Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > Network Security Administrator > NetSec-Analyst

NetSec-Analyst Palo Alto Networks Network Security Analyst Question and Answers

Question # 4

An analyst needs to configure a NAT policy to allow internal users to access the internet. The company only has one public IP address available on the firewall's outside interface. Which NAT type should be used?

A.

Static IP

B.

Dynamic IP

C.

Dynamic IP and Port (DIPP)

D.

Bi-directional NAT

Full Access
Question # 5

An analyst determines that several sanctioned, predefined applications are being intermittently blocked, even though there is an existing policy permitting them. An investigation reveals that the applications are using non-standard ports, which is causing them to be blocked. The applications are critical for business operations, and the analyst has approval to allow them.

Which configuration adjustment should be implemented to ensure secure access to the applications?

A.

Apply Disable Server Response Inspection (DSRI) to the existing Security policy to allow the non-standard ports.

B.

Disable App-ID and port filtering and rely solely on IP addresses of the applications to allow the non-standard ports.

C.

Clone the existing Security policy rule and include the non-standard ports under services.

D.

Clone the existing Security policy rule and include unknown-tcp and unknown-udp applications with service set to “any”

Full Access
Question # 6

An analyst is configuring a security policy to allow an application that uses a dynamic range of ports. Instead of opening a wide range of ports, which Palo Alto Networks feature should be leveraged to identify the application based on its unique payload?

A.

Service Objects

B.

App-ID

C.

Custom URL Categories

D.

Dynamic Address Groups

Full Access
Question # 7

An analyst is configuring an Anti-Spyware profile to identify infected internal hosts that are attempting to contact known malicious Command and Control (C2) servers. Which feature should be enabled to redirect these malicious DNS queries to a controlled internal IP address for forensic analysis?

A.

DNS Security

B.

DNS Sinkhole

C.

DNS Proxy

D.

Domain Generation Algorithm (DGA) Protection

Full Access
Question # 8

Which feature allows the firewall to automatically identify and categorize IoT (Internet of Things) devices based on their unique network behavior?

A.

Device-ID

B.

App-ID

C.

User-ID

D.

IoT Security Subscription

Full Access
Question # 9

An analyst wants to allow users to visit "Social Networking" sites but prevent them from posting comments or uploading files. Which combination of Security Profile and Action is required?

A.

URL Filtering Profile set to "Alert" for the category.

B.

URL Filtering Profile using a "URL Filtering Override."

C.

URL Filtering Profile set to "Continue" for the category.

D.

URL Filtering Profile set to "Override" for HTTP Header Insertion.

Full Access
Question # 10

A firewall is showing high "Packet Buffer" utilization, causing network latency. Which type of traffic is most likely to cause this issue if it is not correctly managed?

A.

Small UDP DNS queries.

B.

Large, high-throughput file transfers (Elephant Flows).

C.

Management plane API calls.

D.

ICMP keep-alive packets.

Full Access
Question # 11

How often should external dynamic lists be updated to ensure effective Security policy enforcement?

A.

Once a week

B.

As new threats are identified

C.

Once a month

D.

As frequently as the external source updates

Full Access
Question # 12

An organization wants to decrypt outbound traffic to ensure no malware is hidden in HTTPS sessions. Which type of decryption policy must be configured on the firewall to act as a "Man-in-the-Middle"?

A.

SSL Inbound Inspection

B.

SSH Proxy

C.

SSL Forward Proxy

D.

Decryption Broker

Full Access
Question # 13

A company wants to implement a security policy that only allows "web-browsing" if it is initiated by an authorized user. If the user is not identified, they should be prompted to authenticate via a web portal. Which policy type must be configured to trigger this portal?

A.

Security Policy

B.

Authentication Policy

C.

Decryption Policy

D.

NAT Policy

Full Access
Question # 14

A security analyst is using the Strata Cloud Manager (SCM) Policy Optimizer to create specific and focused rules. The analyst accepts the new rules from Policy Optimizer and updates the rule base, but the traffic does not hit these new rules.

Which action needs to be taken to resolve this issue?

A.

Execute a push configuration

B.

Remove the original Security policy rule

C.

Enable the newly created Security policy rules

D.

Perform a commit

Full Access
Question # 15

Which tool should an analyst use to view a real-time, graphical representation of the top applications, users, and threats across the network to identify immediate anomalies?

A.

Log Viewer

B.

ACC (Application Command Center)

C.

Config Audit

D.

Policy Optimizer

Full Access
Question # 16

DNS rewrite can only be configured on a NAT rule with which type of destination address translation?

A.

Dynamic IP and Port (DIPP)

B.

Dynamic IP (with session distribution)

C.

Static IP

D.

Dynamic IP

Full Access
Question # 17

A company requires that all encrypted traffic from the "Accounting" department be decrypted for inspection, while all other departments remain encrypted. How should the analyst configure the Decryption Policy?

A.

Create a single rule with "Source Zone" set to Accounting and "Action" to Decrypt.

B.

Create a "No Decrypt" rule for all zones except Accounting.

C.

Use "User-ID" in the Decryption Policy to target only members of the Accounting group.

D.

Apply a decryption profile to the Accounting Security Policy rule.

Full Access
Question # 18

Which type of object should be used to ensure that a Security policy rule automatically updates when a new virtual machine is spun up in a public cloud environment and assigned a specific tag?

A.

External Dynamic List (EDL)

B.

Dynamic Address Group (DAG)

C.

Static Address Group

D.

Application Filter

Full Access
Question # 19

When using Strata Cloud Manager (SCM), which tool allows an analyst to automatically migrate local firewall configurations to a centralized management folder?

A.

Strata Cloud Manager Transition

B.

Policy Optimizer

C.

Config Audit

D.

Template Variable

Full Access
Question # 20

A company wants to ensure that its internal web server is only accessible from the internet on port 443, but the server is actually listening on port 8443. Which NAT configuration should be used?

A.

Source NAT with Static IP translation.

B.

Destination NAT with Port Translation.

C.

Bi-directional NAT with Dynamic IP and Port.

D.

Hide NAT with Overload.

Full Access
Question # 21

There are intermittent connectivity issues between two internal zones on a PA-Series firewall. Although the Security policies appear correctly configured, traffic between the zones is experiencing unexpected drops. Which troubleshooting step will isolate the root cause of this behavior?

A.

Use the CLI command tcpdump filter and set the source and destination zones in the filter to capture and analyze traffic flows between zones, checking for packet loss on the data plane.

B.

Use the CLI command show system info to monitor CPU and memory usage, ensuring that resource constraints are not causing interfaces to drop packets between zones.

C.

Use the PAN-OS GUI Troubleshooting tool to review interface status, verify zone assignments, and confirm that all links are operational.

D.

Use the CLI command show system state filter sys.sl.* | match Error to find interface errors across all the interfaces.

Full Access
Question # 22

A company wants to ensure that any file uploaded to a specific cloud storage provider is immediately analyzed for malware, even if the file has never been seen before. Which action should be set in the WildFire Analysis Profile?

A.

Alert

B.

Block

C.

Continue

D.

Forward

Full Access