Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks NGFW-Engineer - Palo Alto Networks Next-Generation Firewall Engineer

Page: 1 / 2
Total 50 questions

Which statement describes the role of Terraform in deploying Palo Alto Networks NGFWs?

A.

It acts as a logging service for NGFW performance metrics.

B.

It orchestrates real-time traffic inspection for network segments.

C.

It provides Infrastructure-as-Code (IaC) to automate NGFW deployment.

D.

It manages threat intelligence data synchronization with NGFWs.

In an active/active high availability (HA) configuration with two PA-Series firewalls, how do the firewalls use the HA3 interface?

A.

To forward packets to the HA peer during session setup and asymmetric traffic flow

B.

To exchange hellos, heartbeats, HA state information, and management plane synchronization for routing and User-ID information

C.

To synchronize sessions, forwarding tables, IPSec security associations, and ARP tables between firewalls in an HA pair

D.

To perform session cache synchronization among all HA peers having the same cluster ID

In regard to the Advanced Routing Engine (ARE), what must be enabled first when configuring a logical router on a PAN-OS firewall?

A.

License

B.

Plugin

C.

Content update

D.

General setting

When integrating Kubernetes with Palo Alto Networks NGFWs, what is used to secure traffic between microservices?

A.

Service graph

B.

Ansible automation modules

C.

Panorama role-based access control

D.

CN-Series firewalls

Which two actions in the IKE Gateways will allow implementation of post-quantum cryptography when building VPNs between multiple Palo Alto Networks NGFWs? (Choose two.)

A.

Select IKE v2, enable the Advanced Options • PQ PPK, then set a 64+ character string for the post-quantum pre shared key.

B.

Ensure Authentication is set to “certificate,” then import a post-quantum derived certificate.

C.

Select IKE v2 Preferred, enable the Advanced Options • PQ KEM, then add one or more “Rounds.”

D.

Select IKE v2, enable the Advanced Options • PQ KEM, then create an IKE Crypto Profile with Advanced Options adding one or more “Rounds.”

After an engineer configures an IPSec tunnel with a Cisco ASA, the Palo Alto Networks firewall generates system messages reporting the tunnel is failing to establish.

Which of the following actions will resolve this issue?

A.

Ensure that an active static or dynamic route exists for the VPN peer with next hop as the tunnel interface.

B.

Configure the Proxy IDs to match the Cisco ASA configuration.

C.

Check that IPSec is enabled in the management profile on the external interface.

D.

Validate the tunnel interface VLAN against the peer’s configuration.

A multinational organization wants to use the Cloud Identity Engine (CIE) to aggregate identity data from multiple sources (on premises AD, Azure AD, Okta) while enforcing strict data isolation for different regional business units. Each region’s firewalls, managed via Panorama, must only receive the user and group information relevant to that region. The organization aims to minimize administrative overhead while meeting data sovereignty requirements.

Which approach achieves this segmentation of identity data?

A.

Create one CIE tenant, aggregate all identity data into a single view, and redistribute the full dataset to all firewalls. Rely on per-firewall Security policies to restrict access to out-of-scope user and group information.

B.

Establish separate CIE tenants for each business unit, integrating each tenant with the relevant identity sources. Redistribute user and group data from each tenant only to the region’s firewalls, maintaining a strict one-to-one mapping of tenant to business unit.

C.

Disable redistribution of identity data entirely. Instead, configure each regional firewall to pull user and group details directly from its local identity providers (IdPs).

D.

Deploy a single CIE tenant that collects all identity data, then configure segments within the tenant to filter and redistribute only the relevant user/group sets to each regional firewall group.

Which zone type allows traffic between zones in different virtual systems (VSYS), without the traffic leaving the firewall?

A.

Isolated

B.

Transient

C.

External

D.

Internal

An organization has configured GlobalProtect in a hybrid authentication model using both certificate-based authentication for the pre-logon stage and SAML-based multi-factor authentication (MFA) for user logon.

How does the GlobalProtect agent process the authentication flow on Windows endpoints?

A.

The GlobalProtect agent uses the machine certificate to establish a pre-logon tunnel; upon user sign-in, it prompts for SAML-based MFA credentials, ensuring both device and user identities are validated before granting full access.

B.

The GlobalProtect agent uses the machine certificate during pre-logon for initial tunnel establishment, and then seamlessly reuses the same machine certificate for user-based authentication without requiring MFA.

C.

Once the machine certificate is validated at pre-logon, the Windows endpoint completes MFA on behalf of the user by passing existing Windows Credential Provider details to the GlobalProtect gateway without prompting the user.

D.

GlobalProtect requires the user to log in first for SAML-based MFA before establishing the pre-logon tunnel, rendering the pre-logon certificate authentication (CA) flow redundant.

Which two statements apply to configuring required security rules when setting up an IPSec tunnel between a Palo Alto Networks firewall and a third- party gateway? (Choose two.)

A.

For incoming and outgoing traffic through the tunnel, creating separate rules for each direction is optional.

B.

The IKE negotiation and IPSec/ESP packets are allowed by default via the intrazone default allow policy.

C.

For incoming and outgoing traffic through the tunnel, separate rules must be created for each direction.

D.

The IKE negotiation and IPSec/ESP packets are denied by default via the interzone default deny policy.