud and four WildFire
regional clouds.
C. Each WildFire cloud analyzes samples and generates malware signatures and
verdicts independently of the other WildFire clouds.
The firewall does the SSLForward Proxy decryption for the website and the server
certificate is not trusted by the firewall.
The end-user's browser will show that the certificate for www. example-website.com was
issued by which of the following?
B. unsupported ciphers
C. certificate pinning
E. mutual authentication
Question #185
DRAG DROP -
Match each SD-WAN configuration element to the description of that element.
Question #186
When overriding a template configuration locally on a firewall, what should you consider?
A. Wildfire analysis
B. anti-ransomware
C. antivirus
D. URL filtering
E. decryption profile
Question #188
An administrator wants to upgrade a firewall HA pair to PAN-OS 10.1. The firewalls are
currently running PAN-OS 8.1.17. Which upgrade path maintains synchronization of the HA
session (and prevents network outage)?
B. SSH Proxy
D. Decryption Broker
E. Decryption Mirror
Question #190
During SSL decryption, which three factors affect resource consumption? (Choose three.)
E. certificate issuer
Question #191
An engineer must configure a new SSL decryption deployment.
Which profile or certificate is required before any traffic that matches an SSL decryption rule
is decrypted?
A. A Decryption profile must be attached to the Decryption policy that the traffic
matches.
B. There must be a certificate with both the Forward Trust option and Forward
Untrust option selected.
C. A Decryption profile must be attached to the Security policy that the traffic
matches.
D. There must be a certificate with only the Forward Trust option selected.
Question #192
Which two features require another license on the NGFW? (Choose two.)
C. Decryption Mirror
D. Decryption Broker
Question #193
An administrator has a PA-820 firewall with an active Threat Prevention subscription. The
administrator is considering adding a WildFire subscription.
How does adding the WildFire subscription improve the security posture of the
organization?
D. WildFire and Threat Prevention combine to provide the utmost security posture
for the firewall.
Question #194
What are two characteristic types that can be defined for a variable? (Choose two.)
A. zone
B. FQDN
C. IP netmask
D. path group
Question #195
A remote administrator needs access to the firewall on an untrust interface. Which three
options would you configure on an Interface Management profile to secure management
access? (Choose three.)
A. Permitted IP Addresses
B. SSH
C. https
D. User-ID
E. HTTP
Question #196
An administrator needs to troubleshoot a User-ID deployment. The administrator believes
that there is an issue related to LDAP authentication.
Which CLI command should the administrator use to obtain the packet capture for
validating the configuration?
A. ׀׀3
B. Console Backup
C. HSCI-C
D. HA2 backup
Question #198
What are two common reasons to use a "No Decrypt" action to exclude traffic from SSL
decryption? (Choose two.)
B. the website matches a category that is not allowed for most users
A. routing FTP to a backup ISP link to save bandwidth on the primary ISP link
D. forwarding all traffic by using source port 78249 to a specific egress interface
Question #200
A firewall should be advertising the static route 10.2.0.0/24 into OSPF. The configuration on
the neighbour is correct, but the route is not in the neighbour's routing table.
Which two configurations should you check on the firewall? (Choose two.)
B. In the OSPF configuration, ensure that the correct redistribution profile is selected
in the OSPF Export Rules section.
D. In the redistribution profile check that the source type is set to "ospf."
Question #201
Which value in the Application column indicates UDP traffic that did not match an App-ID
signature?
A. unknown-udp
B. unknown-ip
C. incomplete
D. not-applicable
Question #202
What are three valid qualifiers for a Decryption Policy Rule match? (Choose three.)
A. App-ID
C. User-ID
D. Destination Zone
E. Source Interface
Question #203
An administrator needs to gather information about the CPU utilization on both the
management plane and the data plane.
Where does the administrator view the desired data?
A. $
B. !
C. #
D. &
Question #206
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing?
(Choose two.)
A. self-signed CA certificate
B. server certificate
D. client certificate
E. enterprise CA certificate
Question #207
Given the following configuration, which route is used for destination 10.10.0.4? set
network virtual-router 2 routing-table ip static-route "Route 1" nexthop ip-address
192.168.1.2 set network virtual-router 2 routing-table ip static-route "Route 1" metric 30 set
network virtual-router 2 routing-table ip static-route "Route 1" destination 10.10.0.0/24 set
network virtual-router 2 routing-table ip static-route "Route 1" re route-table unicast set
network virtual-router 2 routing-table ip static-route "Route 2" nexthop ip-address
192.168.1.2 set network virtual-router 2 routing-table ip static-route "Route 2" metric 20 set
network virtual-router 2 routing-table ip static-route "Route 2" destination 10.10.0.0/24 set
network virtual-router 2 routing-table ip static-route "Route 2" route-table unicast set
network virtual-router 2 routing-table ip static-route "Route 3" nexthop ip-address
10.10.20.1 set network virtual-router 2 routing-table ip static-route "Route 3" metric 5 set
network virtual-router 2 routing-table ip static-route "Route 3" destination 0.0.0.0/0 set
network virtual-router 2 routing-table ip static-route "Route 3" route-table unicast set
network virtual-router 2 routing-table ip static-route "Route 4" nexthop ip-address
192.168.1.2 set network virtual-router 2 routing-table ip static-route "Route 4" metric 10 set
network virtual-router 2 routing-table ip static-route "Route 4" destination 10.10.1.0/25 set
network virtual-router 2 routing-table ip static-route "Route 4" route-table unicast
A. Route 1
B. Route 3
C. Route 2
D. Route 4
Question #208
An administrator plans to deploy 15 firewalls to act as GlobalProtect gateways around the
world. Panorama will manage the firewalls.
The firewalls will provide access to mobile users and act as edge locations to on-premises
infrastructure. The administrator wants to scale the configuration out quickly and wants all
of the firewalls to use the same template configuration.
Which two solutions can the administrator use to scale this configuration? (Choose two.)
A. virtual systems
B. template stacks
C. variables
D. collector groups
Question #209
As a best practice, which URL category should you target first for SSL decryption?
B. High Risk
D. Financial Services
Question #210
Which three statements accurately describe Decryption Mirror? (Choose three.)
B. You should consult with your corporate counsel before activating and using
Decryption Mirror in a production environment.
B. GlobalProtect
Question #213
DRAG DROP -
Place the steps in the WildFire process workflow in their correct order.
Question #214
In a Panorama template, which three types of objects are configurable? (Choose three.)
A. certificate profiles
B. HIP objects
C. QoS profiles
D. security profiles
After looking at the configuration, the administrator believes that the firewall is not using a
static route.
What are two reasons why the firewall might not use a static route? (Choose two.)
During onboarding, the following options and licenses were selected and enabled:
- Prisma Access for Remote Networks: 300Mbps
- Prisma Access for Mobile Users: 1500 Users
- Cortex Data Lake: 2TB
- Trusted Zones: trust
- Untrusted Zones: untrust
- Parent Device Group: shared
The customer wants to forward to a Splunk SIEM the logs that are generated by users that
are connected to Prisma Access for Mobile Users.
A. Configure Panorama Collector group device log forwarding to send logs to the
Splunk syslog server.
B. Configure Cortex Data Lake log forwarding and add the Splunk syslog server.
C. Configure a log forwarding profile and select the Panorama/Cortex Data Lake
checkbox. Apply the Log Forwarding profile to all of the security policy rules in
Mobile_User_Device_Group.
D. Configure a Log Forwarding profile, select the syslog checkbox, and add the Splunk
syslog server. Apply the Log Forwarding profile to all of the security policy rules in the
Mobile_User_Device_Group.
Question #217
A network administrator wants to use a certificate for the SSL/TLS Service Profile. Which
type of certificate should the administrator use?
A. machine certificate
B. server certificate
D. client certificate
Question #218
In a security-first network, what is the recommended threshold value for content updates to
be dynamically updated?
A. 1 to 4 hours
B. 6 to 12 hours
C. 24 hours
D. 36 hours
Question #219
A network security engineer has applied a File Blocking profile to a rule with the action of
Block. The user of a Linux CLI operating system has opened a ticket.
The ticket states that the user is being blocked by the firewall when trying to download a
TAR file.
A. Threat log
C. SSH Proxy
E. Decryption Mirror
Question #221
DRAG DROP -
Match each type of DoS attack to an example of that type of attack.
Question #222
Using multiple templates in a stack to manage many firewalls provides which two
advantages? (Choose two.)
A. Forward-Untrust-Certificate
B. Forward-Trust-Certificate
C. Firewall-CA
D. Firewall-Trusted-Root-CA
Question #224
A company needs to preconfigure firewalls to be sent to remote sites with the least amount
of preconfiguration. Once deployed, each firewall must establish secure tunnels back to
multiple regional data centers to include the future regional data centers.
Which VPN preconfigured configuration would adapt to changes when deployed to the
future site?
A. GlobalProtect client
B. PPTP tunnels
D. GlobalProtect satellite
Question #225
When an in-band data port is set up to provide access to required services, what is required
for an interface that is assigned to service routes?
Question #226
What does SSL decryption require to establish a firewall as a trusted third party and to
establish trust between a client and server to secure SSL/TLS connection?
A. link state
B. profiles
D. certificates
Question #227
When you configure a Layer 3 interface, what is one mandatory step?
A. Configure virtual routers to route the traffic for each Layer 3 interface.
D. Configure service routes to route the traffic for each Layer 3 interface.
Question #228
Which statement accurately describes service routes and virtual systems?
A. Virtual systems can only use one interface for all global service and service routes
of the firewall.
B. Virtual systems that do not have specific service routes configured inherit the
global service and service route settings for the firewall.
C. Virtual systems cannot have dedicated service routes configured; and virtual
systems always use the global service and service route settings for the firewall.
D. The interface must be used for traffic to the required external services.
Question #229
An administrator is considering upgrading the Palo Alto Networks NGFW and central
management Panorama version.
What is considered best practice for this scenario?
B. Upgrade the firewall first, wait at least 24 hours, and then upgrade the Panorama
version.
D. Export the device state, perform the update, and then import the device state.
Question #230
An administrator has 750 firewalls. The administrator's central-management Panorama
instance deploys dynamic updates to the firewalls. The administrator notices that the
dynamic updates from Panorama do not appear on some of the firewalls.
A. Panorama does not have valid licenses to push the dynamic updates.
C. Locally-defined dynamic update settings take precedence over the settings that
Panorama pushed.
However, a recent phishing campaign against the organization has prompted information
Security to look for more controls that can secure access to critical assets.
For users that need to access these systems, Information Security wants to use PAN-OS
multi-factor authentication (MFA) integration to enforce MFA.
What should the enterprise do to use PAN-OS MFA?
B. Security policy rules do not prevent lateral movement of traffic between zones.
C. The zone protection profile will apply to all interfaces within that zone.
A. Disable HA.
A. Make sure that the PAN-OS support contract is valid for at least another year.
C. Make sure that the firewall is running a supported version of the app + threat
update.
D. Make sure that the firewall is running a version of antivirus software and a version
of WildFire that support the licensed subscriptions.
Question #235
The UDP-4501 protocol-port is used between which two GlobalProtect components?
The enterprise already uses GlobalProtect with SAML authentication to obtain IP-to-user
mapping information.
However, Information Security wants to use this information in Prisma Access for policy
enforcement based on group mapping.
Information Security uses on- premises Active Directory (AD) but is uncertain about what is
needed for Prisma Access to learn groups from AD.
How can policies based on group mapping be learned and enforced in Prisma Access?
C. Assign a master device in Panorama through which Prisma Access learns groups.
D. Create a group mapping configuration that references an LDAP profile that points
to on-premises domain controllers.
Question #237
What happens to traffic traversing SD-WAN fabric that doesn't match any SD-WAN policies?
B. Traffic matches a catch-all policy that is created through the SD-WAN plugin.
C. Traffic matches implied policy rules and is redistributed round robin across SD-
WAN links.
C. client certificate
D. certificate profile
Question #239
An administrator with 84 firewalls and Panorama does not see any WildFire logs in
Panorama. All 84 firewalls have an active WildFire subscription. On each firewall, WildFire
logs are available.
This issue is occurring because forwarding of which type of logs from the firewalls to
Panorama is missing?
A. WildFire logs
B. System logs
C. Threat logs
D. Traffic logs
Question #240
A company wants to use their Active Directory groups to simplify their Security policy
creation from Panorama.
Which configuration is necessary to retrieve groups from Panorama?
A. Configure an LDAP Server profile and enable the User-ID service on the
management interface.
B. Configure a group mapping profile to retrieve the groups in the target template.
A. at zone level to protect firewall resources and ingress zones, but not at the device
level
C. at the device level (globally) to protect firewall resources and ingress zones, but
not at the zone level
D. at the device level (globally) and, if enabled globally, at the zone level
Question #242
An existing NGFW customer requires direct internet access offload locally at each site, and
IPSec connectivity to all branches over public internet.
A. Change the HA timer profile to "user-defined" and manually set the timers.
A. The service packets exit the firewall on the port assigned for the external service.
The server sends its response to the configured source interface and source IP address.
B. The service packets enter the firewall on the port assigned from the external
service. The server sends its response to the configured destination interface and
destination IP address.
C. The service route is the method required to use the firewall's management plane
to provide services to applications.
D. Service routes provide access to external services, such as DNS servers, external
authentication servers or Palo Alto Networks services like the Customer Support Portal.
Question #245
DRAG DROP -
Place the steps to onboard a ZTP firewall into Panorama/CSP/ZTP-Service in the correct
order.
Question #246
Which of the following commands would you use to check the total number of the sessions
that are currently going through SSL Decryption processing?
The administrator needs to change the IP address to a preferable server for this template
stack but cannot impact other template stacks. How can the issue be corrected?
Question #250
In URL filtering, which component matches URL patterns?
A. Monitor profile
B. application group
D. IPsec tunnel
Question #252
An organization's administrator has the funds available to purchase more firewalls to
increase the organization's security posture. The partner SE recommends placing the
firewalls as close as possible to the resources that they protect.
A. No. Firewalls provide new defense and resilience to prevent attackers at every
stage of the cyberattack lifecycle, independent of placement.
D. Yes. Zone Protection profiles can be tailored to the resources that they protect via
the configuration of specific device types and operating systems.
Question #253
An administrator needs to validate that policies that will be deployed will match the
appropriate rules in the device-group hierarchy.
Which tool can the administrator use to review the policy creation logic and verify that
unwanted traffic is not allowed?
A. Preview Changes
B. Policy Optimizer
Question #254
DRAG DROP -
Match each GlobalProtect component to the purpose of that component.
Question #255
What is a key step in implementing WildFire best practices?
D. n a security-first network, set the WildFire size limits to the minimum value.
Question #256
What happens when an A/P firewall cluster synchronizes IPsec tunnel security associations
(SAs)?
A. There was no application data after the TCP connection was established.
B. The client sent a TCP segment with the PUSH flag set.
C. The TCP connection was terminated without identifying any application data.
D. There is not enough application data after the TCP connection was established.
A. update the Firewall Apps and Threat version to match the version of Panorama
B. change the new category action to "alert" and push the configuration again
C. ensure that the firewall can communicate with the URL cloud
D. verity that the URL seed tile has been downloaded and activated on the firewall
Question #261
A security engineer needs firewall management access on a trusted interface. Which three
settings are required on an SSL/TLS Service Profile to provide secure
Web Ul authentication? (Choose three.)
A. Authentication Algorithm
B. Encryption Algorithm
C. Certificate
A. Layer 3
B. Layer 2
C. Tap
D. Decryption Mirror
Question #263
Which configuration task is best for reducing load on the management plane?
B. Microsoft Terminal Server, Red Hat Linux, and Microsoft Active Directory
B.
C.
D.
Question #266
Cortex XDR notifies an administrator about grayware on the endpoints. There are no entries
about grayware in any of the logs of the corresponding firewall.
Which setting can the administrator configure on the firewall to log grayware verdicts?
Question #267
Your company has 10 Active Directory domain controllers spread across multiple WAN links.
All users authenticate to Active Directory. Each link has substantial network bandwidth to
support all mission-critical applications.
The firewall's management plane is highly utilized. Given this scenario, which type of User-
ID agent is considered a best practice by Palo Alto Networks?
C. Captive Portal
Question #268
Which component enables you to configure firewall resource protection settings?
B. QoS Profile
Question #269
How can an administrator use the Panorama device-deployment option to update the apps
and threat version of an HA pair of managed firewalls?
A. Choose the download and install action for both members of the HA pair in the
Schedule object
B. Switch context to the firewalls to start the download and install process
Question #270
A Panorama administrator configures a new zone and uses the zone in a new Security policy.
After the administrator commits the configuration to Panorama, which device-group
commit push operation should the administrator use to ensure that the push is successful?
A. server certificate
C. certificate profile
A. Create the appropriate rules with a Block action and apply them at the top of the
local firewall Security rules
B. Create the appropriate rules with a Block action and apply them at the top of the
Security Pre-Rules
C. Create the appropriate rules with a Block action and apply them at the top of the
Security Post-Rules
D. Create the appropriate rules with a Block action and apply them at the top of the
Default Rules
Question #274
When planning to configure SSL Forward Proxy on a PA-5260, a user asks how SSL
decryption can be implemented using a phased approach in alignment with
Palo Alto Networks best practices. What should you recommend?
C. Enable SSL decryption for source users and known malicious URL categories
Question #275
What are two valid deployment options for Decryption Broker? (Choose two.)
What command could the engineer run to see the current state of the BGP state between
the two devices?
B. the timeframe within which the firewall must receive keepalives from a cluster
member to know that the cluster member is functional
C. the maximum interval between hello packets that are sent to verify that the HA
functionality on the other firewall is operational
D. the time that a passive or active-secondary firewall will wait before taking over as
the active or active-primary firewall
Question #278
An engineer is tasked with enabling SSL decryption across the environment.
What are three valid parameters of an SSL Decryption policy? (Choose three.)
A. GlobalProtect HIP
B. source users
C. App-ID
D. URL categories
Question #279
An engineer is configuring Packet Buffer Protection on ingress zones to protect from single-
session DoS attacks. Which sessions does Packet Buffer Protection apply to?
A. Run the latest PAN-OS version in a supported release tree to have the best
performance for the new App-IDs
B. Study the release notes and install new App-IDs if they are determined to have
low impact
C. Configure a security policy rule to allow new App-IDs that might have network-
wide impact
Which action and packet-capture setting for items of high severity and critical severity best
matches Palo Alto Networks best practice?
B. firewall to firewall
Question #283
An administrator is attempting to create policies for deployment of a device group and
template stack. When creating the policies, the zone drop-down list does not include the
required zone. What must the administrator do to correct this issue?
C. Enable "Share Unused Address and Service Objects with Devices" in Panorama
settings
D. Specify the target device as the master device in the device group
Question #284
What best describes the HA Promotion Hold Time?
A. the time that the passive firewall will wait before taking over as the active firewall
after communications with the HA peer have been lost
B. the time that is recommended to avoid a failover when both firewalls experience
the same link/path monitor failure simultaneously
D. the time that a passive firewall with a low device priority will wait before taking
over as the active firewall it the firewall is operational again
Question #285
What is considered the best practice with regards to zone protection?
A. Use separate log-forwarding profiles to forward DoS and zone threshold event
logs separately from other threat logs
B. Review DoS threat activity (ACC > Block Activity) and look for patterns of abuse
C. Set the Alarm Rate threshold for event-log messages to high severity or critical
severity
D. If the levels of zone and DoS protection consume too many firewall resources,
disable zone protection
Question #286
An administrator allocates bandwidth to a Prisma Access Remote Networks compute
location with three remote networks. What is the minimum amount of bandwidth the
administrator could configure at the compute location?
A. 90Mbps
B. 75Mbps
C. 50Mbps
D. 300Mbps
Question #287
A user at an internal system queries the DNS server for their web server with a private IP of
10.250.241.131 in the DMZ. The DNS server returns an address of the web servers public
address, 200.1.1.10. In order to reach the web server, which security rule and U-Turn NAT
rule must be configured on the firewall?
A. NAT Rule: Source Zone: Untrust_L3 Source IP: Any Destination Zone: DMZ
Destination IP: 200.1.1.10 Destination Translation address: 10.250.241.131 Security
Rule: Source IP: Any Destination Zone: DMZ Destination IP: 10.250.241.131
B. NAT Rule: Source Zone: Trust_L3 Source IP: Any Destination Zone: DMZ
Destination IP: 200.1.1.10 Destination Translation address: 10.250.241.131 Security
Rule: Source Zone: Untrust-L3 Source IP: Any Destination Zone: DMZ Destination IP:
10.250.241.131
C. NAT Rule: Source Zone: Untrust_L3 Source IP: Any Destination Zone: Untrust_L3
Destination IP: 200.1.1.10 Destination Translation address: 10.250.241.131 Security
Rule: Source Zone: Untrust-L3 Source IP: Any Destination Zone: DMZ Destination IP:
10.250.241.131
D. NAT Rule: Source Zone: Trust_L3 Source IP: Any Destination Zone: Untrust_L3
Destination IP: 200.1.1.10 Destination Translation address: 10.250.241.131 Security
Rule: Source Zone: Trust-L3 Source IP: Any Destination Zone: DMZ Destination IP:
200.1.1.10
Question #288
An engineer must configure the Decryption Broker feature. Which Decryption Broker
security chain supports bi-directional traffic flow?
A. Layer 2
B. Virtual Wire
C. Tap
D. Layer 3
Question #291
A network-security engineer attempted to configure a bootstrap package on Microsoft
Azure, but the virtual machine provisioning process failed. In reviewing the bootstrap
package, the engineer only had the following directories: /config, /license and /software.
Why did the bootstrap process fail for the VM-Series firewall in
Azure?
A. All public cloud deployments require the /plugins folder to support proper firewall
native integrations
B. The VM-Series firewall was not pre-registered in Panorama and prevented the
bootstrap process from successfully completing
A. GlobalProtect satellite
B. GlobalProtect app
C. GlobalProtect portal
D. GlobalProtect gateway
Question #293
Which statement regarding HA timer settings is true?
A. Create an Application Group and add Office 365, Evernote, Google Docs, and Libre
Office
C. Create an Application Filter and name it Office Programs, then filter it on the
office-programs subcategory
D. Create an Application Filter and name it Office Programs, then filter it on the
business-systems category
Question #295
Which statement is correct given the following message from the PanGPA.log on the
GlobalProtect app?
Failed to connect to server at port:4767
A. The GlobalProtect app failed to connect to the GlobalProtect Gateway on port
4767
B. The GlobalProtect app failed to connect to the GlobalProtect Portal on port 4767
C. The PanGPS process failed to connect to the PanGPA process on port 4767
D. The PanGPA process failed to connect to the PanGPS process on port 4767
Question #296
A customer is replacing their legacy remote access VPN solution. The current solution is in
place to secure only Internet egress for the connected clients. Prisma
Access has been selected to replace the current remote access VPN solution. During
onboarding the following options and licenses were selected and enabled:
- Prisma Access for Remote Networks: 300Mbps
- Prisma Access for Mobile Users: 1500 Users
- Cortex Data Lake: 2TB
- Trusted Zones: trust
- Untrusted Zones: untrust
- Parent Device Group: shared
How can you configure Prisma Access to provide the same level of access as the current VPN
solution?
A. Configure mobile users with trust-to-untrust Security policy rules to allow the
desired traffic outbound to the Internet
C. Configure remote networks with trust-to-trust Security policy rules to allow the
desired traffic outbound to the Internet
D. Configure mobile users with a service connection and trust-to-trust Security policy
rules to allow the desired traffic outbound to the Internet
Question #297
An administrator analyzes the following portion of a VPN system log and notices the
following issue:
`Received local id 10.10.1.4/24 type IPv4 address protocol 0 port 0, received remote id
10.1.10.4/24 type IPv4 address protocol 0 port 0.`
What is the cause of the issue?
A. bad local and peer identification IP addresses in the IKE gateway
C. mismatched Proxy-IDs
C. QoS is only supported on firewalls that have a single virtual system configured
A. IP Netmask
B. IP Range
C. IP Address
D. IP Wildcard Mask
Question #300
Given the following snippet of a WildFire submission log, did the end-user get access to the
requested information and why or why not?
B. It provides a set of questionnaires that help uncover security risk prevention gaps
across all areas of network and security architecture
A. link requirements
B. IP Addresses
C. connection throughput
D. dynamic routing
B. certificate-logon
A. System Logs
B. Session Browser
D. Traffic Logs
Question #306
Where is information about packet buffer protection logged?
A. All entries are in the System log
C. Alert entries are in the Alarms log. Entries for dropped traffic, discarded sessions,
and blocked IP address are in the Threat log
D. Alert entries are in the System log. Entries for dropped traffic, discarded sessions,
and blocked IP addresses are in the Threat log
12
Question #307
SSL Forward Proxy decryption is configured, but the firewall uses Untrusted-CA to sign the
website https://www.important-website.com certificate. End-users are receiving the
"security certificate is not trusted" warning. Without SSL decryption, the web browser
shows that the website certificate is trusted and signed by a well-known certificate chain:
Well-Known-Intermediate and Well-Known-Root-CA.
The network security administrator who represents the customer requires the following two
behaviors when SSL Forward Proxy is enabled:
1. End-users must not get the warning for the https://www.very-important-website.com/
website
2. End-users should get the warning for any other untrusted website
Which approach meets the two customer requirements?
A. Clear the Forward Untrust Certificate check box on the Untrusted-CA certificate
and commit the configuration
C. Navigate to Device > Certificate Management > Certificates > Device Certificates,
import Well-Known-Intermediate-CA and Well-Known-Root-CA, select the Trusted Root
CA check box, and commit the configuration
D. Navigate to Device > Certificate Management > Certificates > Default Trusted
Certificate Authorities, import Well-Known-Intermediate-CA and Well-Known- Root-CA,
select the Trusted Root CA check box, and commit the configuration
10
Question #308
An administrator needs to evaluate a recent policy change that was committed and pushed
to a firewall device group. How should the administrator identify the configuration changes?
C. context-switch to the affected firewall and use the configuration audit tool
D. click Preview Changes under Push Scope
20
Question #309
The administrator for a small company has recently enabled decryption on their Palo Alto
Networks firewall using a self-signed root certificate. They have also created a Forward Trust
and Forward Untrust certificate and set them as such.
The admin has not yet installed the root certificate onto client systems.
What effect would this have on decryption functionality?
A. Decryption will not function because self-signed root certificates are not
supported
B. Decryption will function, but users will see certificate warnings for each SSL site
they visit
C. Decryption will not function until the certificate is installed on client systems
C. default routing
B. Install the unsupported cipher into the firewall to allow the sites to be decrypted
C. Add the sites to the SSL Decryption Exclusion list to exempt them from decryption
D. Allow the firewall to block the sites to improve the security posture
9
Question #312
A network security engineer wants to prevent resource-consumption issues on the firewall.
Which strategy is consistent with decryption best practices to ensure consistent
performance?
C. Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use
less processor-intensive decryption methods for lower-risk traffic
D. Use RSA in a Decryption profile for higher-priority and higher-risk traffic, and use
less processor-intensive decryption methods for lower-risk traffic
15
Question #313
With the default TCP and UDP settings on the firewall, what will be the identified application
in the following session?
A. unknown-udp
B. not-applicable
C. insufficient-data
D. incomplete
16
Question #314
A remote administrator needs firewall access on an untrusted interface. Which two
components are required on the firewall to configure certificate-based administrator
authentication to the web UI? (Choose two.)
A. client certificate
B. certificate profile
D. server certificate
9
Question #315
When configuring forward error correction (FEC) for PAN-OS SD-WAN, an administrator
would turn on the feature inside which type of SD-WAN profile?
C. Certificate profile
16
Question #317
Which feature of Panorama allows an administrator to create a single network configuration
that can be reused repeatedly for large-scale deployments even if values of configured
objects, such as routes and interface addresses, change?
A. template variables
C. template stacks
D. a device group
12
Question #318
An engineer wants to implement the Palo Alto Networks firewall in VWire mode on the
internet gateway and wants to be sure of the functions that are supported on the vwire
interface.
What are three supported functions on the VWire interface? (Choose three.)
A. IPSec
B. OSPF
C. SSL Decryption
D. QoS
E. NAT
16
Question #319
A firewall has been assigned to a new template stack that contains both "Global" and
"Local" templates in Panorama, and a successful commit and push has been performed.
While validating the configuration on the local firewall, the engineer discovers that some
settings are not being applied as intended.
The setting values from the "Global" template are applied to the firewall instead of the
"Local" template that has different values for the same settings.
What should be done to ensure that the settings in the "Local" template are applied while
maintaining settings from both templates?
A. Move the "Local" template above the "Global" template in the template stack.
B. Perform a commit and push with the "Force Template Values" option selected.
C. Override the values on the local firewall and apply the correct settings for each
value.
D. Move the "Global" template above the "Local" template in the template stack.
7
Question #320
A network administrator wants to deploy SSL Inbound Inspection. What two attributes
should the required certificate have? (Choose two.)
A. a client certificate
B. a private key
C. a server certificate
A. LDAP
B. Radius
C. Local
D. Kerberos
8
Question #322
Which three use cases are valid reasons for requiring an Active/Active high availability
deployment? (Choose three.)
A. The environment requires real full-time redundancy from both firewalls at all
times.
E. The environment requires that both firewalls maintain their own routing tables for
faster dynamic routing protocol convergence.
35
Question #323
An organization wishes to roll out decryption but gets some resistance from engineering
leadership regarding the guest network.
What is a common obstacle for decrypting traffic from guest devices?
A. Guest devices may not trust the CA certificate used for the forward trust
certificate
D. Guest devices may not trust the CA certificate used for the forward untrust
certificate
8
Question #324
An administrator needs to build Security rules in a Device Group that allow traffic to specific
users and groups defined in Active Directory.
What must be configured in order to select users and groups for those rules from
Panorama?
A. The Security rules must be targeted to a firewall in the device group and have
Group Mapping configured.
C. A master device with Group Mapping configured must be set in the device group
where the Security rules are configured.
D. A User-ID Certificate profile must be configured on Panorama.
5
Question #325
Which feature of PAN-OS SD-WAN allows you to configure a bandwidth-intensive
application to go directly to the internet through the branch's ISP link instead of going back
to the data-center hub through the VPN tunnel, thus saving WAN bandwidth costs?
D. VPN Cluster
8
Question #326
What can you use with GlobalProtect to assign user-specific client certificates to each
GlobalProtect user?
A. CSP Responder
B. Certificate profile
C. SCEP
A. Choose the URL categories in the User Credential Submission column and set
action to block Select the User credential Detection tab and select Use Domain
Credential Filter Commit
B. Choose the URL categories in the User Credential Submission column and set
action to block Select the User credential Detection tab and select use IP User Mapping
Commit
C. Choose the URL categories on Site Access column and set action to block Click the
User credential Detection tab and select IP User Mapping Commit
D. Choose the URL categories in the User Credential Submission column and set
action to block Select the URL filtering settings and enable Domain Credential Filter
Commit
6
Question #329
WildFire will submit for analysis blocked files that match which profile settings?
A. shared device group policies, local policies, firewall device group policies
B. firewall device group policies, local policies, shared device group policies
C. local policies, firewall device group policies, shared device group policies
D. shared device group policies, firewall device group policies, local policies
14
Question #331
Which function is handled by the management plane (control plane) of a Palo Alto Networks
firewall?
A. logging
C. Quality of Service
A. APK
B. VBscripts
C. Powershell scripts
D. ELF
E. MS Office
4
Question #333
An administrator needs to assign a specific DNS server to one firewall within a device group.
Where would the administrator go to edit a template variable at the device level?
A. PDF Export under Panorama > templates
A. They can have different hardware media such as the ability to mix fiber optic and
copper.
C. They can have a different interface type from an aggregate interface group.
C. First implement SSL decryption; then migrate port-based rules to App-ID rules.
D. First migrate port-based rules to App-ID rules; then implement SSL decryption.
9
Question #337
A security engineer received multiple reports of an IPSec VPN tunnel going down the night
before. The engineer couldn't find any events related to VPN under system logs.
What is the likely cause?
B. Create a DOS Protection profile with SYN Flood protection enabled and apply it to
all rules allowing traffic from the outside zone.
D. Create a Security rule to deny all ICMP traffic from the outside zone.
3
Question #339
The Aggregate Ethernet interface is showing down on a passive PA-7050 firewall of an
active/passive HA pair. The HA Passive Link State is set to "Auto" under
Device > High Availability > General > Active/Passive Settings. The AE interface is configured
with LACP enabled and is up only on the active firewall.
Why is the AE interface showing down on the passive firewall?
A. It does not participate in LACP negotiation unless Fast Failover is selected under
the Enable LACP selection on the LACP tab of the AE Interface.
C. It performs pre-negotiation of LACP when the mode Passive is selected under the
Enable LACP selection on the LACP tab of the AE Interface.
D. It participates in LACP negotiation when Fast is selected for Transmission Rate
under the Enable LACP selection on the LACP tab of the AE Interface.
4
Question #340
A company requires that a specific set of ciphers be used when remotely managing their
Palo Alto Networks appliances.
Which profile should be configured in order to achieve this?
A. Certificate profile
D. Decryption profile
19
Question #341
An engineer needs to permit XML API access to a firewall for automation on a network
segment that is routed through a Layer 3 subinterface on a Palo Alto
Networks firewall. However, this network segment cannot access the dedicated
management interface due to the Security policy.
Without changing the existing access to the management interface, how can the engineer
fulfill this request?
A. Radius
B. Kerberos
C. LDAP
D. Local
3
Question #344
An engineer needs to see how many existing SSL decryption sessions are traversing a
firewall.
What command should be used?
B. Navigate to Network > Zone Protection Click Add Select Packet Based Attack
Protection > TCP/IP Drop Set "Reject Non-syn-TCP" to Global Set ג€Asymmetric Path"
to Global
C. Navigate to Network > Zone Protection Click Add Select Packet Based Attack
Protection > TCP/IP Drop Set "Reject Non-syn-TCP" to No Set "Asymmetric Path" to
Bypass
A. server monitoring
B. XFF headers
C. Syslog
D. client probing
4
Question #347
A network security administrator has an environment with multiple forms of authentication.
There is a network access control system in place that authenticates and restricts access for
wireless users, multiple Windows domain controllers, and an MDM solution for company-
provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum
coverage?
B. Syslog listener
C. captive portal
A. Create a new email profile under Device > server profiles; then navigate to Device
> Log Settings > System and add the email profile under email.
B. Enable log forwarding under the email profile in the Objects tab.
C. Create a new email profile under Device > server profiles; then navigate to Objects
> Log Forwarding profile > set log type to system and the add email profile.
D. Enable log forwarding under the email profile in the Device tab.
Question #350
An administrator discovers that a file blocked by the WildFire inline ML feature on the
firewall is a false-positive action.
How can the administrator create an exception for this particular file?
A. Add the related Threat ID in the Signature exceptions tab of the Antivirus profile.
C. Set the WildFire inline ML action to allow for that protocol on the Antivirus profile.
D. Add partial hash and filename in the file section of the WildFire inline ML tab of
the Antivirus profile.
Question #351
What can be used to create dynamic address groups?
A. tags
B. FQDN addresses
C. dynamic address
D. region objects
4
Question #352
A firewall administrator wants to avoid overflowing the company syslog server with traffic
logs.
What should the administrator do to prevent the forwarding of DNS traffic logs to syslog?
B. Go to the Log Forwarding profile used to forward traffic logs to syslog. Then,
under traffic logs match list, create a new filter with application not equal to DNS.
C. Go to the Log Forwarding profile used to forward traffic logs to syslog. Then,
under traffic logs match list, create a new filter with application equal to DNS.
D. Create a security rule to deny DNS traffic with the syslog server in the destination.
9
Question #353
An administrator has configured a pair of firewalls using high availability in Active/Passive
mode.
Path Monitoring has been enabled with a Failure Condition of "any."
A path group is configured with Failure Condition of "all" and contains a destination IP of
8.8.8.8 and 4.2.2.2 with a Ping Interval of 500ms and a Ping count of 3.
Which scenario will cause the Active firewall to fail over?
A. Use the Scheduled Config Export to schedule Commit to Panorama and also Push
to Devices.
B. Use the Scheduled Config Push to schedule Commit to Panorama and also Push to
Devices.
C. Use the Scheduled Config Push to schedule Push to Devices and separately
schedule an API call to commit all Panorama changes.
D. Use the Scheduled Config Export to schedule Push to Devices and separately
schedule an API call to commit all Panorama changes.
27
Question #355
Which configuration is backed up using the Scheduled Config Export feature in Panorama?
A. A handshake did take place, but the application could not be identified.
B. A handshake took place, but no data packets were sent prior to the timeout.
C. A handshake did not take place, and the application could not be identified.
D. A handshake took place; however, there were not enough packets to identify the
application.
8
Question #357
You have upgraded Panorama to 10.2 and need to upgrade six Log Collectors.
When upgrading Log Collectors to 10.2, you must do what?
A. The firewall ignores only the pushed objects that have the same name as the
locally configured objects, and it will commit the rest of the pushed configuration.
B. The firewall rejects the pushed configuration, and the commit fails.
C. The firewall fully commits all of the pushed configuration and overwrites its locally
configured objects.
D. The firewall renames the duplicate local objects with "-1" at the end signifying
they are clones; it will update the references to the objects accordingly and fully
commit the pushed configuration.
8
Question #360
Which Panorama feature protects logs against data loss if a Panorama server fails?
A. Panorama Collector Group with Log Redundancy ensures that no logs are lost if a
server fails inside the Collector Group.
B. Panorama Collector Group automatically ensures that no logs are lost if a server
fails inside the Collector Group.
C. Panorama HA with Log Redundancy ensures that no logs are lost if a server fails
inside the HA Cluster.
D. Panorama HA automatically ensures that no logs are lost if a server fails inside the
HA Cluster.
23
Question #361
A network administrator troubleshoots a VPN issue and suspects an IKE Crypto mismatch
between peers.
Where can the administrator find the corresponding logs after running a test command to
initiate the VPN?
A. Traffic logs
B. System logs
D. Configuration logs
3
Question #362
An administrator is required to create an application-based Security policy rule to allow
Evernote. The Evernote application implicitly uses SSL and web browsing.
What is the minimum the administrator needs to configure in the Security rule to allow only
Evernote?
C. Add the Evernote application to the Security policy rule, then add a second
Security policy rule containing both HTTP and SSL.
A. Legacy
B. Management Only
C. Log Collector
D. Panorama
3
Question #364
A network administrator configured a site-to-site VPN tunnel where the peer device will act
as initiator. None of the peer addresses are known.
What can the administrator configure to establish the VPN connection?
B. Check High Availability > Active/Passive Settings > Passive Link State
C. Check the High Availability > Link and Path Monitoring settings.
D. Check the High Availability > HA Communications > Packet Forwarding settings.
D. show logging-status
4
Question #367
An administrator has configured a pair of firewalls using high availability in Active/Passive
mode.
Link and Path Monitoring is enabled with the Failure Condition set to `any`.
There is one link group configured containing member interfaces ethernet1/1 and
ethernet1/2 with a Group Failure Condition set to `all`.
Which HA state will the Active firewall go into if ethernet1/1 link goes down due to a
failure?
A. Active
B. Passive
C. Active-Secondary
D. Non-functional
5
Question #368
Your company occupies one floor in a single building. You have two Active Directory domain
controllers on a single network. The firewall's management-plane resources are lightly
utilized.
Given the size of this environment, which User-ID collection method is sufficient?
C. a syslog listener
D. It performs a connectivity check between the firewall and Panorama after every
configuration commit on the firewall. It reverts the configuration changes on the
firewall and on Panorama if the check fails.
4
Question #370
An engineer has been tasked with reviewing traffic logs to find applications the firewall is
unable to identify with App-ID.
Why would the application field display as incomplete?
A. There is insufficient application data after the TCP connection was established.
B. The TCP connection was terminated without identifying any application data.
D. The client sent a TCP segment with the PUSH flag set.
20
Question #371
Which Security profile generates a packet threat type found in threat logs?
A. WildFire
B. Zone Protection
C. Anti-Spyware
D. Antivirus
23
Question #372
What can an engineer use with GlobalProtect to assign user-specific client certificates to
each GlobalProtect user?
A. SCEP
D. Certificate profile
6
Question #373
An engineer was tasked to simplify configuration of multiple firewalls with a specific set of
configurations shared across all devices.
Which two advantages would be gained by using multiple templates in a stack? (Choose
two.)
A. create a BFD profile under Network > Routing > Routing Profiles > BFD and then
select the BFD profile under Network > Virtual Router > BGP > General > Global BFD
Profile
B. create a BFD profile under Network > Routing > Routing Profiles > BFD and then
select the BFD profile under Network > Routing > Logical Routers > BGP > General >
Global BFD Profile
C. create a BFD profile under Network > Network Profiles > BFD Profile and then
select the BFD profile under Network > Virtual Router > BGP > BFD
D. create a BFD profile under Network > Network Profiles > BFD Profile and then
select the BFD profile under Network > Routing > Logical Routers > BGP > BFD
31
Question #376
An engineer is troubleshooting a traffic-routing issue.
What is the correct packet-flow sequence?
B. Change the SYN flood action from Random Early Drop to SYN cookies.
A. enabling Forward segments that exceed the TCP App-ID inspection queue in
Device > Setup > Content-ID > Content-ID Settings
B. enabling Forward segments that exceed the TCP content inspection queue in
Device > Setup > Content-ID > Content-ID Settings
C. Jumbo frames were enabled on the firewall, which reduced the App-ID queue size
and the number of available packet buffers.
D. Jumbo frames were disabled on the firewall, which reduced the queue sizes
dedicated for out-of-order and application identification.
21
Question #381
Which three actions can Panorama perform when deploying PAN-OS images to its managed
devices? (Choose three.)
A. upload-only
C. Add the default Vulnerability Protection profile to all security rules that allow
traffic from outside.
C. Add the default Vulnerability Protection profile to all security rules that allow
traffic from outside.
D. The administrative accounts you define locally on the firewall serve as references
to the accounts defined on an external authentication server.
8
Question #385
A network administrator notices there is a false-positive situation after enabling Security
profiles. When the administrator checks the threat prevention logs, the related signature
displays: threat type: spyware category: dns-c2 threat ID: 1000011111
Which set of steps should the administrator take to configure an exception for this
signature?
A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select
the signature exceptions tab and then click show all signatures Search related threat ID
and click enable Change the default action Commit
B. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select
the Exceptions tab and then click show all signatures Search related threat ID and click
enable Commit
C. Navigate to Objects > Security Profiles > Vulnerability Protection Select related
profile Select the Exceptions tab and then click show all signatures Search related
threat ID and click enable Commit
D. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select
DNS exceptions tabs Search related threat ID and click enable Commit
14
Question #386
In the screenshot above, which two pieces of information can be determined from the ACC
configuration shown? (Choose two.)
B. The Network Activity tab will display all applications, including FTP.
C. Threats with a severity of ג€highג€ are always listed at the top of the Threat Name
list.
D. The ACC has been filtered to only show the FTP application.
5
Question #387
Given the screenshot, how did the firewall handle the traffic?
A. self-signed root CA
B. external CA certificate
C. server certificate
D. device certificate
4
Question #389
Refer to the screenshots. Without the ability to use Context Switch, where do admin
accounts need to be configured in order to provide admin access to Panorama and to the
managed devices?
A. The Panorama section overrides the Device section. The accounts need to be
configured only in the Panorama section.
B. The sections are independent. The accounts need to be configured in both the
Device and Panorama sections.
A. FTP
B. HTTPS
C. SSH
D. RDP
14
Question #393
During the implementation of SSL Forward Proxy decryption, an administrator imports the
company’s Enterprise Root CA and Intermediate CA certificates onto the firewall. The
company’s Root and Intermediate CA certificates are also distributed to trusted devices
using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate
certificates requiring an Enterprise CA chain of trust are signed by the company’s
Intermediate CA.
Which method should the administrator use when creating Forward Trust and Forward
Untrust certificates on the firewall for use with decryption?
A. Generate two subordinate CA certificates, one for Forward Trust and one for
Forward Untrust.
C. Generate a single subordinate CA certificate for both Forward Trust and Forward
Untrust.
D. Generate a single self-signed CA certificate for Forward Trust and another for
Forward Untrust.
10
Question #394
A firewall administrator needs to check which egress interface the firewall will use to route
the IP 10.2.5.3.
A. Anti-Spyware profile
D. Antivirus profile
7
Question #396
Which firewall feature do you need to configure to query Palo Alto Networks service
updates over a data-plane interface instead of the management interface?
A. service route
B. data redistribution
C. SNMP setup
D. dynamic updates
11
Question #397
How is an address object of type IP range correctly defined?
B. 192.168 40 1/24
A. HTTPS
B. FTP
C. SMB v3
D. SCP
8
Question #400
A network administrator created an intrazone Security policy rule on the firewall. The
source zones were set to IT, Finance, and HR. Which two types of traffic will the rule apply
to? (Choose two.)
If an administrator were to troubleshoot, how would they confirm the transceiver type, tx-
power, rx-power, vendor name, and part number via the CLI?
Which statement is true regarding the configuration of the Decryption Port Mirroring
feature?
A. The engineer should install the Decryption Port Mirror license and reboot the
firewall.
B. The PA-850 firewall does not support decrypt mirror interface, so the engineer
needs to upgrade the firewall to PA-3200 series.
C. The engineer must assign an IP from the same subnet with the forensic tool to the
decrypt mirror interface.
D. The engineer must assign the related virtual-router to the decrypt mirror
interface.
4
Question #403
Which statement is true regarding a heatmap in a BPA report?
A. When guided by authorized sales engineer, it helps determine the areas of the
greatest security risk.
D. It provides a set of questionnaires that help uncover security risk prevention gaps
across all areas of network and security architecture.
9
Question #404
An engineer is configuring secure web access (HTTPS) to a Palo Alto Networks firewall for
management.
Which profile should be configured to ensure that management access via web browsers is
encrypted with a trusted certificate?
This issue is occurring because forwarding of which type of logs from the firewalls to
Panorama is missing?
A. System logs
B. WildFire logs
C. Threat logs
D. Traffic logs
23
Question #406
An administrator wants to configure the Palo Alto Networks Windows User-ID agent to map
IP addresses to usernames.
The company uses four Microsoft Active Directory servers and two Microsoft Exchange
servers, which can provide logs for login events.
All six servers have IP addresses assigned from the following subnet: 192.168.28.32/27.
The Microsoft Active Directory servers reside in 192.168.28.32/28, and the Microsoft
Exchange servers reside in 192.168.28.48/28.
What information does the administrator need to provide in the User Identification >
Discovery section?
C. one IP address of a Microsoft Active Directory server and “Auto Discover” enabled
to automatically obtain all five of the other servers
In order to reach the SSH server only from the Trust zone, which Security rule and NAT rule
must be configured on the firewall?
A. NAT Rule:
B. NAT Rule:
C. NAT Rule:
D. NAT Rule:
A. the interval during which the firewall will remain active following a link monitor
failure
A. Available bandwidth from the unused classes will be used to maintain the Egress
Guaranteed throughput for each.
B. Class 7 traffic will have the most packets dropped in favor of Classes 3 and 5
maintaining their Egress Guaranteed throughput.
C. All traffic continues to flow based on the overhead in each class’s Egress Max
settings.
D. Classes 3, 5, and 7 will each have round-robin packet drops as needed against the
profile Egress Max.
11
Question #410
Which three options does Panorama offer for deploying dynamic updates to its managed
devices? (Choose three.)
A. Check dependencies
B. Schedules
C. Verify
D. Revert content
E. Install
8
Question #411
A network security engineer configured IP multicast in the virtual router to support a new
application. Users in different network segments are reporting that they are unable to
access the application.
A. IGMP
B. SSM
C. BFD
D. PIM
3
Question #412
Review the screenshots and consider the following information:
• FW-1 is assigned to the FW-1_DG device group and FW-2 is assigned to OFFICE_FW_DG
• There are no objects configured in REGIONAL_DG and OFFICE_FW_DG device groups
Which IP address will be pushed to the firewalls inside Address Object Server-1?
C. All traffic logs from RFC 1918 subnets are logged to Panorama / Cortex Data Lake.
D. All traffic from source network 172.12.0.0/24 is sent to Panorama / Cortex Data
Lake.
10
Question #414
Which benefit do policy rule UUIDs provide?
What should the administrator do to allow the tool to scan through the firewall?
A. Add the tool IP address to the reconnaissance protection source address exclusion
in the DoS Protection profile.
B. Add the tool IP address to the reconnaissance protection source address exclusion
in the Zone Protection profile.
D. Change the TCP port scan action from Block to Alert in the Zone Protection profile.
5
Question #416
A customer wants to combine multiple Ethernet interfaces into a single virtual interface
using link aggregation.
What is the valid naming convention for aggregate interfaces?
A. po1/250
B. aggregate.1
C. ae.1
D. lag.100
5
Question #417
A company with already deployed Palo Alto firewalls has purchased their first Panorama
server. The security team has already configured all firewalls with the Panorama IP address
and added all the firewall serial numbers in Panorama.
What are the next steps to migrate configuration from the firewalls to Panorama?
B. Use the Firewall Migration plugin to retrieve the configuration directly from the
managed devices.
D. Use API calls to retrieve the configuration directly from the managed devices.
5
Question #418
Based on the screenshots above, and with no configuration inside the Template Stack itself,
what access will the device permit on its Management port?
A. The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses
defined as $permitted-subnet-1.
B. The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses
defined as $permitted-subnet-2.
C. The firewall will allow HTTP, Telnet, SNMP, HTTPS, SSH and Ping from IP addresses
defined as $permitted-subnet-1 and $permitted-subnet-2.
D. The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses
defined as $permitted-subnet-1 and $permitted-subnet-2.
20
Question #419
View the screenshots. A QoS profile and policy rules are configured as shown.
Based on this information, which two statements are correct? (Choose two.)
D. The firewall template will show that it is out of sync within Panorama.
7
Question #422
What happens, by default, when the GlobalProtect app fails to establish an IPSec tunnel to
the GlobalProtect gateway?
What is the result of traffic that matches the “Alert -Threats” Profile Match List?
A. The source address of SMTP traffic that matches a threat is automatically blocked
as BadGuys for 180 minutes.
D. The source address of SMTP traffic that matches a threat is automatically tagged
as BadGuys for 180 minutes.
8
Question #424
An engineer troubleshooting a VPN issue needs to manually initiate a VPN tunnel from the
CLI.
What must be taken into consideration when designing the device group structure?
A. Only one vsys or one firewall can be assigned to a device group, and a multi-vsys
firewall can have each vsys in a different device group.
B. Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys
firewall can have each vsys in a different device group.
C. Multiple vsys and firewalls can be assigned to a device group. and a multi-vsys
firewall must have all its vsys in a single device group.
D. Only one vsys or one firewall can be assigned to a device group, except for a
multi-vsys firewall, which must have all its vsys in a single device group.
11
Question #427
An engineer needs to collect User-ID mappings from the company’s existing proxies.
What two methods can be used to pull this data from third party proxies? (Choose two.)
A. Client probing
B. XFF Headers
C. Syslog
D. Server Monitoring
10
Question #428
An engineer needs to configure SSL Forward Proxy to decrypt traffic on a PA-5260. The
engineer uses a forward trust certificate from the enterprise PKI that expires December 31,
2025.
A. The root CA
D. Routes listed in the forwarding table with BGP in the Protocol column
7
Question #432
An engineer decides to use Panorama to upgrade devices to PAN-OS 10.2.
A. PA-220
B. PA-800 Series
C. PA-5000 Series
D. PA-500
E. PA-3400 Series
8
Question #433
As a best practice, logging at session start should be used in which case?
A. While troubleshooting
A. User mapping
C. Log settings
D. Group mapping
11
Question #435
The profile is configured to provide granular defense against targeted flood attacks for
specific critical systems that are accessed by users from the internet.
A. Vulnerability Protection
B. DoS Protection
D. Zone Protection
6
Question #436
Which states will a pair of firewalls be in if their HA Group ID is mismatched?
A. Active/Non-functional
B. Active/Passive
C. Init/Init
D. Active/Active
6
Question #437
An engineer troubleshooting a site-to-site VPN finds a Security policy dropping the peer’s
IKE traffic at the edge firewall. Both VPN peers are behind a NAT, and NAT-T is enabled.
Which dynamic role does the administrator assign to the new-hire colleague?
A. Superuser (read-only)
The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair,
and virtual log collectors.
An administrator for a small LLC has created a series of certificates as shown, to use for a
planned Decryption roll out. The administrator has also installed the self-signed root
certificate in all client systems.
When testing, they noticed that every time a user visited an SSL site, they received
unsecured website warnings.
A. The forward trust certificate has not been signed by the self-singed root CA
certificate.
B. The forward trust certificate has not been installed in client systems.
C. The forward untrust certificate has not been signed by the self-singed root CA
certificate.
D. The self-signed CA certificate has the same CN as the forward trust and untrust
certificates.
19
Question #441
An engineer is tasked with deploying SSL Forward Proxy decryption for their organization.
What should the engineer configure within a Zone Protection profile to ensure that the
TrustSec packets are identified and actions are taken upon them?
A. Enable Advanced Routing in General Settings of Device > Setup > Management,
then commit and reboot.
B. Enable Advanced Routing Engine in Device > Setup > Session > Session Settings,
then commit and reboot.
C. Enable Advanced Routing in Network > Virtual Routers > Redistribution Profiles
and then commit.
D. Enable Advanced Routing in Network > Virtual Routers > Router Settings >
General, then commit and reboot.
5
Question #445
An administrator wants to enable Palo Alto Networks cloud services for Device Telemetry
and IoT.
Which type of certificate must be installed?
A. External CA certificate
B. Server certificate
C. Device certificate
A. Expedition
Which certificate is the best choice to configure as an SSL Forward Trust certificate?
Which two profiles are needed to complete the configuration? (Choose two.)
A. Decryption
B. HTTP Server
C. SSL/TLS Service
D. Interface Management
6
Question #450
Which three authentication types can be used to authenticate users? (Choose three.)
B. PingID
D. GlobalProtect client
C. The peer IP is not included in the permit list on Management Interface Settings.
D. The Backup Peer HA1 IP Address was not configured when the commit was issued.
9
Question #453
A network administrator wants to deploy SSL Forward Proxy decryption. What two
attributes should a forward trust certificate have? (Choose two.)
B. A private key
C. A server certificate
E. Public-facing servers
30
Question #455
During a laptop-replacement project, remote users must be able to establish a
GlobalProtect VPN connection to the corporate network before logging in to their new
Windows 10 endpoints.
The new laptops have the 5.2.10 GlobalProtect Agent installed, so the administrator
chooses to use the Connect Before Logon feature to solve this issue.
C. The GlobalProtect Portal Agent App Settings Connect Method to Pre-logon then
On-demand.
Using the above screenshot of the ACC, what is the best method to set a global filter,
narrow down Blocked User Activity, and locate the user(s) that could be compromised by a
botnet?
A. The maximum interval between hello packets that are sent to verify that the HA
functionality on the other firewall is operational
B. The maximum time that the local firewall waits before going to Active state when
another cluster member is preventing the cluster from fully synchronizing
C. The timeframe within which the firewall must receive keepalives from a cluster
member to know that the cluster member is functional
D. The time that a passive or active-secondary firewall will wait before taking over as
the active or active-primary firewall
8
Question #458
Which two policy components are required to block traffic in real time using a dynamic user
group (DUG)? (Choose two.)
B. A Deny policy with the “tag” App-ID to block the tagged traffic
Which three elements should the administrator configure to address this issue? (Choose
three.)
A. Custom application
B. Unknown application
C. Downloaded application
D. Incomplete application
3
Question #461
An administrator creates an application-based security policy rule and commits the change
to the firewall.
Which two methods should be used to identify the dependent applications for the
respective rule? (Choose two.)
A. Review the App Dependency application list from the Commit Status view.
B. Open the security policy rule and review the Depends On application list.
D. Use the show predefined xpath command and review the output.
9
Question #462
An engineer is creating a template and wants to use variables to standardize the
configuration across a large number of devices.
A. IP netmask
B. Zone
C. Path group
D. FQDN
4
Question #463
Users have reported an issue when they are trying to access a server on your network. The
requests aren't taking the expected route. You discover that there are two different static
routes on the firewall for the server.
Which two steps are likely to mitigate the issue? (Choose two.)
A. Enable decryption
A. Data Filtering
B. IP-Tag
C. Threat
D. Traffic
4
Question #466
Where can an administrator see both the management-plane and data-plane CPU utilization
in the WebUI?
A. Session Browser
B. System Logs widget
Which license is required on all Palo Alto Networks next-generation firewalls that will be
performing the HIP checks?
A. GlobalProtect Gateway
C. Threat Prevention
D. GlobalProtect Portal
6
Question #468
A network security administrator wants to configure SSL inbound inspection.
Which three components are necessary for inspecting the HTTPS traffic as it enters the
firewall? (Choose three.)
C. A Decryption profile
D. A Decryption policy
Which virtual router configuration supports running multiple instances of the OSPF protocol
over a single link?
A. ASBR
B. OSPFv3
C. ECMP
D. OSPF
6
Question #471
An administrator is configuring a Panorama device group.
B. SSL/TLS profiles
C. Address groups
D. DNS Proxy
5
Question #472
An administrator wants to use LDAP, TACACS+, and Kerberos as external authentication
services for authenticating users.
What should the administrator be aware of regarding the authentication sequence, based
on the Authentication profiles in the order Kerberos, LDAP, and TACACS+?
A. The priority assigned to the Authentication profile defines the order of the
sequence.
B. The firewall evaluates the profiles in the alphabetical order the Authentication
profiles have been named until one profile successfully authenticates the user.
C. If the authentication times out for the first Authentication profile in the
authentication sequence, no further authentication attempts will be made.
D. The firewall evaluates the profiles in top-to-bottom order until one Authentication
profile successfully authenticates the user.
9
Question #473
An administrator has two pairs of firewalls within the same subnet. Both pairs of firewalls
have been configured to use High Availability mode with Active/Passive. The ARP tables for
upstream routes display the same MAC address being shared for some of these firewalls.
What can be configured on one pair of firewalls to modify the MAC addresses so they are no
longer in conflict?
A. Change the interface type on the interfaces that have conflicting MAC addresses
from L3 to VLAN.
B. On one pair of firewalls, run the CLI command: set network interface vlan arp.
C. Change the Group IDs in the High Availability settings to be different from the
other firewall pair on the same subnet.
Which mechanism determines how the firewall chooses which route to use?
A. Administrative distance
B. Metric
A. It will cause the firewall to deny the matched sessions. Any configured Security
Profiles have no effect if the Security policy rule action is set to “Deny”.
B. The configuration will allow the matched session unless a vulnerability signature is
detected. The “Deny” action will supersede the per-severity defined actions defined in
the associated Vulnerability Protection Profile.
C. It will cause the firewall to skip this Security policy rule. A warning will be
displayed during a commit.
D. The Profile Settings section will be grayed out when the Action is set to “Deny”.
4
Question #477
Which feature detects the submission of corporate login information into website forms?
A. App-ID
D. Credential Phishing
3
Question #478
Which three firewall multi-factor authentication factors are supported by PAN-OS? (Choose
three.)
B. Push
C. User logon
D. One-Time Password
E. SSH key
4
Question #479
An administrator needs to identify which NAT policy is being used for internet traffic.
From the GUI of the firewall, how can the administrator identify which NAT policy is in use
for a traffic flow?
A. From the Monitor tab, click Traffic view and review the information in the detailed
log view.
B. From the Monitor tab, click Traffic view, ensure that the Source or Destination
NAT columns are included and review the information in the detailed log view.
C. From the Monitor tab, click App Scope > Network Monitor and filter the report for
NAT rules.
D. From the Monitor tab, click Session Browser and review the session details.
13
Question #480
Which three external services perform both authentication and authorization for
administration of firewalls? (Choose three.)
A. Kerberos
B. TACACS+
C. SAML
D. Radius
E. LDAP
6
Question #481
A firewall administrator has been tasked with ensuring that all firewalls forward System logs
to Panorama.
Which type of interface in needed on their PA-3200 Series firewall to enable Bonjour
Reflector in a segmented network?
B. Layer 3 interface
C. Layer 2 interface
D. Loopback interface
4
Question #483
An engineer is bootstrapping a VM-Series Firewall. Other than the /config folder, which
three directories are mandatory as part of the bootstrap package directory structure?
(Choose three.)
A. /plugins
B. /license
C. /opt
D. /content
E. /software
5
Question #484
A company requires the firewall to block expired certificates issued by internet-hosted
websites. The company plans to implement decryption in the future, but it does not
perform SSL Forward Proxy decryption at this time.
Without the use of SSL Forward Proxy decryption, how is the firewall still able to identify
and block expired certificates issued by internet-hosted websites?
A. By having a Certificate profile that contains the website's Root CA assigned to the
respective Security policy rule
B. By using SSL Forward Proxy to decrypt SSL and TLS handshake communication and
the server/client session keys in order to validate a certificate's authenticity and
expiration
C. By using SSL Forward Proxy to decrypt SSL and TLS handshake communication in
order to validate a certificates authenticity and expiration
D. By having a Decryption profile that blocks sessions with expired certificates in the
No Decryption section and assigning it to a No Decrypt policy rule
4
Question #485
A company is looking to increase redundancy in their network.
A. Tap
B. Layer 2
C. Virtual wire
D. Aggregate ethernet
9
Question #486
An auditor has requested that roles and responsibilities be split inside the security team.
Group A will manage templates, and Group B will manage device groups inside Panorama.
Which two specific firewall configurations will Group B manage? (Choose two.)
A. Routing
B. Security rules
C. Interfaces
D. Address objects
10
Question #487
An engineer is deploying VoIP and needs to ensure that voice traffic is treated with the
highest priority on the network.
A. Medium
B. Low
C. High
D. Real-time
5
Question #488
A network security administrator wants to enable Packet-Based Attack Protection in a Zone
Protection profile.
What are two valid ways to enable Packet-Based Attack Protection? (Choose two.)
A. TCP Drop
B. ICMP Drop
When performing an upgrade on Panorama to PAN-OS 10.2, what is the potential cause of a
failed install?
B. Outdated plugins
B. Panorama provides visibility into all the system and traffic logs received from
firewalls. It does not offer any ability to see or monitor resource utilization on managed
firewalls.
D. Panorama monitors all firewalls using SNMP. It generates a system log and can
send email alerts when resource exhaustion is detected on a managed firewall.
10
Question #492
An administrator is configuring SSL decryption and needs to ensure that all certificates for
both SSL Inbound inspection and SSL Forward Proxy are installed properly on the firewall.
When certificates are being imported to the firewall for these purposes, which three
certificates require a private key? (Choose three.)
E. Intermediate certificate(s)
23
Question #493
An administrator would like to determine which action the firewall will take for a specific
CVE.
Given the screenshot below, where should the administrator navigate to view this
information?
A. The profile rule action
B. CVE column
D. Exceptions tab
13
Question #494
An administrator has configured OSPF with Advanced Routing enabled on a Palo Alto
Networks firewall running PAN-OS 10.2. After OSPF was configured the administrator
noticed that OSPF routes were not being learned.
Which two actions could an administrator take to troubleshoot this issue? (Choose two.)
C. Look for configuration problems in Network > virtual router > OSPF
D. The firewall allows the session but does not decrypt the session.
18
Question #496
An administrator just enabled HA Heartbeat Backup on two devices. However, the status on
the firewall's dashboard is showing as down.
A. Go to Device > High Availability > General > HA Pair Settings > Setup and
configuring the peer IP for heartbeat backup
B. Go to Device > High Availability > HA Communications > General > and check the
Heartbeat Backup under Election Settings
C. Check peer IP address for heartbeat backup to Device > High Availability > HA
Communications > Packet Forwarding settings
D. Check peer IP address in the permit list in Device > Setup > Management >
Interfaces > Management Interface Settings
15
Question #497
An engineer troubleshoots an issue that causes packet drops.
Which command should the engineer run in the CLI to see if packet buffer protection is
enabled and activated?
A. show session id
Which three types of interfaces support SSL Forward Proxy? (Choose three.)
B. Layer 3
C. Layer 2
D. Tap
E. Virtual Wire
4
Question #499
If an administrator wants to apply QoS to traffic based on source, what must be specified in
a QoS policy rule?
Which timer determines how long the passive firewall will wait before taking over as the
active firewall after losing communications with the HA peer?
A. Heartbeat Interval
Question #501
A firewall engineer creates a destination static NAT rule to allow traffic from the internet to
a webserver hosted behind the edge firewall. The pre-NAT IP address of the server is
153.6.12.10, and the post-NAT IP address is 192.168.10.10. Refer to the routing and
interfaces information below.
What should the NAT rule destination zone be set to?
A. None
B. Inside
C. DMZ
D. Outside
53
Question #502
A consultant deploys a PAN-OS 11.0 VM-Series firewall with the Web Proxy feature in
Transparent Proxy mode.
Which three elements must be in place before a transparent web proxy can function?
(Choose three.)
B. Microsoft Exchange
C. GlobalProtect
D. Syslog Listener
6
Question #504
Which type of zone will allow different virtual systems to communicate with each other?
A. Tap
B. Tunnel
C. Virtual Wire
D. External
4
Question #505
An organization is interested in migrating from their existing web proxy architecture to the
Web Proxy feature of their PAN-OS 11.0 firewalls. Currently, HTTP and SSL requests contain
the destination IP address of the web server and the client browser is redirected to the
proxy.
Which PAN-OS proxy method should be configured to maintain this type of traffic flow?
B. Explicit proxy
C. Transparent proxy
D. DNS proxy
13
Question #506
An engineer discovers the management interface is not routable to the User-ID agent.
What configuration is needed to allow the firewall to communicate to the User-ID agent?
A. Add a Policy Based Forwarding (PBF) policy to the User-ID agent IP
Which troubleshooting command should the engineer use to work around this issue?
A. Panorama
A. Satellite mode
B. Tunnel mode
B. GlobalProtect Satellite
C. SD-WAN
D. IKE Gateways
12
Question #512
A customer wants to set up a site-to-site VPN using tunnel interfaces.
A. tun.1025
B. tunnel.50
C. vpn.1024
D. gre1/2
11
Question #513
An engineer notices that the tunnel monitoring has been failing for a day and the VPN
should have failed over to a backup path.
What part of the network profile configuration should the engineer verify?
A. Destination IP
B. Threshold
C. Action
D. Interval
9
Question #514
Which three multi-factor authentication methods can be used to authenticate access to the
firewall? (Choose three.)
A. One-time password
B. User certificate
C. SMS
D. Voice
E. Fingerprint
17
Question #515
Which two profiles should be configured when sharing tags from threat logs with a remote
User-ID agent? (Choose two.)
A. LDAP
B. Log Ingestion
C. HTTP
D. Log Forwarding
8
Question #516
What is the PAN-OS NPTv6 feature based on RFC 6296 used for?
Which two types of certificates are used to decrypt the traffic? (Choose two.)
A. Device certificate
C. Self-signed root CA
D. External CA certificate
10
Question #518
An engineer is deploying multiple firewalls with common configuration in Panorama.
What are two benefits of using nested device groups? (Choose two.)
B. Push the Template first, then push Device Group to the newly managed firewall.
C. Push the Device Group first, then push Template to the newly managed firewall.
D. Perform the Export or push Device Config Bundle to the newly managed firewall.
6
Question #522
Which new PAN-OS 11.0 feature supports IPv6 traffic?
A. OSPF
B. IKEv1
C. DHCP Server
B. Allow
C. Alert
D. Override
6
Question #524
An engineer is reviewing the following high availability (HA) settings to understand a recent
HA failover event.
Which timer determines the frequency between packets sent to verify that the HA
functionality on the other HA firewall is operational?
A. Hello Interval
C. Heartbeat Interval
C. Custom app
The engineer needs to configure dynamic updates to use a dataplane interface for internet
traffic.
What should be configured in Setup > Services > Service Route Configuration to allow this
traffic?
A. Set DNS and Palo Alto Networks Services to use the MGT source interface.
B. Set DNS and Palo Alto Networks Services to use the ethernet1/1 source interface.
C. Set DNS and Palo Alto Networks Services to use the ethernet1/2 source interface.
D. Set DDNS and Palo Alto Networks Services to use the MGT source interface.
18
Question #527
An organization conducts research on the benefits of leveraging the Web Proxy feature of
PAN-OS 11.0.
What are two benefits of using an explicit proxy method versus a transparent proxy
method? (Choose two.)
D. Explicit proxy allows for easier troubleshooting, since the client browser is aware
of the existence of the proxy.
15
Question #528
Which three external authentication services can the firewall use to authenticate admins
into the Palo Alto Networks NGFW without creating administrator account on the local
firewall? (Choose three.)
A. TACACS+
B. Kerberos
C. SAML
D. RADIUS
E. LDAP
10
Question #529
With the default TCP and UDP settings on the firewall, what will be the identified application
in the following session?
A. insufficient-data
B. incomplete
C. not-applicable
D. unknown-tcp
15
Question #530
To ensure that a Security policy has the highest priority, how should an administrator
configure a Security policy in the device group hierarchy?
A. Clone the security policy and add it to the other device groups.
B. Add the policy to the target device group and apply a master device to the device
group.
A. Deny
B. Allow
C. Discard
D. Next VR
7
Question #533
An engineer manages a high availability network and requires fast failover of the routing
protocols. The engineer decides to implement BFD.
A. OSPF
B. IGRP
D. BGP
E. RIP
5
Question #534
A company has recently migrated their branch office’s PA-220s to a centralized Panorama.
This Panorama manages a number of PA-7000 Series and PA-5200 Series devices. All device
group and template configuration is managed solely within Panorama.
They notice that commit times have drastically increased for the PA-220s after the
migration.
A. Disable “Share Unused Address and Service Objects with Devices” in Panorama
Settings.
B. Perform a device group push using the “merge with device candidate config”
option.
D. Use “export or push device config bundle” to ensure that the firewall is integrated
with the Panorama config.
13
Question #535
An administrator is troubleshooting why video traffic is not being properly classified.
If this traffic does not match any QoS classes, what default class is assigned?
A. 1
B. 2
C. 3
D. 4
5
Question #536
An administrator notices that an interface configuration has been overridden locally on a
firewall. They require all configuration to be managed from Panorama and overrides are not
allowed.
C. Perform a template commit push from Panorama using the “Force Template
Values” option.
D. Perform a device-group commit push from Panorama using the “Include Device
and Network Templates” option.
2
Question #537
Where can a service route be configured for a specific destination IP?
A. Use Network > Virtual Routers, select the Virtual Router > Static Routes > IPv4
C. Use Device > Setup > Services > Service Route Configuration > Customize > IPv4
D. Use Device > Setup > Services > Service Route Configuration > Customize >
Destination
14
Question #538
Phase two of a VPN will not establish a connection. The peer is using a policy-based VPN
configuration.
B. Security policy
C. Proxy-IDs
D. PAN-OS versions
5
Question #539
Information Security is enforcing group-based policies by using security-event monitoring on
Windows User-ID agents for IP-to-User mapping in the network. During the rollout,
Information Security identified a gap for users authenticating to their VPN and wireless
networks.
Root cause analysis showed that users were authenticating via RADIUS and that
authentication events were not captured on the domain controllers that were being
monitored. Information Security found that authentication events existed on the Identity
Management solution (IDM).
There did not appear to be direct integration between PAN-OS and the IDM solution.
How can Information Security extract and learn IP-to-user mapping information from
authentication events for VPN and wireless users?
A. Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over
TLS.
B. Configure the User-ID XML API on PAN-OS firewalls to pull the authentication
events directly from the IDM solution.
D. Configure the Windows User-ID agents to monitor the VPN concentrators and
wireless controllers for IP-to-User mapping.
21
Question #540
An administrator troubleshoots an issue that causes packet drops.
Which log type will help the engineer verify whether packet buffer protection was
activated?
A. Configuration
B. Data Filtering
C. Traffic
D. Threat
6
Question #541
An engineer creates a set of rules in a Device Group (Panorama) to permit traffic to various
services for a specific LDAP user group.
What needs to be configured to ensure Panorama can retrieve user and group information
for use in these rules?
C. A Master Device
D. Authentication Portal
14
Question #542
Review the information below. A firewall engineer creates a U-NAT rule to allow users in the
trust zone access to a server in the same zone by using an external, public NAT IP for that
server.
Given the rule below, what change should be made to make sure the NAT works as
expected?
A. Change destination NAT zone to Trust_L3.
E. Authentication Profile
6
Question #544
A firewall engineer reviews the PAN-OS GlobalProtect application and sees that it implicitly
uses web-browsing and depends on SSL.
When creating a new rule, what is needed to allow the application to resolve dependencies?
A. 1 to 4 hours
B. 6 to 12 hours
C. 24 hours
D. 36 hours
9
Question #546
An engineer configures a specific service route in an environment with multiple virtual
systems instead of using the inherited global service route configuration.
Which three elements should the administrator configure to address this issue? (Choose
three.)
Based on the screenshots above, what is the correct order in which the various rules are
deployed to firewalls inside the DATACENTER_DG device group?
A. shared pre-rules
DATACENTER_DG pre-rules -
rules configured locally on the firewall
DATACENTER_DG post-rules -
shared post-rules
shared default rules
B. shared pre-rules
DATACENTER_DG pre-rules -
rules configured locally on the firewall
shared post-rules
DATACENTER_DG post-rules -
DATACENTER_DG default rules
C. shared pre-rules
DATACENTER_DG pre-rules -
rules configured locally on the firewall
shared post-rules
DATACENTER_DG post-rules -
shared default rules
D. shared pre-rules
DATACENTER_DG pre-rules -
rules configured locally on the firewall
DATACENTER_DG post-rules -
shared post-rules
DATACENTER_DG default rules
19
Question #550
A company wants to implement threat prevention to take action without redesigning the
network routing.
What are two best practice deployment modes for the firewall? (Choose two.)
A. Virtual Wire
B. Layer 2
C. Layer 3
D. TAP
Question #551
Which operation will impact the performance of the management plane?
A. Tunnel inspection
B. NAT
C. QoS
D. DOS protection
5
Question #553
Why would a traffic log list an application as "not-applicable"?
A. There was not enough application data after the TCP connection was established.
C. The firewall denied the traffic before the application match could be performed.
A. Device ID
B. Log settings
C. Group mapping
A. Enable DNS rewrite under the destination address translation in the Translated
Packet section of the NAT rule with the direction Forward.
C. Enable DNS rewrite under the destination address translation in the Translated
Packet section of the NAT rule with the direction Reverse.
Which HA firewall state describes the firewall that is experiencing a failure of a monitored
path?
A. Initial
B. Passive
C. Active-secondary
D. Tentative
4
Question #557
You are auditing the work of a co-worker and need to verify that they have matched the
Palo Alto Networks Best Practices for Anti-Spyware Profiles.
For which three severity levels should single-packet captures be enabled to meet the Best
Practice standard? (Choose three.)
A. Critical
B. High
C. Medium
D. Informational
E. Low
11
Question #558
In the New App Viewer under Policy Optimizer, what does the compare option for a specific
rule allow an administrator to compare?
C. Applications configured in the rule with applications seen from traffic matching
the same rule
D. Yes, because both the web-browsing application and the flash file have the "alert"
action.
20
Question #560
Which two factors should be considered when sizing a decryption firewall deployment?
(Choose two.)
A. Number of security zones in decryption policies
B. Encryption algorithm
The firewall engineer discovers that some return traffic from these web servers is not
reaching the users behind the firewall. The engineer later concludes that the maximum
transmission unit (MTU) on an upstream router interface is set to 1400 bytes.
Which template values will be configured on the firewall if each template has an SSL/TLS
Service profile configured named Management?
B. Values in Datacenter
C. Values in efw01ab.chi
D. Values in Chicago
2
Question #563
An administrator configures two VPN tunnels to provide for failover and uninterrupted VPN
service.
What should an administrator configure to enable automatic failover to the backup tunnel?
A. Replay Protection
B. Zone Protection
C. Tunnel Monitor
D. Passive Mode
2
Question #564
An administrator configures a site-to-site IPsec VPN tunnel between a PA-850 and an
external customer on their policy-based VPN devices.
What should an administrator configure to route interesting traffic through the VPN tunnel?
A. Proxy IDs
B. ToS Header
C. GRE Encapsulation
D. Tunnel Monitor
4
Question #565
A firewall engineer creates a new App-ID report under Monitor > Reports > Application
Reports > New Applications to monitor new applications on the network and better assess
any Security policy updates the engineer might want to make.
B. It matches to the New App-IDs in the most recently installed content releases.
D. It matches to the New App-IDs installed since the last time the firewall was
rebooted.
5
Question #566
An engineer is monitoring an active/active high availability (HA) firewall pair.
Which HA firewall state describes the firewall that is currently processing traffic?
A. Passive
B. Initial
C. Active
D. Active-primary
9
Question #567
An engineer needs to configure a standardized template for all Panorama-managed
firewalls. These settings will be configured on a template named "Global" and will be
included in all template stacks.
Which three settings can be configured in this template? (Choose three.)
C. Email scheduler
D. Login banner
E. Dynamic updates
11
Question #568
An organization wants to begin decrypting guest and BYOD traffic.
Which NGFW feature can be used to identify guests and BYOD users, instruct them how to
download and install the CA certificate, and clearly notify them that their traffic will be
decrypted?
A. Authentication Portal
D. comfort pages
23
Question #569
Which two key exchange algorithms consume the most resources when decrypting SSL
traffic? (Choose two.)
A. ECDSA
B. ECDHE
C. RSA
D. DHE
9
Question #570
An engineer troubleshoots a Panorama-managed firewall that is unable to reach the DNS
servers configured via a global template. As a troubleshooting step, the engineer needs to
configure a local DNS server in place of the template value.
Which two actions can be taken to ensure that only the specific firewall is affected during
this process? (Choose two.)
Where can the engineer view what time the interface went down?
Which two pieces of information should the consultant provide regarding Web Proxy
authentication? (Choose two.)
What is the recommended upgrade path procedure from PAN-OS 10.1 to 11.0.x?
A. Required: Download and install the latest preferred PAN-OS 10.1 maintenance
release and reboot.
Required: Download PAN-OS 10.2.0.
Optional: Install the latest preferred PAN-OS 10.2 maintenance release.
Required: Download PAN-OS 11.0.0.
Required: Download and install the desired PAN-OS 11.0.x.
B. Optional: Download and install the latest preferred PAN-OS 10.1 release.
Optional: Install the latest preferred PAN-OS 10.2 maintenance release.
Required: Download PAN-OS 11.0.0.
Required: Download and install the desired PAN-OS 11.0.x.
D. Required: Download and install the latest preferred PAN-OS 10.1 maintenance
release and reboot.
Required: Download PAN-OS 10.2.0.
Required: Download and install the latest preferred PAN-OS 10.2 maintenance release
and reboot.
Required: Download PAN-OS 11.0.0.
Required: Download and install the desired PAN-OS 11.0.x.
13
Question #575
Which two actions must an engineer take to configure SSL Forward Proxy decryption?
(Choose two.)
A. Configure the decryption profile.
Which two additional best-practice guideline actions should be taken with regard to
dynamic updates? (Choose two.)
B. Click "Review Apps" after application updates are installed in order to assess how
the changes might impact Security policy.
C. Create a Security policy rule with an application filter to always allow certain
categories of new App-IDs.
A. HA1
B. HA2
C. HA3
D. HA4
Question #578
What can the Log Forwarding built-in action with tagging be used to accomplish?
Based on the image below, what - if any - action was taken by the active firewall when the
link failed?
B. The active firewall failed over to the passive HA member due to an AE1 Link Group
failure.
D. The active firewall failed over to the passive HA member because "any" is selected
for the Link Monitoring "Failure Condition".
5
Question #580
A firewall administrator wants to be able to see all NAT sessions that are going through a
firewall with source NAT.
C. Tags
D. Login banner
E. Dynamic updates
10
Question #582
All firewalls at a company are currently forwarding logs to Palo Alto Networks log collectors.
The company also wants to deploy a syslog server and forward all firewall logs to the syslog
server and to the log collectors. There is a known logging peak time during the day and the
security team has asked the firewall engineer to determine how many logs per second the
current Palo Alto Networks log collectors are processing at that particular time.
A. Navigate to Panorama > Managed Collectors, and open the Statistics window for
each Log Collector during the peak time
B. Navigate to ACC > Network Activity, and determine the total number of sessions
and threats during the peak time
C. Navigate to Monitor > Unified logs, set the filter to the peak time, and browse to
the last page to find out how many logs have been received
D. Navigate to Panorama > Managed Devices > Health, open the Logging tab for each
managed firewall and check the log rates during the peak time
5
Question #583
A firewall engineer is configuring quality of service (QoS) policy for the IP address of a
specific server in an effort to limit the bandwidth consumed by frequent downloads of large
files from the internet.
Which combination of pre-NAT and/or post-NAT information should be used in the QoS
rule?
B. Outdated plugins
D. Expired certificates
1
Question #585
Following a review of firewall logs for traffic generated by malicious activity, how can an
administrator confirm that WildFire has identified a virus?
A. By navigating to Monitor > Logs > Traffic, applying filter “(subtype eq virus)”
B. By navigating to Monitor > Logs > Threat, applying filter “(subtype eq virus)”
C. By navigating to Monitor > Logs > Threat, applying filter “(subtype eq wildfire-
virus)”
D. By navigating to Monitor > Logs > WildFire Submissions, applying filter “(subtype
eq wildfire-virus)”
3
Question #586
A firewall engineer is managing a Palo Alto Networks NGFW which is not in line of any DHCP
traffic.
Which interface mode can the engineer use to generate Enhanced Application logs (EALs)
for classifying IoT devices while receiving broadcast DHCP traffic?
A. Virtual wire
B. Layer 3
C. Layer 2
D. Tap
17
Question #587
An administrator is considering deploying WildFire globally.
What should the administrator consider with regards to the WildFire infrastructure?
A. To comply with data privacy regulations, WildFire signatures and verdicts are not
shared globally.
B. Palo Alto Networks owns and maintains one global cloud and four WildFire
regional clouds.
C. Each WildFire cloud analyzes samples independently of the other WildFire clouds.
A. User-ID
B. GlobalProtect
C. Configuration
D. Tunnel
4
Question #589
A firewall engineer needs to update a company’s Panorama-managed firewalls to the latest
version of PAN-OS. Strict security requirements are blocking internet access to Panorama
and to the firewalls. The PAN-OS images have previously been downloaded to a secure host
on the network.
Which path should the engineer follow to deploy the PAN-OS images to the firewalls?
A. Upload the image to Panorama > Device Deployment > Software menu, and
deploy it to the firewalls.
B. Upload the image to Panorama > Device Deployment > Dynamic Updates menu,
and deploy it to the firewalls.
C. Upload the image to Panorama > Software menu, and deploy it to the firewalls.
D. Upload the image to Panorama > Dynamic Updates menu, and deploy it to the
firewalls.
4
Question #590
Which conditions must be met when provisioning a high availability (HA) cluster? (Choose
two.)
A. HA cluster members must be the same firewall model and run the same PAN-OS
version.
D. Dedicated HA communication interfaces for the cluster must be used over HSCI
interfaces.
7
Question #591
Why are external zones required to be configured on a Palo Alto Networks NGFW in an
environment with multiple virtual systems?
A. To allow traffic between zones in different virtual systems while the traffic is
leaving the appliance
B. External zones are required because the same external zone can be used on
different virtual systems
C. To allow traffic between zones in different virtual systems without the traffic
leaving the appliance
D. Multiple external zones are required in each virtual system to allow the
communications between virtual systems
3
Question #592
Which two are required by IPSec in transport mode? (Choose two.)
B. NAT Traversal
C. IKEv1
A. Only Panorama and Dedicated Log Collectors must be patched to the target PAN-
OS version before updating the firewalls.
B. Panorama, Dedicated Log Collectors, and WildFire appliances must have the target
PAN-OS version downloaded, after which the order of patching does not matter.
D. Only Panorama must be patched to the target PAN-OS version before updating
the firewalls.
2
Question #594
Which rule type controls end user SSL traffic to external websites?
B. SSH Proxy
Where can the firewall engineer define the data to be added into each forwarded log?
A. Custom Log Format within Device > Server Profiles > Syslog
C. Logging and Reporting Settings within Device > Setup > Management
A. Application filter
D. Custom app
9
Question #598
A firewall administrator is configuring an IPSec tunnel between Site A and Site B. The Site A
firewall uses a DHCP assigned address on the outside interface of the firewall, and the Site B
firewall uses a static IP address assigned to the outside interface of the firewall. However,
the use of dynamic peering is not working.
Refer to the two sets of configuration settings provided. Which two changes will allow the
configurations to work? (Choose two.)
Site A configuration:
Site B configuration:
Which HA firewall state describes the firewall that is currently processing traffic?
A. Active-primary
B. Active
C. Active-secondary
D. Initial
Question #601
A root cause analysis investigation into a recent security incident reveals that several
decryption rules have been disabled. The security team wants to generate email alerts when
decryption rules are changed.
A. With the relevant system log filter inside Device > Log Settings
B. With the relevant configuration log filter inside Device > Log Settings
C. With the relevant configuration log filter inside Objects > Log Forwarding
D. With the relevant system log filter inside Objects > Log Forwarding
3
Question #602
An engineer has been given approval to upgrade their environment to the latest of PAN-OS.
The environment consists of both physical and virtual firewalls, a virtual Panorama HA pair,
and virtual log collectors.
Knowing that using decryption can be resource-intensive, how can the administrator reduce
the load on the firewall?
A. Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.
B. Use RSA instead of ECDSA for traffic that isn’t sensitive or high-priority.
D. Use ECDSA instead of RSA for traffic that isn’t sensitive or high-priority.
14
Question #604
A firewall engineer has determined that, in an application developed by the company’s
internal team, sessions often remain idle for hours before the client and server exchange
any data. The application is also currently identified as unknown-tcp by the firewalls. It is
determined that because of a high level of trust, the application does not require to be
scanned for threats, but it needs to be properly identified in Traffic logs for reporting
purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is
used to identify the application?
B. Access the Palo Alto Networks website and complete the online form to request
that a new application be added to App-ID.
D. Access the Palo Alto Networks website and raise a support request through the
Customer Support Portal.
21
Question #605
What happens when the log forwarding built-in action with tagging is used?
A. Selected logs are forwarded to the Azure Security Center.
Which set of steps should the engineer take to accomplish this objective?
A. 1. Create a NAT rule (NAT-Rule-1) and set the source address in the original packet
to 10.0.0.10/32.
2. Check the box for negate option to negate this IP from the NAT translation.
B. 1. Create a NAT rule (NAT-Rule-1) and set the source address in the original packet
to 10.0.0.0/23.
2. Check the box for negate option to negate this IP subnet from NAT translation.
C. Enable User-ID.
Which two additional log forwarding methods will PAN-OS support? (Choose two.)
A. HTTP
B. SSL
C. Email
D. TLS
1
Question #609
A firewall administrator has confirmed reports of a website is not displaying as expected,
and wants to ensure that decryption is not causing the issue.
Which three methods can the administrator use to determine if decryption is causing the
website to fail? (Choose three.)
A. Move the policy with action decrypt to the top of the decryption policy rulebase.
B. Investigate decryption logs of the specific traffic to determine reasons for failure.
C. Temporarily disable SSL decryption for all websites to troubleshoot the issue.
What should the administrator consider with regards to the WildFire analysis process?
A. Each WildFire cloud analyzes samples independently of the other WildFire clouds.
B. To comply with data privacy regulations, WildFire signatures and verdicts are not
shared globally.
C. Palo Alto Networks owns and maintains one global cloud and four WildFire
regional clouds.
A. Server certificate
B. CA certificate
D. Certificate Profile
Question #613
What happens when an A/P firewall pair synchronizes IPsec tunnel security associations
(SAs)?
A. Perform session cache synchronization for all HA cluster members with the same
cluster ID.
B. Perform synchronization of sessions, forwarding tables, and IPSec security
associations between firewalls in an HA pair.
C. Perform packet forwarding to the active-passive peer during session setup and
asymmetric traffic flow.
Which GlobalProtect Gateway will users connect to based on the chart provided?
A. East
B. South
C. West
D. Central
Question #616
A network security engineer needs to ensure that virtual systems can communicate with
one another within a Palo Alto Networks firewall. Separate virtual routers (VRs) are created
for each virtual system.
In addition to confirming security policies, which three configuration details should the
engineer focus on to ensure communication between virtual systems? (Choose three.)
A. Add a route with next hop next-vr by using the VR configured in the virtual
system.
C. Add a route with next hop set to none, and use the interface of the virtual systems
that need to communicate.
D. Ensure the virtual systems are visible to one another.
The database team reports that they are unable to establish a secure connection to
198.51.100.88 from 203.0.113.40. However, it confirms a successful ping test to
198.51.100.88.
Referring to the NAT configuration and traffic logs provided how can the firewall engineer
resolve the situation and ensure inbound and outbound connections work concurrently for
both DMZ servers?
A. Move the NAT rule 6 DMZ server 2 above NAT rule 5 DMZ server 1.
B. Replace the two NAT rules with a single rule that has both DMZ servers as "Source
Address" both external servers as "Destination Address," and Source Translation
remaining as is with bidirectional option enabled.
C. Configure separate source NAT and destination NAT rules for the two DMZ servers
without using the bidirectional option.
D. Sharing a single NAT IP is possible for outbound connectivity not for inbound
therefore a new public IP address must be obtained for the new DMZ server and used
in the NAT rule 6 DMZ server 2.
Question #618
A security team has enabled eal-time WildFire signature lookup on all its firewalls. Which
additional action will further reduce the likelihood of newly discovered malware being
allowed through the firewalls?
A. Enable the "Hold Mode" option in Objects > Security Profiles > Antivirus
D. Enable the "Report Grayware Files" option in Device > Setup > WildFire
Question #619
A company configures its WildFire analysis profile to forward any file type to the WildFire
public cloud. A company employee receives an email containing an unknown link that
downloads a malicious Portable Executable (PE) file.
A. Performs malicious content analysis on the linked page: but not the corresponding
PE file
B. Performs malicious content analysis on the linked page and the corresponding PE
file
C. Does not perform malicious content analysis on the linked page but performs it on
the corresponding PE file
D. Does not perform malicious content analysis on either the linked page or the
corresponding PE file