Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks NetSec-Pro Palo Alto Networks Network Security Professional Exam Practice Test

Page: 1 / 6
Total 60 questions

Palo Alto Networks Network Security Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which NGFW function can be used to enhance visibility, protect, block, and log the use of Post-quantum Cryptography (PQC)?

Options:

A.

DNS Security profile

B.

Decryption policy

C.

Security policy

D.

Decryption profile

Question 2

Which action optimizes user experience across a segmented network architecture and implements the most effective method to maintain secure connectivity between branch and campus locations?

Options:

A.

Establish site-to-site tunnels on each branch and campus firewall and have individual VLANs for each department.

B.

Configure all branch and campus firewalls to use a single shared broadcast domain.

C.

Implement SD-WAN to route all traffic based on network performance metrics and use zone protection profiles.

D.

Configure a single campus firewall to handle the routing of all branch traffic.

Question 3

Which step is necessary to ensure an organization is using the inline cloud analysis features in its Advanced Threat Prevention subscription?

Options:

A.

Disable anti-spyware to avoid performance impacts and rely solely on external threat intelligence.

B.

Enable SSL decryption in Security policies to inspect and analyze encrypted traffic for threats.

C.

Update or create a new anti-spyware security profile and enable the appropriate local deep learning models.

D.

Configure Advanced Threat Prevention profiles with default settings and only focus on high-risk traffic to avoid affecting network performance.

Question 4

Which set of attributes is used by IoT Security to identify and classify appliances on a network when determining Device-ID?

Options:

A.

IP address, network traffic patterns, and device type

B.

MAC address, device manufacturer, and operating system

C.

Hostname, application usage, and encryption method

D.

Device model, firmware version, and user credential

Question 5

Which two SSH Proxy decryption profile settings should be configured to enhance the company’s security posture? (Choose two.)

Options:

A.

Block sessions when certificate validation fails.

B.

Allow sessions with legacy SSH protocol versions.

C.

Block connections that use non-compliant SSH versions.

D.

Allow sessions when decryption resources are unavailable.

Question 6

What key capability distinguishes Content-ID technology from conventional network security approaches?

Options:

A.

It performs packet header analysis short of deep packet inspection.

B.

It provides single-pass application layer inspection for real-time threat prevention.

C.

It exclusively monitors network traffic volumes.

D.

It relies primarily on reputation-based filtering.

Question 7

A network administrator obtains Palo Alto Networks Advanced Threat Prevention and Advanced DNS Security subscriptions for edge NGFWs and is setting up security profiles. Which step should be included in the initial configuration of the Advanced DNS Security service?

Options:

A.

Create a decryption policy rule to decrypt DNS-over-TLS / port 853 traffic.

B.

Create overrides for all company owned FQDNs.

C.

Configure DNS Security signature policy settings to sinkhole malicious DNS queries.

D.

Enable Advanced Threat Prevention with default settings and only focus on high-risk traffic.

Question 8

Which action is only taken during slow path in the NGFW policy?

Options:

A.

Session lookup

B.

Layer 2—Layer 4 firewall processing

C.

SSL/TLS decryption

D.

Security policy lookup

Question 9

Which action allows an engineer to collectively update VM-Series firewalls with Strata Cloud Manager (SCM)?

Options:

A.

Creating an update grouping rule

B.

Scheduling software update

C.

Creating a device grouping rule

D.

Setting a target OS version

Question 10

Which offering can be managed in both Panorama and Strata Cloud Manager (SCM)?

Options:

A.

Autonomous Digital Experience Manager (ADEM)

B.

VM-Series Next-Generation Firewall (NGFW)

C.

Prisma SD-WAN

D.

SaaS Security

Question 11

Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)

Options:

A.

App-ID

B.

Service

C.

User-ID

D.

Schedule

Question 12

Which zone is available for use in Prisma Access?

Options:

A.

Clientless VPN

B.

Interzone

C.

Intrazone

D.

DMZ

Question 13

Which functionality does an NGFW use to determine whether new session setups are legitimate or illegitimate?

Options:

A.

SYN bit

B.

SYN cookies

C.

Random Early Detection (RED)

D.

SYN flood protection

Question 14

What are two recommendations to ensure secure and efficient connectivity across multiple locations in a distributed enterprise network? (Choose two.)

Options:

A.

Use Prisma Access to provide secure remote access for branch users.

B.

Employ centralized management and consistent policy enforcement across all locations.

C.

Create broad VPN policies for contractors working at branch locations.

D.

Implement a flat network design for simplified network management and reduced overhead.

Question 15

Which two configurations are required when creating deployment profiles to migrate a perpetual VM-Series firewall to a flexible VM? (Choose two.)

Options:

A.

Choose “Fixed vCPU Models” for configuration type.

B.

Allocate the same number of vCPUs as the perpetual VM.

C.

Allow only the same security services as the perpetual VM.

D.

Deploy virtual Panorama for management.

Question 16

Which component of NGFW is supported in active/passive design but not in active/active design?

Options:

A.

Single floating IP address

B.

Using a DHCP client

C.

Route-based redundancy

D.

Configuring ARP load-sharing on Layer 3

Question 17

How does a firewall behave when SSL Inbound Inspection is enabled?

Options:

A.

It acts transparently between the client and the internal server.

B.

It decrypts inbound and outbound SSH connections.

C.

It decrypts traffic between the client and the external server.

D.

It acts as meddler-in-the-middle between the client and the internal server.

Question 18

A network security engineer needs to implement segmentation but is under strict compliance requirements to place security enforcement as close as possible to the private applications hosted in Azure. Which deployment style is valid and meets the requirements in this scenario?

Options:

A.

On a VM-Series NGFW, configure several Layer 2 zones with Layer 2 interfaces assigned to logically segment the network.

B.

On a PA-Series NGFW, configure several Layer 2 zones with Layer 2 interfaces assigned to logically segment the network.

C.

On a VM-Series NGFW, configure several Layer 3 zones with Layer 3 interfaces assigned to logically segment the network.

D.

On a PA-Series NGFW, configure several Layer 3 zones with Layer 3 interfaces assigned to logically segment the network.

Page: 1 / 6
Total 60 questions