Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Network Security Administrator NGFW-Engineer Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A network architect is planning the deployment of a new IPSec VPN tunnel to connect a local data center to a cloud environment. The plan must include all necessary Security policy configurations for both tunnel negotiation and data transit. Which two Security policy requirements must be included in the implementation plan? (Choose two answers)

Options:

A.

The default interzone-default security policy is sufficient to allow the tunnel negotiation traffic between the firewall and the remote peer.


B.

A pair of policies is required to control the flow of data traffic into and out of the security zone assigned to the tunnel interface.


C.

A policy must explicitly permit only the IKE application between the external-facing zone and local zone.


D.

A policy must explicitly permit the IPSec container application between the external-facing zone and local zone.


Expert Solution
Questions # 12:

Which configuration step is required when implementing a new self-signed root certificate authority (CA) certificate for SSL decryption on a Palo Alto Networks firewall?

Options:

A.

Import the new subordinate CA certificate into the trust stores of all client devices.


B.

Set the subordinate CA certificate as the default routing certificate for all network traffic.


C.

Configure the subordinate CA to issue certificates with indefinite validity periods.


D.

Disable all existing SSL decryption rules until the new certificate is fully propagated.


Expert Solution
Questions # 13:

After an engineer configures an IPSec tunnel with a Cisco ASA, the Palo Alto Networks firewall generates system messages reporting the tunnel is failing to establish.

Which of the following actions will resolve this issue?

Options:

A.

Ensure that an active static or dynamic route exists for the VPN peer with next hop as the tunnel interface.


B.

Configure the Proxy IDs to match the Cisco ASA configuration.


C.

Check that IPSec is enabled in the management profile on the external interface.


D.

Validate the tunnel interface VLAN against the peer’s configuration.


Expert Solution
Questions # 14:

During an upgrade to the routing infrastructure in a customer environment, the network administrator wants to implement Advanced Routing Engine (ARE) on a Palo Alto Networks firewall.

Which firewall models support this configuration?

Options:

A.

PA-5280, PA-7080, PA-3250, VM-Series


B.

PA-455, VM-Series, PA-1410, PA-5450


C.

PA-3260, PA-5410, PA-850, PA-460


D.

PA-7050, PA-1420, VM-Series, CN-Series


Expert Solution
Questions # 15:

An network engineer is configuring SSL Forward Proxy decryption on a Palo Alto Networks firewall. The company's internal clients trust a corporate root certificate authority (CA). To ensure the firewall can properly validate the certificates of external web servers, the engineer must configure a specific component. Which component defines the mechanism for Online Certificate Status Protocol (OCSP) / certificate revocation list (CRL) status?

Options:

A.

Certificate revocation checking


B.

SSL/TLS service profile


C.

Decryption profile


D.

Forward trust certificate


Expert Solution
Questions # 16:

When configuring a Zone Protection profile, in which section (protection type) would an NGFW engineer configure options to protect against activities such as spoofed IP addresses and split handshake session establishment attempts?

Options:

A.

Flood Protection


B.

Protocol Protection


C.

Packet-Based Attack Protection


D.

Reconnaissance Protection


Expert Solution
Questions # 17:

Which zone type allows traffic between zones in different virtual systems (VSYS), without the traffic leaving the firewall?

Options:

A.

Isolated


B.

Transient


C.

External


D.

Internal


Expert Solution
Questions # 18:

What is a valid configurable limit for setting resource quotas when defining a new VSYS on a Palo Alto Networks firewall?

Options:

A.

Percentage of total CPU utilization


B.

Maximum number of SSL decryption rules


C.

Maximum number of virtual routers


D.

Disk space allocation for logs


Expert Solution
Questions # 19:

A network security engineer needs to permit traffic between two distinct VSYS that reside on one Palo Alto Networks firewall. This traffic will not egress the firewall to an external device. Which zone type must be configured to act as the logical source and destination for this traffic flow?

Options:

A.

TAP


B.

Layer 2


C.

Layer 3


D.

External


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions