PCNSA
PCNSA
DRAG DROP -
Match the Palo Alto Networks Security Operating Platform architecture to its description.
Select and Place:
Answer:
Q2 Topic 1
Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting
functions on a separate processor?
A. management
B. network processing
C. data
D. security processing
Answer: A
Community vote distribution
A (100%)
Q3 Topic 1
Answer: C
How many zones can an interface be assigned with a Palo Alto Networks firewall?
A. two
B. three
C. four
D. one
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/network/network-
zones/security-zone-overview
Answer: BC
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/user-identification/
device-user-identification-user-mapping/enable-server- monitoring
A. Signature Matching
B. Network Processing
C. Security Processing
D. Data Interfaces
Answer: A
Which option shows the attributes that are selectable when setting up application filters?
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects-
application-filters
Community vote distribution
B (100%)
Q8 Topic 1
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
A. Block List
B. Custom URL Categories
C. PAN-DB URL Categories
D. Allow List
Answer: AD
DRAG DROP -
Match the Cyber-Attack Lifecycle stage to its correct description.
Select and Place:
Answer:
Q10 Topic 1
Which two statements are correct about App-ID content updates? (Choose two.)
A. Updated application content might change how Security policy rules are enforced.
B. After an application content update, new applications must be manually classified
prior to use.
C. Existing security policy rules are not affected by application content updates.
D. After an application content update, new applications are automatically identified and
classified.
Answer: CD
Which User-ID mapping method should be used for an environment with users that do not
authenticate to Active Directory?
Answer: C
An administrator needs to allow users to use their own office applications. How should the
administrator configure the firewall to allow multiple applications in a dynamic environment?
A. Create an Application Filter and name it Office Programs, then filter it on the
business-systems category, office-programs subcategory
B. Create an Application Group and add business-systems to it
C. Create an Application Filter and name it Office Programs, then filter it on the
business-systems category
D. Create an Application Group and add Office 365, Evernote, Google Docs, and Libre
Office
Answer: A
Employees are shown an application block page when they try to access YouTube. Which
security policy is blocking the YouTube application?
A. intrazone-default
B. Deny Google
C. allowed-security services
D. interzone-default
Answer: D
Choose the option that correctly completes this statement. A Security Profile can block or allow
traffic ____________.
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy.html
A. Translation Type
B. Interface
C. Address Type
D. IP Address
Answer: A
A. Virtual Wire
B. Layer3
C. Layer2
D. Loopback
Answer: A
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago.
Which utility should the company use to identify out-of-date or unused rules on the firewall?
Answer: D
Community vote distribution
D (100%)
Q19 Topic 1
DRAG DROP -
Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
Select and Place:
Answer:
Q20 Topic 1
What are two differences between an implicit dependency and an explicit dependency in App-
ID? (Choose two.)
A. An implicit dependency does not require the dependent application to be added in the
security policy
B. An implicit dependency requires the dependent application to be added in the security
policy
C. An explicit dependency does not require the dependent application to be added in the
security policy
D. An explicit dependency requires the dependent application to be added in the security
policy
Answer: AD
Recently changes were made to the firewall to optimize the policies and the security team wants
to see if those changes are helping.
What is the quickest way to reset the hit counter to zero in all the security policy rules?
A. At the CLI enter the command reset rules and press Enter
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule
C. Reboot the firewall
D. Use the Reset Rule Hit Counter > All Rules option
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/policies/policies-
security/creating-and-managing-policies
Which two App-ID applications will you need to allow in your Security policy to use facebook-
chat? (Choose two.)
A. facebook
B. facebook-chat
C. facebook-base
D. facebook-email
Answer: BC
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV0CAK
Which User-ID agent would be appropriate in a network with multiple WAN links, limited
network bandwidth, and limited firewall management plane resources?
Your company requires positive username attribution of every IP address used by wireless
devices to support a new compliance requirement. You must collect IP
`"to-user mappings as soon as possible with minimal downtime and minimal configuration
changes to the wireless devices themselves. The wireless devices are from various manufactures.
Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.
A. syslog
B. RADIUS
C. UID redistribution
D. XFF headers
Answer: A
An administrator receives a global notification for a new malware that infects hosts. The
infection will result in the infected host attempting to contact a command- and-control (C2)
server.
Which two security profile components will detect and prevent this threat after the firewall's
signature database has been updated? (Choose two.)
Answer: BD
Reference:
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/policy/create-best-practice-security-
profiles
A. Delivery
B. Reconnaissance
C. Command and Control
D. Exploitation
Answer: D
Identify the correct order to configure the PAN-OS integrated USER-ID agent.
3. add the service account to monitor the server(s)
2. define the address of the servers to be monitored on the firewall
4. commit the configuration, and verify agent connection status
1. create a service account on the Domain Controller with sufficient permissions to execute the
User- ID agent
A. 2-3-4-1
B. 1-4-3-2
C. 3-1-2-4
D. 1-3-2-4
Answer: D
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.
Complete the security policy to ensure only Telnet is allowed.
Security Policy: Source Zone: Internal to DMZ Zone __________services `Application defaults`,
and action = Allow
Answer: B
Based on the security policy rules shown, ssh will be allowed on which port?
A. 80
B. 53
C. 22
D. 23
Answer: C
Which license must an Administrator acquire prior to downloading Antivirus Updates for use
with the firewall?
A. Threat Prevention
B. WildFire
C. Antivirus
D. URL Filtering
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/install-content-and-
software-updates.html
Community vote distribution
A (100%)
Q31 Topic 1
An administrator notices that protection is needed for traffic within the network due to malicious
lateral movement activity. Based on the image shown, which traffic would the administrator
need to monitor and block to mitigate the malicious activity?
Answer: D
Given the topology, which zone type should zone A and zone B to be configured with?
A. Layer3
B. Tap
C. Layer2
D. Virtual Wire
Answer: A
To use Active Directory to authenticate administrators, which server profile is required in the
authentication profile?
A. domain controller
B. TACACS+
C. LDAP
D. RADIUS
Answer: C
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
A. Layer 2
B. Tap
C. Layer 3
D. Virtual Wire
Answer: B
Which administrator type provides more granular options to determine what the administrator
can view and modify when creating an administrator account?
A. Root
B. Dynamic
C. Role-based
D. Superuser
Answer: C
Which administrator type utilizes predefined roles for a local administrator account?
A. Superuser
B. Role-based
C. Dynamic
D. Device administrator
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-cli-quick-start/get-started-with-the-cli/give-
administrators-access-to-the-cli/administrative- privileges?PageSpeed=noscript
Which two security profile types can be attached to a security policy? (Choose two.)
A. antivirus
B. DDoS protection
C. threat
D. vulnerability
Answer: AD
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/policy/security-profiles
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop.
The USB drive had malware on it that loaded onto their computer and then contacted a known
command and control (CnC) server, which ordered the infected machine to begin Exfiltrating
data from the laptop.
Which security profile feature could have been used to prevent the communication with the CnC
server?
Which user mapping method could be used to discover user IDs in an environment with multiple
Windows domain controllers?
Answer: A
Which three statements describe the operation of Security policy rules and Security Profiles?
(Choose three.)
Answer: ABC
Answer: BC
Which type of Security policy rule would match traffic flowing between the Inside zone and
Outside zone, within the Inside zone, and within the Outside zone?
A. global
B. intrazone
C. interzone
D. universal
Answer: D
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC
Which Palo Alto Networks firewall security platform provides network security for mobile
endpoints by inspecting traffic deployed as internet gateways?
A. GlobalProtect
B. AutoFocus
C. Aperture
D. Panorama
Answer: A
Community vote distribution
A (100%)
Q44 Topic 1
Which two statements are correct regarding multiple static default routes when they are
configured as shown in the image? (Choose two.)
Answer: CD
A. Exploitation
B. Installation
C. Reconnaissance
D. Act on Objective
Answer: A
Which file is used to save the running configuration with a Palo Alto Networks firewall?
A. running-config.xml
B. run-config.xml
C. running-configuration.xml
D. run-configuration.xml
Answer: A
In the example security policy shown, which two websites would be blocked? (Choose two.)
A. LinkedIn
B. Facebook
C. YouTube
D. Amazon
Answer: AB
Which Palo Alto Networks component provides consolidated policy creation and centralized
management?
A. GlobalProtect
B. Panorama
C. Prisma SaaS
D. AutoFocus
Answer: B
Reference:
https://www.paloaltonetworks.com/resources/datasheets/panorama-centralized-management-
datasheet
A. The Security Policy Adoption Heatmap component filters the information by device
groups, serial numbers, zones, areas of architecture, and other categories
B. It provides a set of questionnaires that help uncover security risk prevention gaps
across all areas of network and security architecture
C. It provides a percentage of adoption for each assessment area
D. It performs over 200 security checks on Panorama/firewall for the assessment
Answer: B
Reference:
https://docs.paloaltonetworks.com/best-practices/8-1/data-center-best-practices/data-center-best-
practice-security-policy/use-palo-alto-networks- assessment-and-review-tools
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an
integrated approach to prevent threats? (Choose five.)
A. User identification
B. Filtration protection
C. Vulnerability protection
D. Antivirus
E. Application identification
F. Anti-spyware
Answer: ACDEF
The PowerBall Lottery has reached a high payout amount and a company has decided to help
employee morale by allowing employees to check the number, but doesn't want to unblock the
gambling URL category.
Which two methods will allow the employees to get to the PowerBall Lottery site without the
company unlocking the gambling URL category? (Choose two.)
A. Add all the URLs from the gambling category except powerball.com to the block list
and then set the action for the gambling category to allow.
B. Manually remove powerball.com from the gambling URL category.
C. Add *.powerball.com to the allow list
D. Create a custom URL category called PowerBall and add *.powerball.com to the
category and set the action to allow.
Answer: CD
A. Aperture
B. AutoFocus
C. Panorama
D. GlobalProtect
Answer: A
An administrator receives a global notification for a new malware that infects hosts. The
infection will result in the infected host attempting to contact and command-and-control (C2)
server.
Which security profile components will detect and prevent this threat after the firewall's
signature database has been updated?
Answer: C
Answer: B
A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and
future Public Cloud environments. All other required connections have already been enabled
between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-
admin make?
A. every 5 minutes
B. every 15 minutes
C. every 60 minutes
D. every 30 minutes
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-new-features/wildfire-features/five-minute-
wildfire-updates
What is the minimum frequency for which you can configure the firewall to check for new
WildFire antivirus signatures?
A. every 30 minutes
B. every 5 minutes
C. every 24 hours
D. every 1 minute
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-new-features/wildfire-features/five-minute-
wildfire-updates
Your company has 10 Active Directory domain controllers spread across multiple WAN links.
All users authenticate to Active Directory. Each link has substantial network bandwidth to
support all mission-critical applications. The firewall's management plane is highly utilized.
Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto
Networks?
Answer: A
DRAG DROP -
Arrange the correct order that the URL classifications are processed within the system.
Select and Place:
Answer:
Q60 Topic 1
What must you configure to enable the firewall to access multiple Authentication Profiles to
authenticate a non-local account?
A. authentication sequence
B. LDAP server profile
C. authentication server list
D. authentication list profile
Answer: A
Reference:
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/framemaker/pan-os/7-1/
pan-os-admin.pdf page 144
Answer: A
Community vote distribution
A (100%)
Q62 Topic 1
A. Tap
B. Layer3
C. Virtual Wire
D. Layer2
Answer: B
Which URL Filtering Profile action does not generate a log entry when a user attempts to access
a URL?
A. Override
B. Allow
C. Block
D. Continue
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/url-filtering/url-filtering-concepts/
url-filtering-profile-actions
An internal host needs to connect through the firewall using source NAT to servers of the
internet.
Which policy is required to enable source NAT on the firewall?
Answer: A
Which Security Profile can provide protection against ICMP floods, based on individual
combinations of a packet's source and destination IP addresses?
A. DoS protection
B. URL filtering
C. packet buffering
D. anti-spyware
Answer: A
Which path in PAN-OS 9.0 displays the list of port-based security policy rules?
Answer: C
Which two components are utilized within the Single-Pass Parallel Processing architecture on a
Palo Alto Networks Firewall? (Choose two.)
A. Layer-ID
B. User-ID
C. QoS-ID
D. App-ID
Answer: BD
Reference:
http://www.firewall.cx/networking-topics/firewalls/palo-alto-firewalls/1152-palo-alto-firewall-
single-pass-parallel-processing-hardware-architecture.html
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
A. Device>Setup>Services
B. Device>Setup>Management
C. Device>Setup>Operations
D. Device>Setup>Interfaces
Answer: C
DRAG DROP -
Match the network device with the correct User-ID technology.
Select and Place:
Answer:
Q70 Topic 1
Which action related to App-ID updates will enable a security administrator to view the existing
security policy rule that matches new application signatures?
A. Review Policies
B. Review Apps
C. Pre-analyze
D. Review App Matches
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-
introduced-in-content-releases/review-new-app-id-impact-on- existing-policy-rules
A. Select a Security policy rule, and then select Hit Count > Reset.
B. Reboot the data-plane.
C. First disable and then re-enable the rule.
D. Type the CLI command reset hitcount <POLICY-NAME>.
Answer: A
Given the topology, which zone type should you configure for firewall interface E1/1?
A. Tap
B. Tunnel
C. Virtual Wire
D. Layer3
Answer: A
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
A. Management
B. High Availability
C. Aggregate
D. Aggregation
Answer: C
Which security policy rule would be needed to match traffic that passes between the Outside
zone and Inside zone, but does not match traffic that passes within the zones?
A. intrazone
B. interzone
C. universal
D. global
Answer: B
Four configuration choices are listed, and each could be used to block access to a specific URL.
If you configured each choice to block the same URL then which choice would be the last to
block access to the URL?
Answer: C
Which data flow direction is protected in a zero-trust firewall deployment that is not protected in
a perimeter-only firewall deployment?
A. north-south
B. inbound
C. outbound
D. east-west
Answer: D
Which protocol is used to map usernames to user groups when User-ID is configured?
A. TACACS+
B. SAML
C. LDAP
D. RADIUS
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-users-to-groups.html
Answer: D
Reference:
https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone.
Complete the two empty fields in the Security policy rules that permits only this type of access.
Action: allow -
(Choose two.)
A. Service = ג€application-defaultג€
B. Service = ג€service-telnetג€
C. Application = ג€Telnetג€
D. Application = ג€anyג€
Answer: AC
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/dns-security/
enable-dns-security.html
Which two statements are true for the DNS Security service introduced in PAN-OS version 9.0?
(Choose two.)
Answer: AB
Which two features can be used to tag a username so that it is included in a dynamic user group?
(Choose two.)
A. GlobalProtect agent
B. XML API
C. User-ID Windows-based agent
D. log forwarding auto-tagging
Answer: BD
The CFO found a malware infected USB drive in the parking lot, which when inserted infected
their corporate laptop. The malware contacted a known command- and-control server, which
caused the infected laptop to begin exfiltrating corporate data.
Which security profile feature could have been used to prevent the communication with the
command-and-control server?
Answer: D
You must configure which firewall feature to enable a data-plane interface to submit DNS
queries on behalf of the control plane?
A. virtual router
B. Admin Role profile
C. DNS proxy
D. service route
Answer: C
Reference:
https://weberblog.net/palo-alto-dns-proxy-for-management-services/
Which component provides network security for mobile endpoints by inspecting traffic routed
through gateways?
A. Prisma SaaS
B. GlobalProtect
C. AutoFocus
D. Panorama
Answer: A
Reference:
https://www.paloaltonetworks.com/resources/whitepapers/protecting-the-extended-perimeter-
with-globalprotect-cloud-service-full
For the firewall to use Active Directory to authenticate users, which Server Profile is required in
the Authentication Profile?
A. TACACS+
B. RADIUS
C. LDAP
D. SAML
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/configure-an-
authentication-profile-and-sequence
Q87 Topic 1
Which operations are allowed when working with App-ID application tags?
Answer: C
Your company occupies one floor in a single building. You have two Active Directory domain
controllers on a single network. The firewall's management plane is only slightly utilized.
Which User-ID agent is sufficient in your network?
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/
configure-user-mapping-using-the-windows-user-id- agent/configure-the-windows-based-user-
id-agent-for-user-mapping.html
Which type of administrative role must you assign to a firewall administrator account, if the
account must include a custom set of firewall permissions?
A. Role-based
B. Multi-Factor Authentication
C. Dynamic
D. SAML
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage-
firewall-administrators/administrative-role-types.html
A. When guided by authorized sales engineer, it helps determine the areas of greatest
security risk
B. It runs only on firewalls.
C. It provides a set of questionnaires that help uncover security risk prevention gaps
across all areas of network and security architecture.
D. It provides a percentage of adoption for each assessment area.
Answer: D
Reference:
https://live.paloaltonetworks.com/t5/best-practice-assessment-blogs/the-best-practice-
assessment-bpa-tool-for-ngfw-and-panorama/ba-p/248343
A. Apps Allowed
B. Service
C. Name
D. Apps Seen
Answer: C
A. PAN-DB database
B. DNS Security
C. Custom URL categories
D. URL external dynamic lists
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-
and-subscriptions.html
Q93 Topic 1
A. They are groups that are imported from RADIUS authentication servers.
B. They are the only groups visible based on the firewall's credentials.
C. They contain only the users you allow to manage the firewall.
D. They are used to map users to groups.
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-users-to-groups.html
Based on the graphic, which statement accurately describes the output shown in the Server
Monitoring panel?
Answer: C
Which action results in the firewall blocking network traffic without notifying the sender?
A. Drop
B. Deny
C. Reset Server
D. Reset Client
Answer: B
A. create a policy that provides auto-remediation for anomalous user behavior and
malicious activity
B. create a dynamic list of firewall administrators
C. create a QoS policy that provides auto-remediation for anomalous user behavior and
malicious activity
D. create a policy that provides auto-sizing for anomalous user behavior and malicious
activity
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-
user-groups
Which type of security policy rule will match traffic that flows between the Outside zone and
inside zone, but would not match traffic that flows within the zones?
A. global
B. intrazone
C. interzone
D. universal
Answer: B
You notice that protection is needed for traffic within the network due to malicious lateral
movement activity. Based on the image shown, which traffic would you need to monitor and
block to mitigate the malicious activity?
Answer: D
Answer:
Q100 Topic 1
Which type of administrator account cannot be used to authenticate user traffic flowing through
the firewall's data plane?
A. Kerberos user
B. SAML user
C. local database user
D. local user
Answer: B
A. every 15 minutes
B. every 30 minutes
C. every 60 minutes
D. every 5 minutes
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/software-and-content-updates/
dynamic-content-updates.html#:~:text=WildFire%
20signature%20updates%20are%20made,within%20a%20minute%20of%20availability
.
Starting with PAN-OS version 9.1, which new type of object is supported for use within the User
field of a Security policy rule?
A. remote username
B. dynamic user group
C. static user group
D. local username
Answer: B
Which link in the web interface enables a security administrator to view the Security policy rules
that match new application signatures?
Answer: D
A. interzone-default
B. internal-inside-dmz
C. inside-portal
D. egress-outside
Answer: D
A. backup
B. candidate
C. running
D. committed
Answer: B
Which three configuration settings are required on a Palo Alto Network firewall management
interface? (Choose three.)
A. hostname
B. netmask
C. default gateway
D. auto-negotiation
E. IP address
Answer: BCE
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClN7CAK
Q107 Topic 1
Answer: B
At which point in the App-ID update process can you determine if an existing policy rule is
affected by an App-ID update?
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/device/device-dynamic-
updates
You receive notification about a new malware that infects hosts. An infection results in the
infected host attempting to contact a command-and-control server.
Which Security Profile detects and prevents this threat from establishing a command-and-control
connection?
Answer: B
Answer: B
The PowerBall Lottery has reached an unusually high value this week. Your company has
decided to raise morale by allowing employees to access the PowerBall
Lottery website (www.powerball.com) for just this week. However, the company does not want
employees to access any other websites also listed in the URL filtering `gambling` category.
Which method allows the employees to access the PowerBall Lottery website but without
unblocking access to the `gambling` URL category?
Answer: CD
Which Palo Alto Networks service protects cloud-based applications such as Dropbox and
Salesforce by monitoring permissions and shares and scanning files for sensitive information?
A. Prisma SaaS
B. AutoFocus
C. Panorama
D. GlobalProtect
Answer: A
In a Security policy, what is the quickest way to reset all policy rule hit counters to zero?
A. Highlight each rule and use the Reset Rule Hit Counter > Selected Rules
B. Reboot the firewall
C. Use the Reset Rule Hit Counter > All Rules option
D. Use the CLI enter the command reset rules all
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/policies/policies-
security/creating-and-managing-policies
Based on the Security policy rules shown, SSH will be allowed on which port?
Answer: A
You receive notification about new malware that is being used to attack hosts. The malware
exploits a software bug in common application.
Which Security Profile detects and blocks access to this threat after you update the firewall's
threat signature database?
Answer: B
Palo Alto Networks firewall architecture accelerates content inspection performance while
minimizing latency using which two components? (Choose two.)
Answer: CD
Answer: C
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC
Q118 Topic 1
Which Security profile would you apply to identify infected hosts on the protected network using
DNS traffic?
A. URL filtering
B. vulnerability protection
C. anti-spyware
D. antivirus
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles
Q119 Topic 1
Given the topology, which zone type should zone A and zone B to be configured with?
A. Layer3
B. Ethernet
C. Layer2
D. Virtual Wire
Answer: A
Q120 Topic 1
Assume a custom URL Category Object of `NO-FILES` has been created to identify a specific
website.
How can file uploading/downloading be restricted for the website while permitting general
browsing access to that website?
A. Create a Security policy with a URL Filtering profile that references the site access
setting of block to NO-FILES.
B. Create a Security policy that references NO-FILES as a URL Category qualifier with
an appropriate File Blocking profile.
C. Create a Security policy with a URL Filtering profile that references the site access
setting of continue to NO-FILES.
D. Create a Security policy that references NO-FILES as a URL Category qualifier with
an appropriate Data Filtering profile.
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/set-up-file-
blocking
Q121 Topic 1
Which URL Filtering profile action would you set to allow users the option to access a site only
if they provide a URL admin password?
A. authorization
B. continue
C. authentication
D. override
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/
url-filtering-profile-actions.html
Q122 Topic 1
How are Application Filters or Application Groups used in firewall policy?
Answer: C
Q123 Topic 1
A. Objects
B. Monitor
C. Device
D. Policies
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-
addresses
Q124 Topic 1
An administrator wishes to follow best practices for logging traffic that traverses the firewall.
Which log setting is correct?
Answer: D
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC
Q125 Topic 1
Which two firewall components enable you to configure SYN flood protection thresholds?
(Choose two.)
A. QoS profile
B. DoS Protection profile
C. Zone Protection profile
D. DoS Protection policy
Answer: BC
Q126 Topic 1
An administrator would like to see the traffic that matches the interzone-default rule in the traffic
logs.
What is the correct process to enable this logging?
A. Select the interzone-default rule and click Override; on the Actions tab, select Log at
Session End and click OK.
B. Select the interzone-default rule and edit the rule; on the Actions tab, select Log at
Session End and click OK.
C. Select the interzone-default rule and edit the rule; on the Actions tab, select Log at
Session Start and click OK.
D. This rule has traffic logging enabled by default; no further action is required.
Answer: B
Q127 Topic 1
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1.
What changes are required on VR-1 to route traffic between two interfaces on the NGFW?
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/networking/virtual-routers.html
Q128 Topic 1
A. antivirus
B. anti-spyware
C. URL-filtering
D. vulnerability protection
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/prevent-
credential-phishing/set-up-credential-phishing- prevention.html#idc77030dc-6022-4458-8c50-
1dc0fe7cffe4
Q129 Topic 1
Which two rule types allow the administrator to modify the destination zone? (Choose two.)
A. interzone
B. shadowed
C. intrazone
D. universal
Answer: AD
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC
Q130 Topic 1
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/policy-
optimizer.html
Q131 Topic 1
Based on the screenshot, what is the purpose of the group in User labelled `it`?
Answer: C
Q132 Topic 1
Which action results in the firewall blocking network traffic without notifying the sender?
A. Drop
B. Deny
C. No notification
D. Reset Client
Answer: A
Q133 Topic 1
Assume that traffic matches a Security policy rule but the attached Security Profiles is
configured to block matching traffic.
Which statement accurately describes how the firewall will apply an action to matching traffic?
Answer: D
Q134 Topic 1
Which Security profile can you apply to protect against malware such as worms and Trojans?
A. antivirus
B. data filtering
C. vulnerability protection
D. anti-spyware
Answer: A
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-
profiles#:~:text=Antivirus%20profiles%20protect%20against%20viruses,as
%20well%20as%20spyware%20downloads
.
Q135 Topic 1
Given the network diagram, traffic should be permitted for both Trusted and Guest users to
access general Internet and DMZ servers using SSH, web-browsing and SSL applications.
Which policy achieves the desired results?
A.
B.
C.
D.
Answer: B
Q136 Topic 1
Which license is required to use the Palo Alto Networks built-in IP address EDLs?
A. DNS Security
B. Threat Prevention
C. WildFire
D. SD-Wan
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/use-an-external-dynamic-list-
in-policy/built-in-edls.html#:~:text=With%20an%
20active%20Threat%20Prevention,to%20protect%20against%20malicious%20hosts
Q137 Topic 1
Answer: A
Reference:
https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/administer-panorama/
manage-locks-for-restricting-configuration-changes.html
Q138 Topic 1
Answer: C
Q139 Topic 1
DRAG DROP -
Place the following steps in the packet processing order of operations from first to last.
Select and Place:
Answer:
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
Q140 Topic 1
A. IP netmask
B. IP subnet
C. IP wildcard mask
D. IP range
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/policy/use-address-object-to-
represent-ip-addresses/create-an-address-object.html
Q141 Topic 1
A. decryption profile
B. destination interface
C. timeout (min)
D. application
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/policies/policies-
security/building-blocks-in-a-security-policy-rule.html
Q142 Topic 1
You have been tasked to configure access to a new web server located in the DMZ.
Based on the diagram what configuration changes are required in the NGFW virtual router to
route traffic from the 10.1.1.0/24 network to 192.168.1.0/24?
A. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/2 with a next-
hop of 172.16.1.2.
B. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/3 with a next-
hop of 192.168.1.10
C. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/3 with a next-
hop of 172.16.1.2.
D. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/3 with a next-
hop of 192.168.1.254.
Answer: C
Q143 Topic 1
An administrator would like to use App-ID's deny action for an application and would like that
action updated with dynamic updates as new content becomes available.
Which security policy action causes this?
A. Reset server
B. Reset both
C. Deny
D. Drop
Answer: C
Q144 Topic 1
Selecting the option to revert firewall changes will replace what settings?
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage-
configuration-backups/revert-firewall-configuration- changes.html
Q145 Topic 1
An administrator has configured a Security policy where the matching condition includes a
single application, and the action is drop.
If the application's default deny action is reset-both, what action does the firewall take?
Answer: D
Q146 Topic 1
Which three types of authentication services can be used to authenticate user traffic flowing
through the firewall's data plane? (Choose three.)
A. SAML 2.0
B. Kerberos
C. TACACS
D. TACACS+
E. SAML 1.0
Answer: ABD
Q147 Topic 1
Which objects would be useful for combining several services that are often defined together?
A. application filters
B. service groups
C. shared service objects
D. application groups
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-
services.html
Q148 Topic 1
Given the screenshot, what two types of route is the administrator configuring? (Choose two.)
A. BGP
B. static route
C. default route
D. OSPF
Answer: BC
Q149 Topic 1
Which rule type is appropriate for matching traffic both within and between the source and
destination zones?
A. interzone
B. shadowed
C. intrazone
D. universal
Answer: A
Q150 Topic 1
An administrator would like to override the default deny action for a given application, and
instead would like to block the traffic and send the ICMP code
`communication with the destination is administratively prohibited`.
Which security policy action causes this?
A. Drop
B. Drop, send ICMP Unreachable
C. Reset both
D. Reset server
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy/security-
policy-actions.html
Q151 Topic 1
You receive notification about new malware that infects hosts through malicious files transferred
by FTP.
Which Security profile detects and protects your internal networks from this threat after you
update your firewall's threat signature database?
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles
Q152 Topic 1
An administrator wants to prevent access to media content websites that are risky.
Which two URL categories should be combined in a custom URL category to accomplish this
goal? (Choose two.)
A. recreation-and-hobbies
B. streaming-media
C. known-risk
D. high-risk
Answer: BD
Q153 Topic 1
A. PAN-DB
B. Applications and Threats
C. GlobalProtect Data File
D. Antivirus
Answer: B
Q154 Topic 1
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
A. Drop
B. Deny
C. Block
D. Reset-server
Answer: A
Q155 Topic 1
Which object would an administrator create to block access to all high-risk applications?
A. HIP profile
B. Vulnerability Protection profile
C. application group
D. application filter
Answer: D
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKECA0
Q156 Topic 1
Answer: C
Reference:
http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
Q157 Topic 1
How does an administrator schedule an Applications and Threats dynamic update while delaying
installation of the update for a certain amount of time?
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/threat-prevention/best-practices-for-
application-and-threat-content-updates#
Q158 Topic 1
What must be considered with regards to content updates deployed from Panorama?
Answer: D
Reference:
https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-licenses-and-
updates/deploy-updates-to-firewalls-log-collectors-and-
wildfire-appliances-using-panorama/schedule-a-content-update-using-panorama.html
Q159 Topic 1
During the packet flow process, which two processes are performed in application identification?
(Choose two.)
A. pattern based application identification
B. application override policy match
C. session application identified
D. application changed from content inspection
Answer: AB
Reference:
http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
Q160 Topic 1
Refer to the exhibit. A web server in the DMZ is being mapped to a public address through
DNAT.
Which Security policy rule will allow traffic to flow to the web server?
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/networking/nat/nat-configuration-
examples/destination-nat-exampleone-to-one-mapping
Q161 Topic 1
What does an administrator use to validate whether a session is matching an expected NAT
policy?
A. system log
B. test command
C. threat log
D. config audit
Answer: B
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClQSCA0
Q162 Topic 1
Answer: C
Reference:
https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/administer-panorama/enable-
automated-commit-recovery.html
Q163 Topic 1
According to the best practices for mission critical devices, what is the recommended interval for
antivirus updates?
A. by minute
B. hourly
C. daily
D. weekly
Answer: C
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/best-practices-for-
content-and-threat-content-updates/best-practices- mission-critical.html
Q164 Topic 1
DRAG DROP -
Place the steps in the correct packet-processing order of operations.
Select and Place:
Answer:
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
Q165 Topic 1
Which Security policy match condition would an administrator use to block traffic from IP
addresses on the Palo Alto Networks EDL of Known Malicious IP
Addresses list?
A. destination address
B. source address
C. destination zone
D. source zone
Answer: D
Q166 Topic 1
URL categories can be used as match criteria on which two policy types? (Choose two.)
A. authentication
B. decryption
C. application override
D. NAT
Answer: AB
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/
url-category-as-policy-match-criteria.html
Q167 Topic 1
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
Answer: CD
Q168 Topic 1
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP
address. Traffic will be steered to the specific server based on the application, where Host A
(10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
A. Untrust (Any) to DMZ (1.1.1.100), ssh - Allow
B. Untrust (Any) to Untrust (10.1.1.1), web-browsing - Allow
C. Untrust (Any) to Untrust (10.1.1.1), ssh - Allow
D. Untrust (Any) to DMZ (10.1.1.100, 10.1.1.101), ssh, web-browsing - Allow
E. Untrust (Any) to DMZ (1.1.1.100), web-browsing - Allow
Answer: AE
Q169 Topic 1
Which type of profile must be applied to the Security policy rule to protect against buffer
overflows, illegal code execution, and other attempts to exploit system flaws?
A. URL filtering
B. vulnerability protection
C. file blocking
D. anti-spyware
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-
security-profiles-vulnerability-protection.html
Q170 Topic 1
Starting with PAN-OS version 9.1, application dependency information is now reported in which
two locations? (Choose two.)
Answer: AC
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-objects-in-
policy/resolve-application-dependencies.html
Q171 Topic 1
What action will inform end users when their access to Internet content is being restricted?
Q172 Topic 1
What is a recommended consideration when deploying content updates to the firewall from
Panorama?
A. Before deploying content updates, always check content release version compatibility.
B. Content updates for firewall A/P HA pairs can only be pushed to the active firewall.
C. Content updates for firewall A/A HA pairs need a defined master device.
D. After deploying content updates, perform a commit and push to Panorama.
Answer: D
Reference:
https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-licenses-and-
updates/deploy-updates-to-firewalls-log-collectors-and-
wildfire-appliances-using-panorama/schedule-a-content-update-using-panorama.html
Q173 Topic 1
Which information is included in device state other than the local configuration?
A. uncommitted changes
B. audit logs to provide information of administrative account changes
C. system logs to provide information of PAN-OS changes
D. device group and template settings pushed from Panorama
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-
operations.html
Q174 Topic 1
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
A. It defines the SSL/TLS encryption strength used to protect the management interface.
B. It defines the CA certificate used to verify the client's browser.
C. It defines the certificate to send to the client's browser from the management interface.
D. It defines the firewall's global SSL/TLS timeout values.
Answer: C
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFGCA0
Q175 Topic 1
An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule,
which is set to default configuration.
What should the administrator do?
Answer: A
Q176 Topic 1
Answer: A
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
Q177 Topic 1
During the App-ID update process, what should you click on to confirm whether an existing
policy rule is affected by an App-ID update?
A. check now
B. review policies
C. test policy match
D. download
Answer: B
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-
introduced-in-content-releases/review-new-app-id-impact-on- existing-policy-rules
Q178 Topic 1
When creating a custom URL category object, which is a valid type?
A. domain match
B. host names
C. wildcard
D. category match
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/objects/objects-custom-
objects-url-category.html
Q179 Topic 1
When HTTPS for management and GlobalProtect are enabled on the same interface, which TCP
port is used for management access?
A. 80
B. 8443
C. 4443
D. 443
Answer: C
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?
id=kA10g000000Cm8SCAS#:~:text=Details,using%20https%20on%20port%204443
Q180 Topic 1
What two authentication methods on the Palo Alto Networks firewalls support authentication and
authorization for role-based access control (RBAC)? (Choose two.)
A. SAML
B. TACACS+
C. LDAP
D. Kerberos
Answer: AB
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/manage-
firewall-administrators/administrative-authentication.html
Q181 Topic 1
Answer: C
Q182 Topic 1
Which feature would be useful for preventing traffic from hosting providers that place few
restrictions on content whose services are frequently used by attackers to distribute illegal or
unethical material?
Answer: D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/content-inspection-features/
edl-for-bulletproof-isps
Q183 Topic 1
Which security policy match condition would an administrator use to block traffic to IP
addresses on the Palo Alto Networks Bulletproof IP Addresses list?
A. source address
B. destination address
C. source zone
D. destination zone
Answer: A
Q184 Topic 1
Which three filter columns are available when setting up an Application Filter? (Choose three.)
A. Parent App
B. Category
C. Risk
D. Standard Ports
E. Subcategory
Answer: BCE
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXfCAK
Q185 Topic 1
Which stage of the cyber attack lifecycle makes it important to provide ongoing education to
users on spear phishing links, unknown emails, and risky websites?
A. reconnaissance
B. delivery
C. installation
D. exploitation
Answer: A
Reference :
https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle
Q186 Topic 1
A coworker found a USB labeled "confidential in the parking lot. They inserted the drive and it
infected their corporate laptop with unknown malware The malware caused the laptop to begin
infiltrating corporate data.
Which Security Profile feature could have been used to detect the malware on the laptop?
A. DNS Sinkhole
B. WildFire Analysis
C. Antivirus
D. DoS Protection
Answer: A
Q187 Topic 1
A. Threat Prevention
B. Anti Phishing Block Page
C. User-ID
D. Anti Phishing profiles
Answer: C
Reference :
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-
credential-phishing/set-up-credential-phishing-prevention
Q188 Topic 1
Which DNS Query action is recommended for traffic that is allowed by Security policy and
matches Palo Alto Networks Content DNS Signatures?
A. block
B. sinkhole
C. allow
D. alert
Answer: B
Q189 Topic 1
Answer: D
Q190 Topic 1
Which two statements are correct regarding multiple static default routes when they are
configured as shown in the image? (Choose two.)
Answer: AD
Q191 Topic 1
An address object of type IP Wildcard Mask can be referenced in which part of the
configuration?
Answer: C
Q192 Topic 1
You receive notification about a new malware that infects hosts. An infection results in the
infected host attempting to contact command-and-control server.
Which Security Profile, when applied to outbound Security policy rules, detects and prevents this
threat from establishing a command-and-control connection?
A. Anti-Spyware Profile
B. Data Filtering Profile
C. Antivirus Profile
D. Vulnerability Protection Profile
Answer: B
Q193 Topic 1
A. Policy Optimizer
B. Prisma SaaS
C. GlobalProtect
D. Panorama
Answer: D
Q194 Topic 1
An administrator needs to create a Security policy rule that matches DNS traffic within the LAN
zone, and also needs to match DNS traffic within the DMZ zone.
The administrator does not want to allow traffic between the DMZ and LAN zones.
Which Security policy rule type should they use?
A. interzone
B. intrazone
C. default
D. universal
Answer: D
Q195 Topic 1
According to best practices, how frequently should WildFire updates he made to perimeter
firewalls?
A. every 10 minutes
B. every minute
C. every 5 minutes
D. in real time
Answer: D
Q196 Topic 1
Given the topology, which interface type should you configure for firewall interface E1/1?
A. Layer 2
B. virtual wire
C. tap
D. mirror port
Answer: C
Q197 Topic 1
Which solution is a viable option to capture user identification when Active Directory is not in
use?
Answer: A
Reference:
https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/choose-
directory-type/configure-an-on-premises-directory/install- the-cloud-identity-agent
Q198 Topic 1
What allows a security administrator to preview the Security policy rules that match new
application signatures?
Q199 Topic 1
If using group mapping with Active Directory Universal Groups, what must you do when
configuring the User ID?
Answer: C
Reference:
https://docs.paloaltonetworks.com/best-practices/10-0/user-id-best-practices/user-id-best-
practices/user-id-best-practices-for-group-mapping.html
Q200 Topic 1
An administrator needs to add capability to perform real time signature lookups to block or
sinkhole all known malware domains.
Which type of single, unified engine will get this result?
A. Content ID
B. App-ID
C. Security Processing Engine
D. User-ID
Answer: C
Q201 Topic 1
Which action would an administrator take to ensure that a service object will be available only to
the selected device group?
Answer: B
Community vote distribution
B (100%)
Q202 Topic 1
Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are
verified as unsafe based on WildFire analysis, Unit 42 research, and data gathered from
telemetry?
Answer: B
An administrator would like to determine the default deny action for the application dns-over-
https.
Which action would yield the information?
Answer: B
A. PAN-DB database
B. External dynamic lists
C. DNS Security
D. Custom URL categories
Answer: A
A. ensure that policy rules are not shadowing other policy rules
B. confirm that rules meet or exceed the Best Practice Assessment recommendations
C. confirm that policy rules in the configuration are allowing donning the correct traffic
D. verify that policy rules from Expedition are valid
Answer: D
Which attribute can a dynamic address group use as a filtering condition to determine its
membership?
A. subnet mask
B. tag
C. IP address
D. wildcard mask
Answer: B
View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet
and SSH traffic into both the DMZ and Untrust/Internet zones from each of the IOT/Guest and
Trust Zones?
A.
B.
C.
D.
Answer: C
Q208 Topic 1
What are the three DNS Security categories available to control DNS traffic? (Choose three.)
A. Parked Domains
B. Spyware Domains
C. Vulnerability Domains
D. Phishing Domains
E. Malware Domains
Answer: BDE
What are three valid information sources that can be used when tagging users to dynamic user
groups? (Choose three.)
A. firewall logs
B. custom API scripts
C. Security Information and Event Management Systems (SIEMS), such as Splunk
D. biometric scanning results from iOS devices
E. DNS Security service
Answer: CDE
The compliance officer requests that all evasive applications need to be blocked on all perimeter
firewalls out to the internet. The firewall is configured with two zones:
1. trust for internal networks
2. untrust to the internet
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a
security policy using App-ID to comply with this request? (Choose two.)
A. Create a deny rule at the top of the policy from trust to untrust with service
application-default and add an application filter with the evasive characteristic
B. Create a deny rule at the top of the policy from trust to untrust over any service and
select evasive as the application
C. Create a deny rule at the top of the policy from trust to untrust with service
application-default and select evasive as the application
D. Create a deny rule at the top of the policy from trust to untrust over any service and
add an application filter with the evasive characteristic
Answer: AD
Which object would an administrator create to enable access to all applications in the office-
programs subcategory?
A. HIP profile
B. URL category
C. application group
D. application filter
Answer: D
Answer: D
Answer: D
What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?
*
A. You can specify the location as pre- or post-rules to push policy rules
B. You can specify the firewalls in a device group to which to push policy rules
C. Doing so provides audit information prior to making changes for selected policy rules
D. Doing so limits the templates that receive the policy rules
Answer: A
When an ethernet interface is configured with an IPv4 address, which type of zone is it a member
of?
A. Layer 3
B. Virtual Wire
C. Tap
D. Tunnel
Answer: A
An administrator would like to create a URL Filtering log entry when users browse to any
gambling website.
What combination of Security policy and Security profile actions is correct?
A. Security policy = deny, Gambling category in URL profile = block
B. Security policy = drop, Gambling category in URL profile = allow
C. Security policy = allow, Gambling category in URL profile = alert
D. Security policy = allow, Gambling category in URL profile = allow
Answer: C
An administrator is investigating a log entry for a session that is allowed and has the end reason
of aged-out.
Which two fields could help in determining if this is normal? (Choose two.)
A. IP Protocol
B. Packets sent/received
C. Decrypted
D. Action
Answer: BD
What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)
Answer: CDE
After making multiple changes to the candidate configuration of a firewall, the administrator
would like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient
way to accomplish this?
Answer: A
What are three valid ways to map an IP address to a username? (Choose three.)
Answer: ADE
A. 192.168.40.1-192.168.40.255
B. 192.168.40.1-255
C. 192.168.40.1, 192.168.40.255
D. 192.168.40.1/24
Answer: A
Q223 Topic 1
What do you configure if you want to set up a group of objects based on their ports alone?
A. address groups
B. custom objects
C. application groups
D. service groups
Answer: D
What are two valid selections within a Vulnerability Protection profile? (Choose two.)
A. deny
B. drop
C. default
D. sinkhole
Answer: BC
Which three interface deployment methods can be used to block traffic flowing through the Palo
Alto Networks firewall? (Choose three.)
A. Tap
B. HA
C. Layer 3
D. Layer 2
E. Virtual Wire
Answer: CDE
A. Drop
B. Drop, send ICMP Unreachable
C. Reset both
D. Reset server
Answer: B
When creating an Admin Role profile, if no changes are made, which two administrative
methods will you have full access to? (Choose two.)
A. web UI
B. XML API
C. command line
D. RESTAPI
Answer: AD
An administrator would like to apply a more restrictive Security profile to traffic for file sharing
applications. The administrator does not want to update the Security policy or object when new
applications are released.
Which object should the administrator use as a match condition in the Security policy?
Answer: D
A. 1. Navigate to Device > Local User Database > Users and click Add. 2. Enter a Name
for the user. 3. Enter and Confirm a Password or Hash. 4. Enable the account and click
OK. 5. Navigate to Device > Local User Database > User Groups and click Add. 6. Enter
a Name for the group. 7. Add the user to the group and click OK.
B. 1. Navigate to Device > Authentication Profile > Users and click Add. 2. Enter a
Name for the user. 3. Enter and Confirm a Password or Hash. 4. Enable the account and
click OK. 5. Navigate to Device > Local User Database > User Groups and click Add. 6.
Enter a Name for the group. 7. Add the user to the group and click OK.
C. 1. Navigate to Device > Users and click Add. 2. Enter a Name for the user. 3. Enter
and Confirm a Password or Hash. 4. Enable the account and click OK. 5. Navigate to
Device > User Groups and click Add. 6. Enter a Name for the group. 7. Add the user to
the group and click OK.
D. 1. Navigate to Device > Admins and click Add. 2. Enter a Name for the user. 3. Enter
and Confirm a Password or Hash. 4. Enable the account and click OK. 5. Navigate to
Device > User Groups and click Add. 6. Enter a Name for the group. 7. Add the user to
the group and click OK.
Answer: A
When creating a Panorama administrator type of Device Group and Template Admin, which two
things must you create first? (Choose two.)
A. server profile
B. admin role
C. password profile
D. access domain
Answer: BD
A. source zone
B. name
C. destination interface
D. destination zone
E. destination address
Answer: ABD
An administrator wants to prevent hacking attacks through DNS queries to malicious domains.
Which two DNS policy actions can the administrator choose in the Anti-Spyware Security
Profile? (Choose two.)
A. deny
B. block
C. sinkhole
D. override
Answer: BC
A. Pre-NAT address
B. Pre-NAT zone
C. Post-NAT address
D. Post-NAT zone
Answer: AD
A network administrator is required to use a dynamic routing protocol for network connectivity.
Which three dynamic routing protocols are supported by the NGFW Virtual Router for this
purpose? (Choose three.)
A. OSPF
B. EIGRP
C. IS-IS
D. BGP
E. RIP
Answer: ADE
Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the
SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the
SERVER zone to the DMZ on SSH only.
Which rule group enables the required traffic?
A.
B.
C.
D.
Answer: C
Q236 Topic 1
Which firewall feature do you need to configure to query Palo Alto Networks service updates
over a data-plane interface instead of the management interface?
A. service route
B. dynamic updates
C. SNMP setup
D. data redistribution
Answer: A
A. HTTPS
B. SMB v3
C. SCP
D. FTP
Answer: C
All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.
Complete the empty field in the Security policy using an application object to permit only this
type of access.
Service: application-default -
Action: allow
A. Application = "any"
B. Application = "web-browsing"
C. Application = "ssl"
D. Application = "http"
Answer: D
From the Pre-defined Categories tab within the URL Filtering profile, what is the right
configuration to prevent such connections?
Answer: C
An administrator would like to follow the best-practice approach to log the traffic that traverses
the firewall.
Answer: B
Which two protocols are available on a Palo Alto Networks Firewall Interface Management
Profile? (Choose two.)
A. HTTPS
B. RDP
C. SCP
D. SSH
Answer: AD
A network administrator created an intrazone Security policy rule on the firewall. The source
zones were set to IT. Finance, and HR.
Which two types of traffic will the rule apply to? (Choose two)
Answer: CD
You receive notification about new malware that infects hosts through malicious files transferred
by FTP.
Which Security profile detects and protects your internal networks from this threat after you
update your firewall’s threat signature database?
Answer: A
An administrator would like to override the default deny action for a given application, and
instead would like to block the traffic.
A. Drop
B. Drop, send ICMP Unreachable
C. Reset both
D. Reset client
Answer: B
Answer: C
Which action can be set in a URL Filtering Security profile to provide users temporary access to
all websites in a given category using a provided password?
A. continue
B. override
C. hold
D. exclude
Answer: B
A. named address
B. IP range
C. FQDN
D. IP netmask
Answer: C
What are the requirements for using Palo Alto Networks EDL Hosting Service?
Answer: B
What are two valid selections within an Antivirus profile? (Choose two.)
A. deny
B. drop
C. block-ip
D. default
Answer: BD
Your company is highly concerned with their intellectual property being accessed by
unauthorized resources. There is a mature process to store and include metadata tags for all
confidential documents.
Which Security profile can further ensure that these documents do not exit the corporate
network?
A. File Blocking
B. Data Filtering
C. Anti-Spyware
D. URL Filtering
Answer: D
An administrator is reviewing the Security policy rules shown in the screenshot below.
Answer: C
Prior to a maintenance-window activity, the administrator would like to make a backup of only
the running configuration to an external location.
What command in Device > Setup > Operations would provide the most operationally efficient
way to achieve this outcome?
Answer: A
DRAG DROP
-
Q254 Topic 1
What are the two default behaviors for the intrazone-default policy? (Choose two.)
A. Allow
B. Log at Session End
C. Deny
D. Logging disabled
Answer: AB
Answer: A
An administrator would like to block access to a web server, while also preserving resources and
minimizing half-open sockets.
What are two security policy actions the administrator can select? (Choose two.)
A. Reset server
B. Deny
C. Drop
D. Reset both
Answer: AC
A. Static IP
B. Destination
C. Dynamic IP and Port
D. Dynamic IP
Answer: C
What are three Palo Alto Networks best practices when implementing the DNS Security Service?
(Choose three.)
Answer: ADE
An administrator would like to see the traffic that matches the intrazone-default rule in the traffic
logs.
A. Select the intrazone-default rule and click Override; on the Actions tab, select Log at
Session End and click OK.
B. Select the intrazone-default rule and edit the rule; on the Actions tab, select Log at
Session End and click OK.
C. Select the intrazone-default rule and edit the rule; on the Actions tab, select Log at
Session Start and click OK.
D. This rule has traffic logging enabled by default; no further action is required.
Answer: A
Answer: A
A. https://paloaltonetworks.com
B. #.paloaltonetworks.com
C. http://paloaltonetworks.com
D. *.paloaltonetworks.com
Answer: D
Q262 Topic 1
What are two valid selections within an Anti-Spyware profile? (Choose two.)
Answer: BD
Q263 Topic 1
What is a prerequisite before enabling an administrative account which relies on a local firewall
user database?
Answer: A
Q264 Topic 1
Which Security policy set should be used to ensure that a policy is applied first?
Answer: B
Q265 Topic 1
Answer: C
Q266 Topic 1
What can be achieved by disabling the Share Unused Address and Service Objects with Devices
setting on Panorama?
Answer: D
Q267 Topic 1
Which Security profile can be used to detect and block compromised hosts from trying to
communicate with external command-and-control (C2) servers?
A. URL Filtering
B. Antivirus
C. Vulnerability
D. Anti-Spyware
Answer: D
Q268 Topic 1
An administrator is trying to enforce policy on some (but not all) of the entries in an external
dynamic list.
A. 50
B. 100
C. 200
D. 1,000
Answer: B
Q269 Topic 1
What are two ways to resolve this issue for a proper response? (Choose two.)
Answer: BD
Q270 Topic 1
If the firewall interface E1/1 is connected to a SPAN or mirror port, which interface type should
E1/1 be configured as?
A. Tap
B. Virtual Wire
C. Layer 2
D. Layer 3
Answer: A
Q271 Topic 1
An administrator manages a network with 300 addresses that require translation. The
administrator configured NAT with an address pool of 240 addresses and found that connections
from addresses that needed new translations were being dropped.
A. Dynamic IP
B. Static IP
C. Dynamic IP and Port
D. Destination NAT
Answer: C
Q272 Topic 1
The NetSec Manager asked to create a new EMEA Regional Panorama Administrator profile
with customized privileges. In particular, the new EMEA Regional Panorama Administrator
should be able to:
What is the correct configuration for the new EMEA Regional Panorama Administrator profile?
Answer: A
Q273 Topic 1
An administrator would like to reference the same address object in Security policies on 100
Panorama managed firewalls, across 10 devices groups and five templates.
Which configuration action should the administrator take when creating the address object?
Answer: C
Q274 Topic 1
Which type of policy allows an administrator to both enforce rules and take action?
A. Authentication
B. Security
C. NAT
D. Decryption
Answer: A
Q275 Topic 1
With the DNS Security subscription, when will the cloud-based signature database provide users
access to newly added DNS signatures?
Answer: B
Q276 Topic 1
Why should a company have a File Blocking profile that is attached to a Security policy?
Answer: B
Q277 Topic 1
What can be used as match criteria for creating a dynamic address group?
A. MAC addresses
B. IP addresses
C. Usernames
D. Tags
Answer: D
Q278 Topic 1
A. Drop
B. Reset server
C. Reset client
D. Reset both
Answer: D
Q279 Topic 1
An administrator would like to protect against inbound threats such as buffer overflows and
illegal code execution.
A. Vulnerability protection
B. Anti-spyware
C. URL filtering
D. Antivirus
Answer: B
Q280 Topic 1
An organization has some applications that are restricted for access by the Human Resources
Department only, and other applications that are available for any known user in the
organization.
A. Application Group
B. Tag
C. External Dynamic List
D. Application Filter
Answer: A
Q281 Topic 1
Which two configurations does an administrator need to compare in order to see differences
between the active configuration and potential changes if committed? (Choose two.)
A. Device state
B. Active
C. Candidate
D. Running
Answer: CD
Q282 Topic 1
An administrator configured a Security policy rule where the matching condition includes a
single application and the action is set to deny.
A. Discard the session’s packets and send a TCP reset packet to let the client know the
session has been terminated
B. Drop the traffic silently
C. Perform the default deny action as defined in the App-ID database for the application
D. Send a TCP reset packet to the client- and server-side devices
Answer: A
Q283 Topic 1
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how
should a Security policy with App-ID be configured?
Services: SSH -
Applications: Any -
Action: Allow
B. Source Zone: Trusted -
Services: Application-Default -
Applications: SSH -
Action: Allow
C. Source Zone: Trusted -
Services: Application-Default -
Applications: SSH -
Action: Deny
D. Source Zone: Trusted -
Services: SSH -
Applications: Any -
Action: Deny
Answer: B
Q284 Topic 1
An administrator configured a Security policy rule with an Antivirus Security profile. The
administrator did not change the action for the profile.
If a virus gets detected, how will the firewall handle the traffic?
Answer: D
Q285 Topic 1
Answer: C
Q286 Topic 1
A. Data Filtering
B. URL Filtering
C. Anti-Spyware
D. Antivirus
Answer: C
Q287 Topic 1
Answer: A
Q288 Topic 1
A. Allow
B. Deny
C. Reset-client
D. Reset-server
Answer: B
Q289 Topic 1
A. 2
B. Unlimited
C. 10
D. 1
Answer: B
Q290 Topic 1
Answer: B
Q291 Topic 1
Where within the firewall GUI can all existing tags be viewed?
Q292 Topic 1
A. Sinkhole
B. Reset-client
C. Drop
D. Reset-both
Answer: C
Q293 Topic 1
To enable DNS sinkholing, which two addresses should be reserved? (Choose two.)
A. MAC
B. IPv6
C. Email
D. IPv4
Answer: BD
Q294 Topic 1
A NetSec manager was asked to create a new firewall administrator profile with customized
privileges. The new firewall administrator must be able to download TSF File and Starts Dump
File but must not be able to reboot the device.
Where does the NetSec manager go to configure the new firewall administrator role profile?
A. Device > Admin Roles > Add > XML API > Configuration
B. Device > Admin Roles > Add > XML API > Operational Request
C. Device > Admin Roles > Add > Web UI > Support
D. Device > Admin Roles > Add > Web UI > Operations
Answer: D
Q295 Topic 1
What must exist in order for the firewall to route traffic between Layer 3 interfaces?
A. Virtual router
B. Virtual wires
C. Traffic Distribution profile
D. VLANs
Answer: D
Q296 Topic 1
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using
Panorama?
A. Panorama > Device Deployment > Dynamic Updates > Schedules > Add
B. Panorama > Device Deployment > Content Updates > Schedules > Add
C. Panorama > Dynamic Updates > Device Deployment > Schedules > Add
D. Panorama > Content Updates > Device Deployment > Schedules > Add
Answer: B
Q297 Topic 1
In which threat profile object would you configure the DNS Security service?
A. Antivirus
B. Anti-Spyware
C. WildFire
D. URL Filtering
Answer: C
Q298 Topic 1
Which rule type is appropriate for matching traffic occurring within a specified zone?
A. Universal
B. Shadowed
C. Intrazone
D. Interzone
Answer: C
Q299 Topic 1
Which two matching criteria are used when creating a Security policy involving NAT? (Choose
two.)
A. Pre-NAT address
B. Post-NAT address
C. Pre-NAT zone
D. Post-NAT zone
Answer: AB
Q300 Topic 1
If a universal security rule was created for source zones A & B and destination zones A & B, to
which traffic would the rule apply?
Answer: C
Q301 Topic 1
Which interface type requires no routing or switching but applies Security or NAT policy rules
before passing allowed traffic?
A. Tap
B. Virtual Wire
C. Layer 2
D. Layer 3
Answer: B
A. Management
B. Logical
C. Transparent
D. Tap
Answer: A
An administrator is creating a Security policy rule and sees that the destination zone is grayed
out.
While creating the rule, which option was selected to cause this?
A. Interzone
B. Source zone
C. Universal (default)
D. Intrazone
Answer: A
How many levels can there be in a device-group hierarchy, below the shared level?
A. 2
B. 3
C. 4
D. 5
Answer: D
A. Templates
B. Device Groups
C. Shared
D. Panorama tab
Answer: D
A. Tags
B. Service
C. Type
D. Action
Answer: A
A. Destination Zone
B. Actions
C. Source Zone
D. Application
Answer: A
Q308 Topic 1
Answer: B
Q309 Topic 1
Which policy set should be used to ensure that a policy is applied just before the default security
rules?
A. Shared post-rulebase
B. Local firewall policy
C. Parent device-group post-rulebase
D. Child device-group post-rulebase
Answer: D
Which rule type is appropriate for matching traffic occurring within a specified zone?
How should the administrator configure the firewall to restrict users to specific email
applications?
Answer: B
Review the screenshot below. Based on the information it contains, which protocol decoder will
detect a machine-learning match, create a Threat log entry, and permit the traffic?
A. smb
B. imap
C. ftp
D. http2
Answer: D
A. 1
B. 2
C. 3
D. 4
Answer: A
A. Role Based
B. Superuser
C. Dynamic
D. Local
Answer: AD
The Net Sec Manager asked to create a new Firewall Operator profile with customized
privileges.
In particular, the new firewall operator should be able to:
Check the configuration with read-only privilege for LDAP, RADIUS, TACACS+, and SAML
as Server profiles to be used inside an Authentication profile.
What is the right path m order to configure the new firewall Administrator Profile?
A. Device > Admin Roles > Add > Web UI > Device > Server Profiles
Device > Admin Roles > Add > Web UI > disable access to everything else
B. Device > Admin Roles > Add > Web UI > Objects > Server Profiles
Device > Admin Roles > Add > Web UI > disable access to everything else
C. Device > Admin Roles > Add >Web UI > Objects > Authentication Profile
Device > Admin Roles > Add > Web UI > disable access to everything else
D. Device > Admin Roles > Add > Web UI > Device > Authentication Profile
Device > Admin Roles > Add > Web UI > disable access to everything else
Answer: D
Within the WildFire Analysis profile, which three items are configurable? (Choose three.)
A. FileType
B. Direction
C. Service
D. Application
E. Objects
Answer: ACE
Which Security profile can be used to configure sinkhole IPs m the DNS Sinkhole settings?
A. Vulnerability Protection
B. Anti-Spyware
C. Antivirus
D. URL Filtering
Answer: B
Which three management interface settings must be configured for functional dynamic updates
and administrative access on a Palo Alto Networks firewall? (Choose three.)
A. NTP
B. IP address
C. MTU
D. DNS server
E. service routes
Answer: ABD
How does the Policy Optimizer policy view differ from the Security policy view?
Answer: C
An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the
DMZ zones. The administrator does not change the rule type from its default value.
A. Intrazone
B. Interzone
C. Universal
D. Tagged
Answer: B
Answer: B
Q321 Topic 1
Answer: D
How would a Security policy need to be written to allow outbound traffic using Secure Shell
(SSH) to destination ports tcp/22 and tcp/4422?
A. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin then creates a Security policy allowing application "ssh" and service "tcp-
4422".
B. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin then creates a Security policy allowing application "ssh", service "tcp-4422",
and service "application-default".
C. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin also creates a custom service object named "tcp-22" with port tcp/22.
The admin then creates a Security policy allowing application "ssh", service "tcp-4422",
and service "tcp-22".
D. The admin creates a Security policy allowing application "ssh" and service
"application-default".
Answer: C
Which type of DNS signatures are used by the firewall to identify malicious and command-and-
control domains?
Which Security policy action will message a user's browser that their web session has been
terminated?
A. Reset client
B. Deny
C. Drop
D. Reset server
Answer: D
In order to protect users against exploit kits that exploit a vulnerability and then automatically
download malicious payloads, which Security profile should be configured?
A. Anti-Spyware
B. WildFire
C. Vulnerability Protection
D. Antivirus
Answer: C
A. Phishing
B. Spyware
C. PUP
D. Malware
Answer: D
Answer: D
Which three types of entries can be excluded from an external dynamic list? (Choose three.)
A. IP addresses
B. Applications
C. User-ID
D. Domains
E. URLs
Answer: ADE
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still
reachable but has lost the “PCNSA Admin” username and password.
Which option describes the “PCNSA Admin” login capabilities after the outage?
Answer: D
A. Reset-client
B. Reset-server
C. Deny
D. Allow
Answer: D
Q331 Topic 1
A Panorama administrator would like to create an address object for the DNS server located in
the New York City office, but does not want this object added to the other Panorama managed
firewalls.
Which configuration action should the administrator take when creating the address object?
A. Tag the address object with the New York Office tag.
B. Ensure that Disable Override is cleared.
C. Ensure that the Shared option is checked.
D. Ensure that the Shared option is cleared.
Answer: D
Q332 Topic 1
An administrator is troubleshooting an issue with traffic that matches the interzone-default rule,
which is set to default configuration.
Answer: D
Q333 Topic 1
What is the default action for the SYN Flood option within the DoS Protection profile?
A. Reset-client
B. Alert
C. Sinkhole
D. Random Early Drop
Answer: D
Q334 Topic 1
Answer: C
Q335 Topic 1
Where does a user assign a tag group to a policy rule in the policy creation window?
A. General tab
B. Usage tab
C. Application tab
D. Actions tab
Answer: B
Q336 Topic 1
A. Security profile
B. App-ID
C. Policy-based forwarding
D. Policy Optimizer
Answer: D
Q337 Topic 1
A. Wait until all running and pending jobs are finished before committing.
B. Export configuration after each single configuration change performed.
C. Validate configuration changes prior to committing.
D. Disable the automatic commit feature that prioritizes content database installations
before committing.
Answer: C
Q338 Topic 1
Which Security profile generates an alert based on a threshold when the action is set to Alert?
A. Vulnerability Protection
B. Antivirus
C. DoS protection
D. Anti-Spyware
Answer: A
Q339 Topic 1
Given the network diagram, which two statements are true about traffic between the User and
Server networks? (Choose two.)
Answer: AD
Q340 Topic 1
Which setting is available to edit when a tag is created on the local firewall?
A. Color
B. Location
C. Order
D. Priority
Answer: D
Q341 Topic 1
With the PAN-OS 11.0 Nova release, which two attack options can new inline deep learning
analysis engines detect and prevent? (Choose two.)
Answer: C
Q342 Topic 1
Which profile must be applied to the Security policy rule to block spyware on compromised
hosts from trying to phone-home or beacon out to external command-and-control (C2) servers?
A. Anti-spyware
B. File blocking
C. WildFire
D. URL filtering
Answer: D
Q343 Topic 1
Which feature dynamically analyzes and detects malicious content by evaluating various web
page details using a series of machine learning (ML) models?
A. Antivirus Inline ML
B. URL Filtering Inline ML
C. Anti-Spyware Inline ML
D. WildFire Inline ML
Answer: B
Q344 Topic 1
An administrator is troubleshooting an issue with Office365 and expects that this traffic traverses
the firewall.
When reviewing Traffic Log entries, there are no logs matching traffic from the test workstation.
What might cause this issue?
Answer: C
Q345 Topic 1
When creating an address object, which option is available to select from the Type drop-down
menu?
A. IPv6 Address
B. IP Netmask
C. IPv4 Address
D. IP Address Class
Answer: B
Q346 Topic 1
If both interfaces are connected to the same virtual router, which IP address information will an
administrator need to enter in the Destination field to access the internet?
A. 0.0.0.0
B. 10.0.2.1/32
C. 10.0.1.254/32
D. 0.0.0.0/0
Answer: A
Q347 Topic 1
Where within the URL Filtering security profile must a user configure the action to prevent
credential submissions?
Q348 Topic 1
Which Security profile must be added to Security policies to enable DNS Signatures to be
checked?
A. URL Filtering
B. Vulnerability Protection
C. Anti-Spyware
D. Antivirus
Answer: C
Q349 Topic 1
Which two Security profile actions can only be applied to DoS Protection profiles? (Choose
two.)
A. Reset-server
B. Reset-both
C. SYN cookies
D. Random Early Drop
Answer: CD
Q350 Topic 1
Where can you apply URL Filtering policy in a Security policy rule?
Answer: D
Q351 Topic 1
A. Tunnel interfaces
B. Layer 2 subinterfaces
C. Layer 3 subinterfaces
D. Loopback interfaces
Answer: C
Q352 Topic 1
Which three factors can be used to create malware based on domain generation algorithms?
(Choose three.)
A. Time of day
B. URL custom categories
C. Other unique values
D. Cryptographic keys
E. IP address
Answer: ACD
Q353 Topic 1
Which action column is available to edit in the Action tab of an Antivirus security profile?
A. Virus
B. Signature
C. Spyware
D. Trojan
Answer: A
Q354 Topic 1
Given the detailed log information above, what was the result of the firewall traffic inspection?
Answer: D
Q355 Topic 1
Answer: D
Q356 Topic 1
A. Block
B. Allow
C. Strict
D. Sinkhole
E. Alert
Answer: AD
Q357 Topic 1
Which System log severity level would be displayed as a result of a user password change?
A. Low
B. Medium
C. High
D. Critical
Answer: B
Q358 Topic 1
An administrator would like to block traffic to all high risk audio streaming applications,
including new App-IDs introduced with content updates.
Which filter should the administrator configure in the application filter object?
Answer: C
Q359 Topic 1
An administrator receives a notification about new malware that is being used to attack hosts.
The malware exploits a software bug in a common application.
Which Security Profile will detect and block access to this threat after the administrator updates
the firewall's threat signature database?
Answer: A
Q360 Topic 1
The NetSec Manager asked to create a new firewall Local Administrator profile with customized
privileges named New_Admin. This new administrator has to authenticate without inserting any
username or password to access the WebUI.
What steps should the administrator follow to create the New_Admin Administrator profile?
Answer: D
Q361 Topic 1
Which Security profile prevents users from submitting valid corporate credentials online?
A. WildFire
B. URL filtering
C. Advanced threat prevention
D. SSL decryption
Answer: B
Q362 Topic 1
Which two statements apply to an Advanced Threat Prevention subscription? (Choose two.)
Answer: AB
Q363 Topic 1
With the PAN-OS 11.0 release, which tab becomes newly available within the Vulnerability
security profile?
A. Vulnerability Exceptions
B. Advanced Rules
C. Inline Cloud Analysis
D. WildFire Inline ML
Answer: A
Q364 Topic 1
DRAG DROP
-
Drag the steps into the correct order to create a static route.
Answer:
Q365 Topic 1
What are the two ways to implement an exception to an external dynamic list? (Choose two.)
Answer: AC
Q366 Topic 1
An administrator needs to create a Security policy rule that matches DNS traffic sourced from
either the LAN or VPN zones, destined for the DMZ or Untrust zones.
The administrator does not want to match traffic where the source and destination zones are
LAN, and also does not want to match traffic where the source and destination zones are VPN.
A. Interzone
B. Universal
C. Intrazone
D. Default
Answer: B
Q367 Topic 1
Why are the two fields in the Security policy EDL-Deny highlighted in red?
Answer: D
Q368 Topic 1
What are two differences between an application group and an application filter? (Choose two.)
Answer: AB
Q369 Topic 1
An administrator reads through the following Applications and Threats Content Release Notes
before an update:
Which rule would continue to allow the file upload to confluence after the update?
A.
B.
C.
D.
Answer: B
Q370 Topic 1
Answer: BD
Q371 Topic 1
A. The traffic within the same security zone will not be allowed.
B. It requires a Zone Protection profile to be applied.
C. It applies regardless of whether it is from the same security zone or a different one.
D. It applies to all matching traffic within the specified source security zones.
Answer: D
Q372 Topic 1
Review the screenshot below. Which statement is correct about the information it contains?
Answer: D
Q373 Topic 1
An administrator wants to enable users to access retail websites that are considered minimum
risk.
Which two URL categories should be combined in a custom URL category to accomplish this
goal? (Choose two.)
A. e-commerce
B. known-good
C. shopping
D. low-risk
Answer: AC
Q374 Topic 1
What are three advantages of user-to-group mapping? (Choose three.)
Answer: CDE
Q375 Topic 1
Answer: A
Q376 Topic 1
Within an Anti-Spyware security profile, which tab is used to enable machine learning based
engines?
A. Signature Policies
B. Signature Exceptions
C. Machine Learning Policies
D. Inline Cloud Analysis
Answer: D
Q377 Topic 1
Which two statements correctly describe how pre-rules and local device rules are viewed and
modified? (Choose two.)
Answer: CD
Q378 Topic 1
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still
reachable but has lost the "SYS01 Admin" username and password.
A. Auth KO because RADIUS server lost user and password for SYS01 Admin
B. Auth OK because of the Auth Profile TACACS
C. Auth OK because of the Auth Profile Local
D. Auth KO because LDAP server is not reachable
Answer: C
Q379 Topic 1
Which three types of Source NAT are available to users inside a NGFW? (Choose three.)
A. Static Port
B. Dynamic IP and Port (DIPP)
C. Dynamic IP
D. Static IP and Port (SIPP)
E. Static IP
Answer: BCE
Q380 Topic 1
What are the two main reasons a custom application is created? (Choose two.)
Answer: CD
Q381 Topic 1
By default, what is the maximum number of templates that can be added to a template stack?
A. 6
B. 8
C. 10
D. 12
Answer: B
Q382 Topic 1
A. It shows rules with the same Source Zones and Destination Zones.
B. It indicates that a broader rule matching the criteria is configured above a more
specific rule.
C. It indicates rules with App-ID that are not configured as port-based.
D. It shows rules that are missing Security profile configurations.
Answer: B
Q383 Topic 1
Which two types of profiles are needed to create an authentication sequence? (Choose two.)
A. Security profile
B. Authentication profile
C. Server profile
D. Interface Management profile
Answer: BC
Q384 Topic 1
Answer: C
Q385 Topic 1
Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose
two.)
Answer: AC
Q386 Topic 1
Which two features implement one-to-one translation of a source IP address while allowing the
source port to change? (Choose two.)
A. Dynamic IP
B. Dynamic IP and Port (DIPP)
C. Static IP
D. Dynamic IP / Port Fallback
Answer: AC
Q387 Topic 1
What are three ways application characteristics are used? (Choose three.)
Answer: ABE
Q388 Topic 1
In which two Security Profiles can an action equal to the block IP feature be configured?
(Choose two.)
A. Antivirus
B. URL Filtering
C. Vulnerability Protection
D. Anti-spyware
Answer: AD
Q389 Topic 1
Answer: A
Q390 Topic 1
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
A. Network
B. Policies
C. Objects
D. Device
Answer: C