Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Paloalto Networks SD-WAN-Engineer Palo Alto Networks SD-WAN Engineer Exam Practice Test

Palo Alto Networks SD-WAN Engineer Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

For how many hours are Prisma SD-WAN VPN shared secrets valid?

Options:

A.

1

B.

8

C.

24

D.

72

Question 2

Return traffic for an application from the branch is being dropped on the branch ION. Application traffic arrives via SD-WAN internet overlay at the branch, and path policy for the application at the branch has the following settings:

Active = MPLS Overlay

Backup = Prisma Access on internet

Which branch configuration is the probable cause of this behavior?

Options:

A.

It has Prisma Access tunnel over MPLS circuit but not on the internet circuit.

B.

It has one MPLS and one internet circuit.

C.

It has two internet circuits and no MPLS circuit.

D.

It has no MPLS circuit, and the Prisma Access tunnel is down.

Question 3

A remote branch site is reporting intermittent connectivity to the Data Center. The administrator checks the System > Alarms page and sees a "VPN_DOWN" alarm for the tunnel to the DC. However, the internet circuit status is "Up".

Which specific log file or diagnostic tool in the Prisma SD-WAN portal would provide the IKE (Internet Key Exchange) error codes (e.g., "NO_PROPOSAL_CHOSEN" or "AUTH_FAILED") to pinpoint the cause of the tunnel failure?

Options:

A.

 Flow Browser

B.

 Event Logs > System

C.

 Site Summary > Topology

D.

 Link Quality Graphs

Question 4

A network administrator is viewing the Flow Browser to investigate a report that a specific user cannot access an internal web server. The flow entry for this traffic shows the "Flow State" as "INIT" and it remains in that state until it times out.

What does the "INIT" state indicate about the traffic flow?

Options:

A.

 The TCP 3-way handshake was completed successfully, and data is being transferred.

B.

 The ION device received the SYN packet from the client but never saw a SYN-ACK response from the server.

C.

 The flow was denied by a Zone-Based Firewall policy on the ION.

D.

 The traffic is being buffered while the ION waits for a dynamic VPN tunnel to establish.

Question 5

BGP core peers on data center IONs are learning only a default route from the core router. Which action will protect the SD-WAN network from getting isolated in the event of BGP misconfiguration on the core routers?

Options:

A.

Enable BGP Bidirectional Forwarding Detection (BFD) on the core peer sessions to rapidly detect BGP neighbor failures.

B.

Configure BGP max-prefix limits on the ION devices to prevent them from accepting too many routes from the core routers.

C.

Add a static default route with higher admin distance pointing to the core peer IPs.

D.

Implement BGP route filtering using prefix lists and route maps on the ION devices to only accept specific, known prefixes from the core.1

Question 6

In a Data Center deployment, what is the key functional difference between configuring a BGP neighbor as a "Core Peer" versus an "Edge Peer"?

Options:

A.

 A Core Peer is used for LAN-side routing to learn DC prefixes, while an Edge Peer is used for WAN-side routing to the Service Provider.

B.

 A Core Peer automatically redistributes learned routes into the SD-WAN fabric, whereas an Edge Peer does not.

C.

 A Core Peer supports eBGP only, while an Edge Peer supports iBGP only.

D.

 A Core Peer is used for connecting to the internet, while an Edge Peer connects to the MPLS provider.

Question 7

When configuring SASE connectivity with easy onboarding at a branch, which two options must be selected? (Choose two.)

Options:

A.

IPSec Crypto Profile

B.

Prisma Access Primary Location

C.

Prisma Access IKE Profile

D.

IPSec Termination Node

Question 8

In which modes can a Prisma SD-WAN branch be deployed?

Options:

A.

Testing, Control, POV

B.

Production, Control, Disabled

C.

Disabled, Analytics, Control

D.

POV, Production, Analytics

Question 9

Based on the HA topology image below, which two statements describe the end-state when power is removed from the ION 1200-S labeled “Active”, assuming that the ION labeled “Standby” becomes the active ION? (Choose two.)

Options:

A.

Both the connection to ISP A and the connection to LTE/5G will be usable.

B.

The VRRP Virtual IP address assigned to any SVIs will be moved to the newly active ION.

C.

The newly active ION will send a gratuitous ARP to the LAN for the IP address of any SVIs.

D.

The connection to ISP A will be usable, but the connection to LTE/5G will not.

Question 10

A branch manager reports slow network performance, and the network administrator wants to use Prisma SD-WAN Copilot to quickly identify if a specific user, by source IP address, is consuming excessive bandwidth as well as which applications are contributing to this consumption. How can Copilot assist in this investigation?

Options:

A.

It will automatically generate and email a “User Bandwidth Consumption” report for the specified branch, which the administrator can use to find the top user and the application details.

B.

It can identify the top applications being used across the entire branch and can be correlated with Flow Browser to attribute specific application usage or total bandwidth consumption to individual source IPs.

C.

It can directly process a natural language query such as “Show top bandwidth source IPs at SD-WAN Branch X over last 3 hours,” provide summarized views of the top-consuming source IPs, and view the primary applications they are using.

D.

It will redirect the administrator to the WAN Clarity “Top N: Source IPs” report and the “Flow Browser” utility, suggesting correlation between these tools to determine a user’s specific application usage.

Question 11

While designing a greenfield Prisma SD-WAN solution for a retailer, the risk management group requires segmentation of the retail network to avoid one large fault domain.

The following data points are provided:

    Two data centers and all sites need to access applications in both data centers

    1000 retail branches with stores concentrated in multiple metropolitan areas

    Data Center 1 and Data Center 2 have different sets of applications that are not replicated

    Maintaining application availability is the primary goal

Which action will segment the retail network and reduce regional outages?

Options:

A.

Implement a single, large data center cluster spanning both data centers to centralize management and optimize resource use.

B.

Create more than one data center cluster for a larger pool of resources and resiliency.

C.

Create more than one data center cluster in each data center and assign sites to clusters so nearby retail locations can be spread on separate clusters.

D.

Add more data center aggregation devices within the same cluster to enhance the scalability and resilience.

Question 12

What is the number and structure of Prisma SD-WAN QoS queues supported per WAN interface?

Options:

A.

12 queues

4 classes1

3 application criteria within each class

B.

16 queues

4 classes

4 application criteria with each class

C.

8 queues

1 priority queue

7 non-priority queues

D.

8 queues

2 classes

4 application criteria within each class

Question 13

When troubleshooting an issue at a site that is running on two cellular links from two carriers, the operations team shared some evidence shown in the graph below:

For the time duration shown in the graph, what are two inferences about the site’s traffic that can be made? (Choose two.)

Options:

A.

Using Carrier-1 as the WAN path may have experienced some performance degradation.

B.

Using Carrier-2 as the WAN path may have experienced some performance degradation.

C.

Using Carrier-2 as the WAN path may have switched over to Carrier-1.

D.

Using Carrier-1 as the WAN path may have switched over to Carrier-2.

Question 14

A network engineer is troubleshooting a user complaint regarding "slow application performance" for an internal web application. While viewing the Flow Browser in the Prisma SD-WAN portal, the engineer notices that the Server Response Time (SRT) is consistently high (over 500ms), while the Network Transfer Time (NTT) and Round Trip Time (RTT) are low (under 50ms).

What does this data indicate about the root cause of the issue?

Options:

A.

The issue is likely caused by congestion on the WAN circuit, requiring a QoS policy adjustment.

B.

The issue is likely on the application server itself (e.g., high CPU, slow database query), not the network.

C.

The issue is caused by a high packet loss rate on the internet path.

D.

The issue is due to a misconfigured DNS server at the branch.

Question 15

Site templates are to be used for the large-scale deployment of 100 Prisma SD-WAN branch sites across different regions.

Which two statements align with the capabilities and best practices for Prisma SD-WAN site templates? (Choose two.)

Options:

A.

The use of Jinja conditional statements within a site template is not supported, thereby limiting dynamic customization options.

B.

Mandatory variables for any site template include the site name, ION software version, and at least one ION serial number /device name pair.

C.

Site templates offer the capability to pre-stage device configurations by creating a device shell.

D.

Once a site has been deployed using a template, its configuration can be updated or modified by applying an updated version of the template.

Question 16

A network administrator is troubleshooting a critical SaaS application, “SuperSaaSApp”, that is experiencing connectivity issues. Initially, the configured active and backup paths for the application were reported as completely down at Layer 3. The Prisma SD-WAN system attempted to route traffic for the application over an L3 failure path that was explicitly configured as a Standard VPN to Prisma Access.

However, users are still reporting a complete outage for the application and monitoring tools show application flows being dropped when attempting to use the Standard VPN L3 failure path, even though the tunnel itself appears to be up. The administrator suspects a policy misconfiguration related to how the Standard VPN path interacts with destination groups.

What is the most likely reason for flows being dropped when attempting to use the Standard VPN L3 failure path?

Options:

A.

The “Move Flows Forced” action was not enabled in the performance policy for “SuperSaaSApp”, preventing the system from actively shifting traffic to the L3 failure path.

B.

The path policy rule for “SuperSaaSApp” has the “Required” checkbox selected for its Service & DC Group, but no direct paths were configured alongside it, creating a conflict.

C.

The path policy rule explicitly designates a Standard VPN as the L3 failure path, but it does not include a designated Standard Services and DC Group, causing traffic to be dropped.

D.

The Standard VPN in the path policy was not configured to “Minimize Cellular Usage”, leading to the depletion of metered data and subsequent flow drops.

Question 17

The UI triggers incident DEVICESW_CONCURRENT_FLOWLIMIT_EXCEEDED for a branch site. Based in the image below, which tool can be used to identify the host?

Options:

A.

Run tcpdump under the LAN interface

B.

Monitor → Activity → Flows

C.

Monitor → Activity → New flows

D.

Monitor → Activity → Transaction Stats

Question 18

An engineer at a managed services provider is updating an application that allows its customers to request firewall changes to also manage SD-WAN. The application will be able to make any approved changes directly to devices via API.

What is a requirement for the application to create SD-WAN interfaces?

Options:

A.

REST API’s “sdwanInterfaceprofiles” parameter on a Panorama device

B.

REST API’s “sdwanInterfaces” parameter on a firewall device

C.

XML API’s “sdwanprofiles/interfaces” parameter on a Panorama device

D.

XML API’s “InterfaceProfiles/sdwan” parameter on a firewall device

Question 19

A network installer is attempting to claim a new ION device using the "Claim Code" method. The device is connected to the internet, but the status in the portal remains stuck at "Claimed" and does not transition to "Online". The installer connects a laptop to the LAN port of the ION and can successfully browse the internet, confirming the uplink is active.

What is the most likely cause of the device failing to reach the "Online" state?

Options:

A.

 The device is missing the "Site" assignment in the portal.

B.

 The upstream firewall is blocking outbound TCP port 443 or UDP port 123 (NTP).

C.

 The device has not yet downloaded the latest software image.

D.

 The "Circuit Label" has not been applied to the WAN interface.

Question 20

A customer wants to deploy Prisma SD-WAN ION devices at small home offices that use consumer-grade broadband routers. These routers typically use Symmetric NAT and do not allow static port forwarding.

Which standard mechanism does Prisma SD-WAN utilize to successfully establish direct Branch-to-Branch (Dynamic) VPN tunnels through these Symmetric NAT devices?

Options:

A.

 UPnP (Universal Plug and Play)

B.

 STUN (Session Traversal Utilities for NAT)

C.

 Manual GRE Tunnels

D.

 SSL VPN encapsulation

Question 21

A multinational company is deploying Prisma SD-WAN across North America, Europe, and Asia. The data centers in the North America region have served all regions, but regional policies are now being enforced that mandate each of the regions to build their own data centers and branch sites to only connect to their respective regional data centers.

How can this regionalization be achieved so that new or existing branch sites only build tunnels to the regional DC IONs?

Options:

A.

Create a new cluster for each regional DC ION and move the sites from the existing cluster to the new cluster.

B.

Disable the auto-tunnel feature globally on the Prisma SD-WAN portal and manually create all necessary tunnels exclusively between IONs within their designated regions.

C.

Remove the circuit labels and apply new circuit labels for in-region circuits only.

D.

Assign WAN interfaces to distinct Virtual Routing and Forwarding (VRF) instances for each region on the DC IONs, ensuring that branches only connect to the WAN interfaces/VRFs designated for their region.

Question 22

Which statement is valid when integrating Prisma SD-WAN with Prisma Access remote networks?

Options:

A.

Security policies for remote networks are configured in Prisma Access and pushed to Prisma SD-WAN for enforcement on the branch ION devices.

B.

Easy onboarding automatically recommends the closest preconfigured remote network security processing nodes and can be overridden manually.

C.

A branch with multiple internet circuits will automatically connect to Prisma Access on each circuit and will be used in an active/standby manner for internet-bound traffic.

D.

Bandwidth must be allocated to each Prisma Access remote network compute location, and this bandwidth is shared between all branches that terminate on this remote network node.

Question 23

Which condition, when configured within a performance policy, is a trigger for generating an incident related to application performance or path degradation?

Options:

A.

Violation of defined service-level agreement (SLA) thresholds for application performance or link quality.

B.

Exceeding the configured threshold for total concurrent flows in the ION device, resulting in a SYSTEM_CONCURRENT_FLOW_THRESHOLD_EXCEEDED incident.

C.

Loss of a BGP peering session on a data center ION device, leading to potential routing instability.

D.

Physical WAN interface transitioning from an “up” to a “down” state, resulting in a NETWORK_ANYNETLINK_DOWN event.

Question 24

A network administrator notices that a branch ION device is experiencing high CPU utilization due to a suspected TCP SYN Flood attack originating from a compromised host on the local LAN.

Which specific security feature should be configured and applied to the "LAN" zone to mitigate this Denial of Service (DoS) attack?

Options:

A.

 Zone-Based Firewall (ZBFW) Rule with a "Deny" action

B.

 Zone Protection Profile

C.

 Application Quality Profile (AQP)

D.

 Access Control List (ACL) on the WAN interface

Question 25

Where is route leaking configured between VRFs?

Options:

A.

VRF definition

B.

BGP peer

C.

Site configuration

D.

VRF profile