Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Network Security Administrator NetSec-Analyst Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An analyst is creating a "Data Pattern" for DLP that needs to match a specific 10-digit customer account number that always starts with the letters "ACC". Which pattern type should be used?

Options:

A.

File Properties


B.

Regular Expression (Regex)


C.

Predefined Pattern


D.

Custom Dictionary


Expert Solution
Questions # 2:

To comply with new regulations, a company requires all traffic logs related to the "HR-App" application across all Security policies be sent to a compliance syslog server. A Log Forwarding profile already exists to send logs to a default syslog server.

What is the most efficient process for configuring an NGFW to comply with the new regulations without disrupting existing traffic logs being sent to the default syslog server?

Options:

A.

Edit the existing Log Forwarding profile by adding a new match list consisting of Log Forwarding filter for the application named "HR-App" to direct logs to the compliance syslog server.


B.

Create a new Log Forwarding profile, update the profile with the details of the compliance syslog server and attach the profile to the relevant Security policy rule.


C.

Edit the existing Log Forwarding profile, add a new entry, use the filter builder to match on application "HR-App," and add the details for the compliance syslog server.


D.

Create a Log Forwarding profile and enable the predefined filter for "Application" In the associated dropdown, select or create a new application object with the name "HR-App," and add the details for the compliance syslog server.


Expert Solution
Questions # 3:

Which tool should an analyst use to view a real-time, graphical representation of the top applications, users, and threats across the network to identify immediate anomalies?

Options:

A.

Log Viewer


B.

ACC (Application Command Center)


C.

Config Audit


D.

Policy Optimizer


Expert Solution
Questions # 4:

Which action ensures that sensitive information such as medical records, financial transactions, and legal communications are not decrypted and that they maintain strong security?

Options:

A.

Create a log forwarding filter to exclude sensitive information.


B.

Disable decryption globally to avoid exposing sensitive data.


C.

Create an SSL Inbound Inspection policy to identify users sending sensitive information.


D.

Create a no-decrypt policy for traffic matching specific URL categories.


Expert Solution
Questions # 5:

Which security profile is specifically designed to protect against "Domain Generation Algorithms" (DGA) and DNS tunneling?

Options:

A.

Anti-Spyware Profile


B.

URL Filtering Profile


C.

DNS Security Profile


D.

Vulnerability Protection Profile


Expert Solution
Questions # 6:

How often should external dynamic lists be updated to ensure effective Security policy enforcement?

Options:

A.

Once a week


B.

As new threats are identified


C.

Once a month


D.

As frequently as the external source updates


Expert Solution
Questions # 7:

When pushing a configuration from Panorama to multiple firewalls, an analyst wants to ensure that a specific local interface setting on one firewall is not overwritten by the template value. Which feature should be used?

Options:

A.

Template Stack


B.

Template Variable


C.

Device Group Override


D.

Policy Optimizer


Expert Solution
Questions # 8:

An analyst is investigating why an App-ID for a custom application is showing as "unknown-tcp" in the Traffic logs. The application is running on port 8080. What is the most likely cause of this identification failure?

Options:

A.

The firewall does not have a signature for the proprietary application.


B.

The Security policy is set to "application-default."


C.

The traffic is being decrypted by an SSL Forward Proxy.


D.

The URL category is "private-ip-addresses."


Expert Solution
Questions # 9:

An analyst needs to create a security rule to allow access to a specific web application that identifies itself as "web-browsing" but uses a custom, non-standard port of TCP 9000. Which configuration ensures the App-ID engine can still inspect this traffic?

Options:

A.

Change the Service to "application-default."


B.

Create a custom Service object for TCP 9000 and use it in the rule.


C.

Use an Application Override rule for port 9000.


D.

Change the application to "any" and the service to TCP 9000.


Expert Solution
Questions # 10:

An analyst wants to create a custom application for an internal tool that uses a specific proprietary protocol. Which information is required to ensure the firewall correctly identifies this application using App-ID?

Options:

A.

Source and Destination IP addresses.


B.

Signature patterns found in the packet payload.


C.

The URL category of the server.


D.

The MAC address of the server.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions