The firewall team has been asked to deploy a new Panorama server and to forward all firewall logs to this server By default, which component of the Palo Alto Networks firewall architect is responsible for log forwarding and should be checked for early signs of overutilization?
A. Management plane CPU
B. Dataplane CPU
C. Packet buffers
D. On-chip packet descriptors
A company has configured GlobalProtect to allow their users to work from home. A decrease in performance for remote workers has been reported during peak-use hours. Which two steps are likely to mitigate the issue? (Choose TWO)
A. Exclude video traffic
B. Enable decryption
C. Block traffic that is not work-related
D. Create a Tunnel Inspection policy
An administrator is configuring a Panorama device group. Which two objects are configurable? (Choose two.)
A. DNS Proxy
B. SSL/TLS profiles
C. address groups
D. URL Filtering profiles
An engineer is configuring a Protection profile to defend specific endpoints and resources
against malicious activity.
The profile is configured to provide granular defense against targeted flood attacks for
specific critical systems that are accessed by users from the internet.
Which profile is the engineer configuring?
A. Packet Buffer Protection
B. Zone Protection
C. Vulnerability Protection
D. DoS Protection
Explanation: The engineer is configuring a DoS Protection profile to defend specific endpoints and resources against malicious activity. A DoS Protection profile is a feature that enables the firewall to detect and prevent denial-of-service (DoS) attacks that attempt to overwhelm network resources or disrupt services. A DoS Protection profile can provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet, such as web servers, DNS servers, or VPN gateways. A DoS Protection profile can be applied to a security policy rule that matches the traffic to and from the protected systems, and can specify the thresholds and actions for different types of flood attacks, such as SYN, UDP, ICMP, or other IP floods12. References: DoS Protection, PCNSE Study Guide (page 58)
Review the information below. A firewall engineer creates a U-NAT rule to allow users in
the trust zone access to a server in the same zone by using an external,
public NAT IP for that server.
Given the rule below, what change should be made to make sure the NAT works as
expected?
A. Change destination NAT zone to Trust_L3.
B. Change destination translation to Dynamic IP (with session distribution) using firewall ethI/2 address.
C. Change Source NAT zone to Untrust_L3.
D. Add source Translation to translate original source IP to the firewall eth1/2 interface translation.
A firewall engineer is configuring quality of service (OoS) policy for the IP address of a specific server in an effort to limit the bandwidth consumed by frequent downloads of large files from the internet. Which combination of pre-NAT and / or post-NAT information should be used in the QoS rule?
A. Post-NAT source IP address Pre-NAT source zone
B. Post-NAT source IP address Post-NAT source zone
C. Pre-NAT source IP address Post-NAT source zone
D. Pre-NAT source IP address Pre-NAT source zone
Explanation: When configuring Quality of Service (QoS) policies, particularly for traffic
going to or from specific IP addresses and involving NAT, it's important to base the rule on
how the firewall processes the traffic. For QoS, the firewall evaluates traffic using pre-NAT
IP addresses and zones because QoS policies typically need to be applied before the NAT
action occurs. This is especially true for inbound traffic, where the goal is to limit bandwidth
before the destination IP is translated.
The correct combination for a QoS rule in this scenario, where the aim is to limit bandwidth
for downloads from a specific server (implying inbound traffic to the server), would be:
D. Pre-NAT source IP address Pre-NAT source zone:
Pre-NAT source IP address: This refers to the original IP address of the client or
source device before any NAT rules are applied. Since QoS policies are evaluated
before NAT, using the pre-NAT IP address ensures that the policy applies to the
correct traffic.
Pre-NAT source zone: This is the zone associated with the source interface before
NAT takes place. Using the pre-NAT zone ensures that the QoS policy is applied
to traffic as it enters the firewall, before any translations or routing decisions are made.
By configuring the QoS rule with pre-NAT information, the firewall can accurately apply
bandwidth limitations to the intended traffic, ensuring efficient use of network resources and
mitigating the impact of large file downloads from the specified server.
For detailed guidelines on configuring QoS policies, refer to the Palo Alto Networks
documentation, which provides comprehensive instructions and best practices for
managing bandwidth and traffic priorities on the network.
A company configures its WildFire analysis profile to forward any file type to the WildFire public cloud. A company employee receives an email containing an unknown link that downloads a malicious Portable Executable (PE) file. What does Advanced WildFire do when the link is clicked?
A. Performs malicious content analysis on the linked page, but not the corresponding PE file.
B. Performs malicious content analysis on the linked page and the corresponding PE file.
C. Does not perform malicious content analysis on either the linked page or the corresponding PE file.
D. Does not perform malicious content analysis on the linked page, but performs it on the corresponding PE file.
Explanation: Advanced WildFire analyzes both the webpage linked by the URL and any
files (like PE files) that are downloaded as a result of clicking that link. This includes
checking the linked webpage for malicious content and sending any downloaded files for
further analysis to determine their behavior and potential malicious intent.
The PCNSA Study Guide outlines that WildFire inspects and analyzes both content
downloaded and webpages involved when integrated into the organization's security profile
. This dual-layered approach ensures comprehensive protection against threats from both
the webpage and its payloads.
Explanation: Advanced WildFire analyzes both the webpage linked by the URL and any
files (like PE files) that are downloaded as a result of clicking that link. This includes
checking the linked webpage for malicious content and sending any downloaded files for
further analysis to determine their behavior and potential malicious intent.
The PCNSA Study Guide outlines that WildFire inspects and analyzes both content
downloaded and webpages involved when integrated into the organization's security profile
. This dual-layered approach ensures comprehensive protection against threats from both
the webpage and its payloads.
Step-by-Step Explanation
Link Clicked and File Download Triggered:
URL Inspection by WildFire:
Forwarding the PE File for Analysis:
Dynamic and Static Analysis:
Threat Verdict:
Automated Response:
Signature Update:
Advanced WildFire Configuration and Behavior
Forwarding File Types:
The WildFire analysis profile must be configured to forward relevant file types. In this case:
PE files are commonly forwarded by default since they are a known vector for
malware.
Administrators can define custom forwarding rules based on file type and traffic.
Integration with the Security Profile:
WildFire integrates with other security profiles (e.g., Antivirus, Anti-Spyware, URL
Filtering).
URL Filtering ensures that the link itself is categorized and blocked if malicious.
WildFire's output informs and updates the threat prevention database dynamically.
Why the Answer is B?
WildFire performs dual analysis:
This layered analysis ensures robust protection against modern threats, which
often combine malicious webpages with harmful payloads.
Four configuration choices are listed, and each could be used to block access to a specific URL. If you configured each choice to block the same URL, then which choice would be evaluated last in the processing order to block access to the URL?
A. Custom URL category in URL Filtering profile
B. EDL in URL Filtering profile
C. PAN-DB URL category in URL Filtering profile
D. Custom URL category in Security policy rule
Page 11 out of 37 Pages |
Previous |