Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam PCNSE topic 1 question 56 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 56
Topic #: 1
[All PCNSE Questions]

An administrator creates an SSL decryption rule decrypting traffic on all ports. The administrator also creates a Security policy rule allowing only the applications
DNS, SSL, and web-browsing.
The administrator generates three encrypted BitTorrent connections and checks the Traffic logs. There are three entries. The first entry shows traffic dropped as application Unknown. The next two entries show traffic allowed as application SSL.
Which action will stop the second and subsequent encrypted BitTorrent connections from being allowed as SSL?

  • A. Create a decryption rule matching the encrypted BitTorrent traffic with action ג€No-Decrypt,ג€ and place the rule at the top of the Decryption policy.
  • B. Create a Security policy rule that matches application ג€encrypted BitTorrentג€ and place the rule at the top of the Security policy.
  • C. Disable the exclude cache option for the firewall.
  • D. Create a Decryption Profile to block traffic using unsupported cyphers, and attach the profile to the decryption rule.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRtCAK

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ChiaPet75
Highly Voted 3 years, 10 months ago
D is Correct There is no application called "encrypted BitTorrent" so "B" is not the correct answer. If the application was just "BitTorrent" then "B" would be correct. "A" would not work either since you would still need to create a Decryption Profile which is not mentioned. "D" is the most complete answer which is to create the Decryption Profile and attach it to the Decryption rule. I found a PaloAlto KB article about blocking Tor traffic using a Decryption Profile that is blocking Unsupported cipher's, expired certificates, etc. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRtCAK
upvoted 20 times
...
lol1000
Highly Voted 3 years, 5 months ago
D is the least wrong
upvoted 8 times
...
Marshpillowz
Most Recent 2 months, 3 weeks ago
Selected Answer: D
D appears to be correct
upvoted 1 times
...
JRKhan
3 months, 1 week ago
Selected Answer: D
Most suitable answer is D. The firewall couldnt decrypt the traffic probably because of the use of unsupported ciphers hence the reason in subsequent packets the application is identified as SSL. If the firewall was able to decrypt the traffic, even if it couldnt identify the application it would mark the traffic as web-browsing and not SSL.
upvoted 1 times
...
ThelioNN
11 months ago
Guys, why not A. Seems correct, the FW will leave the bittorrent as bittorrent and block it. Instead of decrypting it. Are we sure the Bittorrent crypto is going to use unsupported ciphers (as that can easily be fixed from the developers)?
upvoted 1 times
FaheemParakkot
7 months, 2 weeks ago
As per the question, the first packet is identified as UnKnown Application. Which means, even if you created a rule for BitTorrent, it wont match.
upvoted 1 times
...
...
Kjohnsting
1 year, 2 months ago
Don't love this kind of question. Seems incomplete.
upvoted 4 times
...
UFanat
1 year, 10 months ago
Selected Answer: D
D - correct. You need to fix decryption options, not security policy rule.
upvoted 2 times
...
AbuHussain
2 years ago
Selected Answer: D
answer is D
upvoted 2 times
...
Gabuu
2 years, 2 months ago
D is correct
upvoted 2 times
...
Kane002
2 years, 5 months ago
The administrator has created a decryption policy, but bittorrent is slipping past it, only being detected as "ssl", so the admin needs to create a decryption profile to block the evasive behavior, probably bittorrent is using an unsupported cipher, hence the decryption policy failure. D.
upvoted 4 times
...
Zabol
2 years, 10 months ago
I think it is D, App-ID doesn't have Encrypted-Bittorent
upvoted 1 times
...
trashboat
2 years, 11 months ago
D is correct: B is not correct because the reason the two other sessions are showing allowed as SSL is because they are not being decrypted, otherwise they would be recognized as tor/unknown application and not allowed on the security policy rule. The likely reason for this is they are using unsupported ciphers/etc. - so the answer is D. C is not relevant. A is also not correct because the goal is to decrypt the traffic to identify it, so this is the opposite of what is trying to be accomplished.
upvoted 2 times
...
frodo1791
3 years ago
B is not correct... as "encrypted bittorrent" doesn't exist in app-id. So I should go D...
upvoted 2 times
...
hpbdcb
3 years, 4 months ago
check https://applipedia.paloaltonetworks.com/ there is no app encrypted bittorrent. other then that the rest is clear so D.
upvoted 1 times
...
Pb1805
3 years, 10 months ago
Correct answer is D
upvoted 1 times
...
Silent_Sanctuary
3 years, 11 months ago
D is correct Block sessions that use cipher suites you don’t support. You configure which cipher suites (encryption algorithms) to allow on the SSL Protocol Settings tab. Don’t allow users to connect to sites with weak cipher suites.
upvoted 2 times
...
sunjun
3 years, 11 months ago
I think that correct answer is B.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...