Q: 6
Which functionality does an NGFW use to determine whether new session setups are legitimate or
illegitimate?
Options
Discussion
Option B
Option B. SYN cookies. They're what NGFWs use to make sure a TCP handshake is legit before session setup. This came up in the official guide if I remember right. Somebody correct me if you think it's a trick question.
B . SYN cookies let the NGFW verify if a client really completes the 3-way handshake, not just drop flood packets. D is broader protection, but B actually checks legitimacy at session setup. Pretty sure that's what they're asking here, correct me if I'm off.
D tbh, because most practice test questions use SYN flood protection as the main answer for session legitimacy checks. I'd review the official study guide and do some lab scenarios to be sure.
Option D for me. I recall a similar question from labs and they often tie session legitimacy to SYN flood protection as the main feature, since it’s the overall mechanism NGFWs use to filter bogus setups. Pretty sure that's what they're after, but maybe off by a detail.
I don’t think D is right here. B is the one that actually verifies if the handshake’s legit using SYN cookies, while D is just the broader protection against floods. I’ve seen a similar question and B was the expected answer. Disagree?
Maybe D, NGFWs mainly use SYN flood protection to block bogus session setups right?
I don’t think B is right. D. I thought SYN flood protection was the main feature used in NGFWs to block fake session setups, not the lower-level cookie detail. Maybe I'm missing something small here?
B vs D here. B (SYN cookies) actually validates if the session setup is real by checking the handshake, while D just blocks floods but doesn't check legitimacy per se. Pretty sure B is right unless they're asking about generic protection.
Did you guys check the official Palo Alto admin guide? Their docs cover SYN cookies and handshake checks pretty well.
Be respectful. No spam.