Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Network Security Administrator NetSec-Analyst Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

An analyst notices an unusual amount of bandwidth being consumed by "web-browsing" traffic. Which ACC tab provides a breakdown of which specific URLs and URL Categories are responsible for this bandwidth usage?

Options:

A.

Network Activity


B.

Threat Activity


C.

Blocked Activity


D.

SSL Activity


Expert Solution
Questions # 12:

A Palo Alto Networks NGFW for a high-security environment is being configured and requires a security profile group that includes vulnerability protection. When configuring the action based on the severity of the threat types, what does Palo Alto Networks recommend? (Choose one answer)

Options:

A.

Use action “reset-both” for critical, high, and medium vulnerabilities.


B.

Use action “alert” for critical, high, and medium vulnerabilities.


C.

Use action “allow” for critical, high, and medium vulnerabilities.


D.

Use action “default” for critical, high, and medium vulnerabilities.


Expert Solution
Questions # 13:

What is a primary benefit of using "Templates" within Panorama or Strata Cloud Manager?

Options:

A.

To group firewalls based on their physical location.


B.

To manage Layer 2 and Layer 3 network configurations across multiple devices.


C.

To synchronize Security policy rules between firewalls.


D.

To automate the backup of firewall configurations.


Expert Solution
Questions # 14:

A financial company is deploying NGFWs with the Advanced SD-WAN subscription to improve uptime and bandwidth across thousands of ATMs. The company requires that traffic flows to the internal application needed by the ATMs always use the path with the lowest latency and packet loss.

Which unique SD-WAN rule parameters meet this criteria?

Options:

A.

Application/Service: "Internal Application for ATMs" → Path Selection: "Best Available Path" in Traffic Distribution Profile.


B.

Application/Service: "Internal Application for ATMs" & "Management" in Path Quality Profile → Path Selection "Any."


C.

Application/Service: "Internal Application for ATMs" → Path Selection "Weighted Distribution" in Traffic Distribution Profile.


D.

Application/Service: "Internal Application for ATMs" & "ATM Path(Custom)" in Path Quality Profile → Path Selection "Any."


Expert Solution
Questions # 15:

In Strata Cloud Manager (SCM), which logical container is used to group firewalls that share the same configuration requirements, such as those at a specific regional office?

Options:

A.

Template Stacks


B.

Snippets


C.

Folders


D.

Device Groups


Expert Solution
Questions # 16:

What are two valid pattern types in a Data Filtering profile? (Choose two.)

Options:

A.

Custom Dictionary


B.

Proximity Pattern


C.

File Properties


D.

Regular Expression


Expert Solution
Questions # 17:

Which log type is the most useful for identifying if a user is repeatedly attempting to visit an "Unauthorized" website category that is being blocked by a security profile?

Options:

A.

Traffic Log


B.

URL Filtering Log


C.

System Log


D.

Authentication Log


Expert Solution
Questions # 18:

A company wants to ensure that any file uploaded to a specific cloud storage provider is immediately analyzed for malware, even if the file has never been seen before. Which action should be set in the WildFire Analysis Profile?

Options:

A.

Alert


B.

Block


C.

Continue


D.

Forward


Expert Solution
Questions # 19:

In a Zero Trust environment, why is it recommended to use "User-ID" instead of just IP addresses in Security policy rules?

Options:

A.

To allow the firewall to perform hardware-level decryption.


B.

IP addresses are dynamic and do not provide persistent identity in modern networks.


C.

User-ID is required to enable the "application-default" service setting.


D.

Using User-ID reduces the CPU load on the Management Plane.


Expert Solution
Questions # 20:

A company wants to ensure that its internal web server is only accessible from the internet on port 443, but the server is actually listening on port 8443. Which NAT configuration should be used?

Options:

A.

Source NAT with Static IP translation.


B.

Destination NAT with Port Translation.


C.

Bi-directional NAT with Dynamic IP and Port.


D.

Hide NAT with Overload.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions