Advanced WildFire Knowledge Quiz

Page 1 of 10

1. What is the primary goal of Advanced WildFire?

2. What does the basic WildFire service (included with the NGFW without a subscription) allow the firewall to do?

3. Which subscription is required to enable Intelligent Run-time Memory Analysis?

4. What is the primary purpose of the Standalone WildFire API subscription?

5. With a standard WildFire subscription on PAN-OS 10.0+, what is the BEST PRACTICE for receiving signature updates?

6. What does Advanced WildFire Inline ML primarily analyze on the firewall dataplane?

7. Which file type requires NO WildFire subscription for the firewall to forward it for analysis?

8. What are the four possible verdicts WildFire can assign to a sample?

9. Which WildFire analysis method involves executing unknown samples in a custom-built, evasion-resistant virtual environment?

10. Which operating system analysis environment is ONLY available in the Advanced WildFire public cloud (not private cloud)?

Page 2 of 10

11. What is the primary benefit of Advanced WildFire Inline Cloud Analysis (requires PAN-OS 11.1+ and Advanced WildFire license)?

12. Where is Advanced WildFire Inline ML configured on the firewall?

13. What type of sample is typically classified with a "Grayware" verdict?

14. What is the maximum number of times a firewall will decode nested compressed/encoded files before forwarding?

15. Which password must be used for encrypting RAR files if you want the WildFire cloud to decrypt and analyze them upon manual submission?

16. How does the firewall handle forwarding of complete ZIP archive files?

17. Which WildFire deployment option involves forwarding files to an appliance hosted on the corporate network?

18. Are WildFire signatures generated by regional public clouds shared globally?

19. Which FedRAMP-authorized cloud is designated as FedRAMP High and restricted to Federal, DoD, or approved DIB customers?

20. Can FedRAMP clouds (like Advanced WildFire Government Cloud) be used concurrently with the global or regional public clouds on the SAME firewall device?

Page 3 of 10

21. Which WildFire cloud environment is being decommissioned as of November 30, 2024, with new customers recommended to use the Public Sector Cloud instead?

22. What functionality is specifically mentioned as NOT available in the WildFire: U.S. Government Cloud (the one being decommissioned)?

23. According to the File Type Support table, which file type is analyzed by the Advanced WildFire Public Cloud but NOT the WildFire U.S. Government Cloud?

24. For which file types is Dynamic Analysis supported ONLY in the Advanced WildFire Global (U.S.) and Europe Cloud regions?

25. Which listed file type extension is NOT supported for WildFire forwarding according to the "Supported File Types (Complete List)" table?

26. In the WildFire example scenario, why was the firewall able to inspect the traffic to Dropbox even though Dropbox uses SSL?

27. After WildFire identifies a file as malicious in the example scenario, what is the immediate next step taken by the firewall based on its configuration?

28. According to the "Get Started with Advanced WildFire" workflow, what is the FIRST step mentioned?

29. What is the recommended best practice for the File Size limit setting for PE files in the WildFire General Settings?

30. What is the recommended best practice for the WildFire Analysis profile configuration?

Page 4 of 10

31. For PAN-OS 9.1 and earlier, what is the recommended frequency (Recurrence) for checking for WildFire signature updates?

32. Which additional license is required to block user access to malicious and phishing sites identified by WildFire email/URL analysis?

33. What is a quick way mentioned to confirm the firewall is successfully forwarding *benign* files (as a troubleshooting step)?

34. According to Best Practices, which other subscription works together with WildFire to provide comprehensive threat detection and prevention?

35. Why is forwarding decrypted SSL traffic for WildFire analysis considered a best practice?

36. What potential issue can arise if you significantly increase file size limits beyond the defaults for high-volume file types?

37. If a firewall is located between the submitting firewall and the WildFire cloud, which TCP port needs to be allowed for file submission, report retrieval, etc.?

38. On a PA-7000 Series firewall, what must be configured first to enable sample forwarding if an LFC is present?

39. In a WildFire Analysis profile rule, what does setting the 'Direction' to 'both' achieve?

40. Which user role is required to enable the "Allow Forwarding of Decrypted Content" setting?

Page 5 of 10

41. What is the prerequisite PAN-OS version for enabling Advanced WildFire Inline Cloud Analysis?

42. In the WildFire Analysis profile, when enabling Inline Cloud Analysis, which file type is currently supported for this specific feature?

43. What is the recommended action setting for Advanced WildFire Inline Cloud Analysis for optimal security?

44. If Advanced WildFire Inline Cloud Analysis exceeds its configured Max Latency timeout, what happens if "Allow on Max Latency" is *deselected*?

45. When configuring proxy settings for Inline Cloud Services via the PAN-OS GUI (11.2.3+), what is the minimum required password length?

46. What is the recommended setting for "Allow HTTP partial response" under Content-ID settings for maximum security, and why?

47. Which subscription(s) are required to enable Advanced WildFire Inline ML (on-dataplane ML)?

48. Which firewall models are explicitly mentioned as NOT supporting Advanced WildFire Inline ML?

49. When creating a file exception for Advanced WildFire Inline ML based on a threat log entry, what information is primarily used for the exception?

50. What is the purpose of "Hold Mode for Real-Time Signature Lookup"?

Page 6 of 10

51. Which PAN-OS version is required to use "Hold Mode for Real-Time Signature Lookup"?

52. What is the recommended "Action On Real Time WildFire Signature Timeout" when Hold Mode is enabled?

53. Where is "Hold for WildFire Real Time Signature Look Up" enabled within an individual profile?

54. What is the default FQDN used by the firewall to connect to the Content Cloud for WildFire service requests?

55. What potential issue is mentioned if you configure a Content Cloud FQDN for a region different from your own (e.g., EU admin choosing APAC FQDN)?

56. When downloading a WildFire malware test file (e.g., PE test file), what must be temporarily disabled if SSL decryption is enabled on the firewall?

57. What verdict will the official WildFire malware test files always receive?

58. Which CLI command is used to verify the firewall's connection status to the WildFire clouds and see total forwarded file counts?

59. Why might using the `show wildfire statistics` command be particularly useful for verifying email link forwarding?

60. What is the purpose of the `debug wildfire upload-log` command?

Page 7 of 10

61. What is required to initiate a Sample Removal Request from the WildFire cloud?

62. What happens if you request removal of a sample hash that is not unique to your environment (i.e., seen from other sources)?

63. According to the table, which platform has the highest maximum files per minute forwarding capacity?

64. What happens if a firewall reaches its Reserved Drive Space limit for queuing WildFire samples?

65. Where can WildFire analysis reports be accessed?

66. In the WildFire Analysis Report details, what does the "File Signer" field indicate?

67. Which hash values does WildFire typically generate and display in its analysis report?

68. What information is specifically mentioned as NOT being included in a WildFire report viewed for a file manually uploaded via the portal or API?

69. In which part of the WildFire Analysis Report can you typically find information about registry key modifications or file creation/deletion?

70. What is the purpose of the "Report an Incorrect Verdict" link in the WildFire Analysis Report?

Page 8 of 10

71. By default, which WildFire verdicts generate entries in the WildFire Submissions log on the firewall?

72. Where do you configure the firewall to include email header information (sender, recipient, subject) in WildFire logs and reports?

73. Can the firewall forward WildFire logs for *blocked* files to an email account using a Log Forwarding profile?

74. In the WildFire Submissions log on the firewall, what determines the 'Severity' level assigned (e.g., Low, High, Informational)?

75. What is a known limitation when viewing WildFire Analysis Reports directly in the firewall web interface using Mozilla Firefox?

76. Can you view WildFire analysis reports for samples submitted by a WildFire *private* appliance on the public WildFire portal?

77. When configuring email alerts on the WildFire portal, can you receive alerts for files that were *blocked* by the firewall?

78. Who can create WildFire portal user accounts to grant access to specific firewall data?

79. What restriction applies to the email addresses used when adding WildFire portal users?

80. On the WildFire portal's Reports page, what options are available for filtering the displayed reports?

Page 9 of 10

81. What analysis technique specifically identifies variants of known threats by comparing feature sets against dynamic classification systems?

82. Dynamic Unpacking, used for files encrypted with custom/open source methods, is available in which WildFire environment?

83. Which version of Windows analysis environment is supported ONLY as an OPTION for the WildFire private cloud?

84. Does the WildFire private cloud support multi-version analysis of client applications (e.g., different Adobe Reader versions)?

85. How are the cloud inline ML detection models for Advanced WildFire Inline Cloud Analysis updated?

86. How are the on-dataplane models for Advanced WildFire Inline ML (in the Antivirus profile) updated?

87. Does the WildFire private appliance support the "phishing" verdict for links?

88. How does WildFire handle analysis of multi-stage malware files?

89. How often does the firewall forward email links to WildFire for analysis?

90. What underlying service aggregates threat details from PAN-DB and other sources to provide more accurate verdicts for URL analysis via the WildFire API?

Page 10 of 10

91. If you do NOT have an Advanced WildFire subscription, how quickly are new WildFire signatures typically made available?

92. Which Advanced WildFire cloud deployment is specifically designed to adhere to EU data privacy regulations?

93. What is the primary function of a WildFire Hybrid Cloud deployment?

94. Which action in the Antivirus profile allows WildFire Inline ML inspection but overrides stricter actions (like block/reset) to only generate an alert?

95. What is the recommended way to bypass Advanced WildFire Inline ML for a specific legitimate internal application file identified as a false positive?

96. What is the default timeout value (in milliseconds) for the WildFire Real Time Signature Lookup when Hold Mode is enabled?

97. What does the CLI command `show mlav cloud-status` verify?

98. What specific information from a WildFire Analysis Report is mentioned as being helpful for desktop support to determine if a user system is infected?

99. What feature allows a WildFire private appliance to quickly get verdicts for known samples by checking the public cloud first?

b) Hybrid Cloud Deployment.

100. In the WildFire Submissions log, an entry with verdict 'Malicious' and action 'Allow' would typically have which severity level?