Pass the Paloalto Networks Network Security Administrator NetSec-Generalist Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which functionality does an NGFW use to determine whether new session setups are legitimate or illegitimate?

Options:

A.

SYN flood protection


B.

SYN bit


C.

Random Early Detection (RED)


D.

SYN cookies


Expert Solution
Questions # 12:

Which Security profile should be queried when investigating logs for upload attempts that were recently blocked due to sensitive information leaks?

Options:

A.

Anti-spyware


B.

Data Filtering


C.

Antivirus


D.

URL Filtering


Expert Solution
Questions # 13:

A firewall administrator wants to segment the network traffic and prevent noncritical assets from being able to access critical assets on the network.

Which action should the administrator take to ensure the critical assets are in a separate zone from the noncritical assets?

Options:

A.

Create a deny Security policy with "any" set for both thesource and destination zones.


B.

Create an allow Security policy with "any" set for both thesource and destination zones.


C.

Logically separate physical and virtual interfaces to control the traffic that passes across the interface.


D.

Assign a single interface to multiple security zones.


Expert Solution
Questions # 14:

Which action in the Customer Support Portal is required to generate authorization codes for Software NGFWs?

Options:

A.

Download authorization codes from the public cloud marketplace.


B.

Create a deployment profile.


C.

Use the Enterprise Support Agreement (ESA) authorization code.


D.

Register the device with the cloud service provider.


Expert Solution
Questions # 15:

After a Best Practice Assessment (BPA) is complete, it is determined that dynamic updates for Cloud-Delivered Security Services (CDSS) used by company branch offices do not match recommendations. The snippet used for dynamic updates is currently set to download and install updates weekly.

Knowing these devices have the Precision Al bundle, which two statements describe how the settings need to be adjusted in the snippet? (Choose two.)

Options:

A.

Applications and threats should be updated daily.


B.

Antivirus should be updated daily.


C.

WildFire shouldbe updated every five minutes.


D.

URL filtering should be updated hourly.


Expert Solution
Questions # 16:

Which Panorama centralized management feature allows native and third-party integrations to monitor VM-Series NGFW logs and objects?

Options:

A.

Plugin


B.

Template


C.

Device Group


D.

Log Forwarding profile


Expert Solution
Questions # 17:

When using the perfect forward secrecy (PFS) key exchange, how does a firewall behave when SSL Inbound Inspection is enabled?

Options:

A.

It acts as meddler-in-the-middle between the client and the internal server.


B.

It acts transparently between the client and the internal server.


C.

It decrypts inboundand outbound SSH connections.


D.

It decrypts traffic between the client and the external server.


Expert Solution
Questions # 18:

Which two SSH Proxy decryption profile configurations will reduce network attack surface? (Choose two.)

Options:

A.

Allow sessions if resources not available.


B.

Allow sessions with unsupported versions.


C.

Block sessions on certificate errors.


D.

Block sessions with unsupported versions.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions