National University of Callao NETWORKING 1PALO ALTO_PSE-FOUNDATION EXAM 7.0
Question 1 of 32.
What are the main benefits of WildFire? (Select the three
... [Show More] correct answers.)
By collecting and distributing malware signatures from every major anti-virus vendor, WildFire can
provide comprehensive protection.
WildFire gathers information from possible threats detected by both NGFWs and Endpoints.
Signatures for identified malware are quickly distributed globally to all Palo Alto Networks'
customers' firewalls.
By using Palo Alto Networks' proprietary cloud-based architecture, quarantine holds on suspicious
files are typically reduced to less than 30 seconds.
It's a sandboxing environment that can detect malware by observing the behavior of unknown files.
Mark for follow up
Question 2 of 32.
What is the URL for the full list of applications recognized by Palo Alto Networks?
http://www.MyApplipedia.com
http://www.Applipedia.com
http://applications.paloaltonetworks.com
http://applipedia.paloaltonetworks.com
Mark for follow up
Question 3 of 32.
What is Palo Alto Networks’ Next Generation Security Platform? Choose three answers.
UTM
Next-Generation Firewall
Security Certificate Authority
Threat Intelligence Cloud
Security Product Governance
Advanced Endpoint Protection
Mark for follow up
Question 4 of 32.
What are the five critical places in the network where Palo Alto Networks NGFWs and other
products are commonly deployed in order to solve many of today's enterprise security problems?
(Select the five correct answers.)
Virtual Machine
Branch Office
Vehicle-Mounted Internet Hotspots
Mobile/Endpoint
Internet-Connected Home Appliances
Campus Edge
Datacenter Perimeter
VLAN Aggregation
Internet Perimeter
Mark for follow up
Question 5 of 32.
How quickly are Wildfire updates about previously unknown files now being delivered from the
cloud to customers with a WildFire subscription (as of version 6.1)?
60 minutes
15 minutes
5 minutes
30 minutes
1 day
Mark for follow up
Question 6 of 32.
What are the major families of file types now supported by Wildfire in PAN-OS 7.0?
All executable files and all files with a MIME type
All executable files, PDF files and Microsft Office files
PE files, Microsoft Office, PDF, Java applets, APK, and Flash
All executable files, PDF files, Microsft Office files and Adobe Flash applets
Mark for follow up
Question 7 of 32.
TRUE or FALSE: Many customers purchase Palo Alto Networks NGFWs (Next Generation
Firewalls) just to gain previously unavailable levels of visibility into their traffic flows.
FALSE
TRUE
Mark for follow up
Question 8 of 32.
What are five benefits of Palo Alto Networks NGFWs (Next Generation Firewalls)? (Select the five
correct answers.)
Easy-to-use GUI which is the same on all models
Identical security subscriptions on all models
Predictable throughput
Comprehensive security platform designed to scale functionality over
time
Seemless integration with the Threat Intelligence Cloud
Convenient configuration Wizard
Mark for follow up
Question 9 of 32.
Global Protect’s main role is:
Looking for malware on the endpoint
Sandboxing files on the threat intelligence cloud
Extending protections and policies to endpoints
URL categorization
Mark for follow up
Question 10 of 32.
The VM-Series supports which of the following virtualized environments?
Linux VServer
Citrix NetScaler SDX
KVM/OpenStack
Citrix XenServer
VMware ESXi
Vmware NSX
Mark for follow up
Question 11 of 32.
The automated Correlation Engine uses correlation objects to analyze the logs for patterns. When
a match occurs:
The Correlation Engine blocks the connection
The Correlation Engine displays a warning message to the end user
The Correlation Engine generates a correlation event
The Correlation Engine dumps the alarm log
Mark for follow up
Question 12 of 32.
What does App-ID inspect to identify an application?
Source IP
Source Port
TTL
Data Payload
Hash
Encryption Key
Mark for follow up
Question 13 of 32.
Which of the following features would prevent a successful attempt during the exfiltration stage of
the attack chain?
File Blocking
WildFire
Global Protect
DNS monitoring and sinkholing
URL Filtering
Mark for follow up
Question 14 of 32.
A spike in dangerous traffic is observed. Which of the following PanOS tabs would an
administrator utilize to identify culpable users.
Objects
Device
Policies
Network
ACC
Monitor
Mark for follow up
Question 15 of 32.
Which one of these is not a factor impacting sizing decisions?
Decryption
Sessions
Redundancy
Number of applications
Performance
Number of rules
Mark for follow up
Question 16 of 32.
What are the failure areas of legacy security architectures? Choose four answers.
Lacks Correlation
ROI
Limited Visibility
Requires Headcount
Limited places in the network
Manual Response
Mark for follow up
Question 17 of 32.
The automated correlation engine analyzes:
Zones
Ports
Protocols
Profiles
Logs
Rules
Exceptions
Mark for follow up
Question 18 of 32.
What are the three key components of a successful Three Tab Demo? (Select the three correct
answers.)
Showing which users are running which applications and provide a method for controlling
application access on a by user
After setting match criteria in the Object tab showing how that data is presented in the logs
Showing how Palo Alto Networks' firewalls provide visibility into applications and control of those
applications
Presenting the information in the Network and Device tabs
Providing visibility into recently occurring threats and showing how to block those threats
Mark for follow up
Question 19 of 32.
True or False: An employee takes a corporate laptop, with Traps installed, on a weekend camping
trip. The employee’s spouse has brought a USB stick with music to listen to. The USB stick
contains music files that have been weaponized. The corporate device has no network
connectivity when the weaponized files are launched and therefore the system is exploited and
compromised.
True False
Mark for follow up
Question 20 of 32.
Which of the following are critical features of a Next Generation Firewall that provide Breach
prevention? Choose two.
Endpoint and server scanning for known malware
Centralized or distributed log collectors
Alarm generation of known threats traversing the device
Processing all traffic across all ports & protocols, in both directions
Application Visibility and URL Categorization
Mark for follow up
Question 21 of 32.
True or False: PAN-DB is a service that aligns URLs with category types and is fed to the WildFire
threat cloud. TRUE
True False
Mark for follow up
Question 22 of 32.
How many stages in the attack chain must be stopped in order to prevent a successful attack?
5 3 1 2
Mark for follow up
Question 23 of 32.
Which of the following are valid Subscriptions for the Next Generation Platform? [Select All that
apply]
App ID
Support
SSL Decryption
Content ID
User ID
Threat Prevention
URL Filtering
Mark for follow up
Question 24 of 32.
If malware is detected on the internet perimeter, what other places in the network might be
affected?
Endpoints
Branch Offices
Cloud
All of the above
Data Center
Mark for follow up
Question 25 of 32.
True or False: DSRI degrades the performance of a firewall?
True False
Mark for follow up
Question 26 of 32.
Which hardware platform should I consider if the customer needs at least 1 Gbps of Threat
Prevention throughput and the ability to handle at least 250K sessions?
Any PA-5000 or PA-7000 series firewall
Only the PA-3060 firewall and higher
Only the PA-3050 firewall and higher
Any PA-3000, PA-5000, or PA-7000 series firewall
Mark for follow up
Question 27 of 32.
Select all the platform components that Wildfire automatically updates after finding malicious
activity in previously unknown files, URLs and APKs?
Decrypt (Port-Mirroring)
Management (Panorama)
Anti Command & Control signatures (Threat)
Anti-Malware signatures (WildFire)
Anti-Virus (Threat)
Mobile (Global Protect)
Content/Web Filtering (Pan-DB)
Mark for follow up
Question 28 of 32.
When selling a Palo Alto Networks NGFW, which of these components should be included in the
Bill of Materials (BoM)?
A GP-100
A Support Contract
A Global Protect Portal
A Threat Subscription
An M-100
A Palo Alto Networks Appliance
Mark for follow up
Question 29 of 32.
Which hardware firewall platforms include both built-in front-to-back airflow and redundant power
supplies?
All PA-5000 and PA-7000 series firewall platforms
The PA-7000 series firewall platforms
All Palo Alto Networks hardware firewall platforms
The PA-3060 firewall platform
Mark for follow up
Question 30 of 32.
True or False: Antivirus inspection is proxy-based? [Show Less]