Pass the Paloalto Networks Network Security Administrator NetSec-Generalist Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which NGFW function can be used to enhance visibility, protect, block, and log the use of Post-quantum Cryptography (PQC)?

Options:

A.

DNS Security profile


B.

Decryption policy


C.

Security policy


D.

Decryption profile


Questions # 2:

What is a benefit of virtual systems for multitenancy?

Options:

A.

Unified management


B.

Parallel inspection of all tenants


C.

Traffic separation between network segments


D.

Logical separation of management and inspection


Questions # 3:

Which two pieces of information are needed prior to deploying server certificates from a trusted third-party certificate authority (CA) to GlobalProtect components? (Choose two.)

Options:

A.

Encrypted private key and certificate (PKCS12)


B.

Subject Alternative Name (SAN)


C.

Certificate and key files


D.

Passphrase for private key


Questions # 4:

A hospital system allows mobile medical imaging trailers to connect directly to the internal network of its various campuses. The network security team is concerned about this direct connection and wants to begin implementing a Zero Trust approach in the flat network.

Which solution provides cost-effective network segmentation and security enforcement in this scenario?

Options:

A.

Deploy edge firewalls at each campus entry point to monitor and control various traffic types through direct connection with the trailers.


B.

Manually inspect large images like holograms and MRIs, but permit smaller images to pass freely through the campus core firewalls.


C.

Configure separate zones to isolate the imaging trailer's traffic and apply enforcement using the existing campus core firewalls.


D.

Configure access control lists on the campus core switches to control and inspect traffic based on image size, type, and frequency.


Questions # 5:

Which tool will help refine a security rule by specifying the applications it has viewed in past weeks?

Options:

A.

Security Lifecycle Review (SLR)


B.

Custom Reporting


C.

Autonomous Digital Experience Management (ADEM)


D.

Policy Optimizer


Questions # 6:

Which two policies in Strata Cloud Manager (SCM) will ensure the personal data of employees remains private while enabling decryption for mobile users in Prisma Access? (Choose two.)

Options:

A.

SSH Decryption


B.

SSL Inbound Inspection


C.

SSL Forward Proxy


D.

No Decryption


Questions # 7:

Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)

Options:

A.

User-ID


B.

Schedule


C.

Service


D.

App-ID


Questions # 8:

What is the main security benefit of adding a CN-Series firewall to an existing VM-Series firewall deployment when the customer is using containers?

Options:

A.

It provides perimeter threat detection and inspection outside the container itself.


B.

It prevents lateral threat movement within the container itself.


C.

It monitors and logs traffic outside the container itself.


D.

It enables core zone segmentation within the container itself.


Questions # 9:

Which feature is available in both Panorama and Strata Cloud Manager (SCM)?

Options:

A.

Template stacks


B.

Configuration snippets


C.

Policy Optimizer


D.

Plug-ins


Questions # 10:

Question # 10

A network administrator is using DNAT to map two servers to one public IP address. Traffic will be directed to a specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.

Which two sets of Security policy rules will accomplish this configuration? (Choose two.)

Options:

A.

Source: Untrust (Any) Destination: Untrust Application(s): web-browsing Action: allow


B.

Source: Untrust (Any) Destination: Trust Application(s): web-browsing, ssh Action: allow


C.

Source: Untrust (Any) Destination: DMZ Application(s): web-browsing Action: allow


D.

Source: Untrust (Any) Destination: DMZ Application(s): ssh Action: allow


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions