Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Paloalto Networks > Network Security Administrator > NGFW-Engineer

NGFW-Engineer Palo Alto Networks Next-Generation Firewall Engineer Question and Answers

Question # 4

What are the phases of the Palo Alto Networks AI Runtime Security: Network Intercept solution?

A.

Scanning, Isolation, Whitelisting, Logging

B.

Discovery, Deployment, Detection, Prevention

C.

Policy Generation, Discovery, Enforcement, Logging

D.

Profiling, Policy Generation, Enforcement, Reporting

Full Access
Question # 5

What is a result of enabling split tunneling in the GlobalProtect portal configuration with the “Both Network Traffic and DNS” option?

A.

It specifies when the secondary DNS server is used for resolution to allow access to specific domains that are not managed by the VPN.

B.

It allows users to access internal resources when connected locally and external resources when connected remotely using the same FQDN.

C.

lt allows devices on a local network to access blocked websites by changing which DNS server resolves certain domain names.

D.

It specifies which domains are resolved by the VPN-assigned DNS servers and which domains are resolved by the local DNS servers.

Full Access
Question # 6

Which two statements apply to configuring required security rules when setting up an IPSec tunnel between a Palo Alto Networks firewall and a third- party gateway? (Choose two.)

A.

For incoming and outgoing traffic through the tunnel, creating separate rules for each direction is optional.

B.

The IKE negotiation and IPSec/ESP packets are allowed by default via the intrazone default allow policy.

C.

For incoming and outgoing traffic through the tunnel, separate rules must be created for each direction.

D.

The IKE negotiation and IPSec/ESP packets are denied by default via the interzone default deny policy.

Full Access
Question # 7

When deploying Palo Alto Networks NGFWs in a cloud service provider (CSP) environment, which method ensures high availability (HA) across multiple availability zones?

A.

Deploying Ansible scripts for zone-specific scaling

B.

Implementing Terraform templates for redundancy within one availability zone

C.

Using load balancer and health probes

D.

Configuring active/active HA

Full Access
Question # 8

In a Palo Alto Networks environment, GlobalProtect has been enabled using certificate-based authentication for both users and devices. To ensure proper validation of certificates, one or more certificate profiles are configured.

What function do certificate profiles serve in this context?

A.

They store private keys for users and devices, effectively allowing the firewall to issue or reissue certificates if the primary Certificate Authority (CA) becomes unavailable, providing a built-in fallback CA to maintain continuous certificate issuance and authentication.

B.

They define trust anchors (root / intermediate Certificate Authorities (CAs)), specify revocation checks (CRL/OCSP), and map certificate attributes (e.g., CN) for user or device authentication.

C.

They allow the firewall to bypass certificate validation entirely, focusing only on username / password-based authentication.

D.

They provide a one-click mechanism to distribute certificates to all endpoints without relying on external enrollment methods.

Full Access
Question # 9

An network engineer is configuring SSL Forward Proxy decryption on a Palo Alto Networks firewall. The company's internal clients trust a corporate root certificate authority (CA). To ensure the firewall can properly validate the certificates of external web servers, the engineer must configure a specific component. Which component defines the mechanism for Online Certificate Status Protocol (OCSP) / certificate revocation list (CRL) status?

A.

Certificate revocation checking

B.

SSL/TLS service profile

C.

Decryption profile

D.

Forward trust certificate

Full Access
Question # 10

Which statement applies to the relationship between Panorama-pushed Security policy and local firewall Security policy?

A.

When a policy match is found in a local firewall policy, if any Panorama shared post-rule is configured, it will still be evaluated.

B.

Local firewall rules are evaluated after Panorama pre-rules and before Panorama post-rules.

C.

Panorama post-rules can be configured to be evaluated before local firewall policy for the purpose of troubleshooting.

D.

The order of policy evaluation can be configured differently in different device groups.

Full Access
Question # 11

Which interface types should be used to configure link monitoring for a high availability (HA) deployment on a Palo Alto Networks NGFW?

A.

HA, Virtual Wire, and Layer 2

B.

Tap, Virtual Wire, and Layer 3

C.

Virtual Wire, Layer 2, and Layer 3

D.

HA, Layer 2. and Layer 3

Full Access
Question # 12

An engineer is troubleshooting a failed inter-VSYS communication path between a DMZ-VSYS and an Internal-VSYS. The configuration includes separate virtual routers with next-vr static routes and appropriate Security policies within each VSYS allowing traffic to and from their external zones. Given that all routing and policy configurations within each individual VSYS are correct, what is the probable cause of the failure?

A.

The intrazone-default policy is blocking the traffic because the two external zones are logically connected.

B.

A tunnel interface is required to connect the two virtual routers instead of using the next-vr option.

C.

The administrator did not configure Visible Virtual System.

D.

The external zones were not assigned the External zone type, preventing them from connecting.

Full Access
Question # 13

Which set of options is available for detailed logs when building a custom report on a Palo Alto Networks NGFW?

A.

Traffic, User-ID, URL

B.

Traffic, threat, data filtering, User-ID

C.

GlobalProtect, traffic, application statistics

D.

Threat, GlobalProtect, application statistics, WildFire submissions

Full Access
Question # 14

According to dynamic updates best practices, what is the recommended threshold value for content updates in a mission- critical network?

A.

8 hours

B.

16 hours

C.

32 hours

D.

48 hours

Full Access
Question # 15

During an upgrade to the routing infrastructure in a customer environment, the network administrator wants to implement Advanced Routing Engine (ARE) on a Palo Alto Networks firewall.

Which firewall models support this configuration?

A.

PA-5280, PA-7080, PA-3250, VM-Series

B.

PA-455, VM-Series, PA-1410, PA-5450

C.

PA-3260, PA-5410, PA-850, PA-460

D.

PA-7050, PA-1420, VM-Series, CN-Series

Full Access
Question # 16

An administrator needs to perform several maintenance tasks on a managed firewall directly from the Panorama console, without using the Context Switch feature. Which set of tasks can the administrator fully execute from the Panorama UI? (Choose one answer)

A.

Download and install a new content update. View current firewall session details. Initiate a device reboot.

B.

Create a new zone. Configure a new virtual router. View the local ACC on the firewall.

C.

Edit a post-rule. Create a new certificate profile. Configure the firewall's hostname.

D.

Modify the IP address of a Layer 3 interface. Configure a new local administrator account. Edit a pre-rule.

Full Access
Question # 17

What must be configured before a firewall administrator can define policy rules based on users and groups?

A.

User Mapping profile

B.

Authentication profile

C.

Group mapping settings

D.

LDAP Server profile

Full Access
Question # 18

An NGFW engineer is configuring multiple Layer 2 interfaces on a Palo Alto Networks firewall, and all interfaces must be assigned to the same VLAN. During initial testing, it is reported that clients located behind the various interfaces cannot communicate with each other.

Which action taken by the engineer will resolve this issue?

A.

Configure each interface to belong to the same Layer 2 zone and enable IP routing between them.

B.

Assign each interface to the appropriate Layer 2 zone and configure a policy that allows traffic within the VLAN.

C.

Assign each interface to the appropriate Layer 2 zone and configure Security policies for interfaces not assigned to the same zone.

D.

Enable IP routing between the interfaces and configure a Security policy to allow traffic between interfaces within the VLAN.

Full Access