Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > Network Security Administrator > NetSec-Pro

NetSec-Pro Palo Alto Networks Network Security Professional Question and Answers

Question # 4

A network security engineer wants to forward Strata Logging Service data to tools used by the Security Operations Center (SOC) for further investigation. In which best practice step of Palo Alto Networks Zero Trust does this fit?

A.

Map and Verify Transactions

B.

Implementation

C.

Standards and Designs

D.

Report and Maintenance

Full Access
Question # 5

Which AI-powered solution provides unified management and operations for NGFWs and Prisma Access?

A.

Strata Cloud Manager (SCM)

B.

Autonomous Digital Experience Manager (ADEM)

C.

Prisma Access Browser

D.

Panorama

Full Access
Question # 6

During a security incident investigation, which Security profile will have logs of attempted confidential data exfiltration?

A.

File Blocking Profile

B.

Enterprise DLP Profile

C.

Vulnerability Protection Profile

D.

WildFire Analysis Profile

Full Access
Question # 7

An administrator wants to implement additional Cloud-Delivered Security Services (CDSS) on a data center NGFW that already has one enabled. What benefit does the NGFW’s single-pass parallel processing (SP3) architecture provide?

A.

It allows for traffic inspection at the application level.

B.

There will be no additional performance degradation.

C.

There will be only a minor reduction in performance.

D.

It allows additional security inspection devices to be added inline.

Full Access
Question # 8

Which feature of SaaS Security will allow a firewall administrator to identify unknown SaaS applications in an environment?

A.

App-ID Cloud Engine

B.

App-ID

C.

SaaS Data Security

D.

Cloud Identity Engine

Full Access
Question # 9

Which two tools can be used to configure Cloud NGFWs for AWS? (Choose two.)

A.

Cortex XSIAM

B.

Prisma Cloud management console

C.

Panorama

D.

Cloud service provider's management console

Full Access
Question # 10

A network security engineer has created a Security policy in Prisma Access that includes a negated region in the source address. Which configuration will ensure there is no connectivity loss due to the negated region?

A.

Set the service to be application-default.

B.

Create a Security policy for the negated region with destination address “any”.

C.

Add a Dynamic Application Group to the Security policy.

D.

Add all regions that contain private IP addresses to the source address.

Full Access
Question # 11

A company has an ongoing initiative to monitor and control IT-sanctioned SaaS applications. To be successful, it will require configuration of decryption policies, along with data filtering and URL Filtering Profiles used in Security policies. Based on the need to decrypt SaaS applications, which two steps are appropriate to ensure success? (Choose two.)

A.

Configure SSL Forward Proxy.

B.

Validate which certificates will be used to establish trust.

C.

Configure SSL Inbound Inspection.

D.

Create new self-signed certificates to use for decryption.

Full Access
Question # 12

Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)

A.

App-ID

B.

Service

C.

User-ID

D.

Schedule

Full Access
Question # 13

Which GlobalProtect configuration is recommended for granular security enforcement of remote user device posture?

A.

Configuring host information profile (HIP) checks for all mobile users

B.

Configuring a rule that blocks the ability of users to disable GlobalProtect while accessing internal applications

C.

Implementing multi-factor authentication (MFA) for all users attempting to access internal applications

D.

Applying log at session end to all GlobalProtect Security policies

Full Access
Question # 14

Which security profile provides real-time protection against threat actors who exploit the misconfigurations of DNS infrastructure and redirect traffic to malicious domains?

A.

Antivirus

B.

URL Filtering

C.

Vulnerability Protection

D.

Anti-spyware

Full Access
Question # 15

How does a firewall behave when SSL Inbound Inspection is enabled?

A.

It acts transparently between the client and the internal server.

B.

It decrypts inbound and outbound SSH connections.

C.

It decrypts traffic between the client and the external server.

D.

It acts as meddler-in-the-middle between the client and the internal server.

Full Access
Question # 16

In a Prisma SD-WAN environment experiencing voice quality degradation, which initial action is recommended?

A.

Immediately modify path quality thresholds.

B.

Review real-time analytics of path performance.

C.

Switch all VoIP traffic to backup paths.

D.

Request an RMA of the ION devices.

Full Access
Question # 17

How can a firewall administrator block a list of 300 unique URLs in the most time-efficient manner?

A.

Use application filters to block the App-IDs.

B.

Use application groups to block the App-IDs.

C.

Import the list into a custom URL category.

D.

Block multiple predefined URL categories.

Full Access
Question # 18

A cloud security architect is designing a certificate management strategy for Strata Cloud Manager (SCM) across hybrid environments. Which practice ensures optimal security with low management overhead?

A.

Deploy centralized certificate automation with standardized protocols and continuous monitoring.

B.

Implement separate certificate authorities with independent validation rules for each cloud environment.

C.

Configure manual certificate deployment with quarterly reviews and environment-specific security protocols.

D.

Use cloud provider default certificates with scheduled synchronization and localized renewal processes.

Full Access