Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks NetSec-Analyst - Palo Alto Networks Network Security Analyst

Page: 2 / 3
Total 74 questions

An analyst wants to create a custom application for an internal tool that uses a specific proprietary protocol. Which information is required to ensure the firewall correctly identifies this application using App-ID?

A.

Source and Destination IP addresses.

B.

Signature patterns found in the packet payload.

C.

The URL category of the server.

D.

The MAC address of the server.

An organization needs to implement a security rule that allows users to access "Facebook" but prevents them from using "Facebook-Chat." What is the best way to achieve this?

A.

Create a URL Filtering profile to block the chat URL.

B.

Create a security rule allowing the "Facebook-base" App-ID and another rule blocking the "Facebook-chat" App-ID.

C.

Use an Application Override rule for Facebook traffic.

D.

Block the specific IP addresses used by Facebook Chat.

An analyst wants to allow users to visit "Social Networking" sites but prevent them from posting comments or uploading files. Which combination of Security Profile and Action is required?

A.

URL Filtering Profile set to "Alert" for the category.

B.

URL Filtering Profile using a "URL Filtering Override."

C.

URL Filtering Profile set to "Continue" for the category.

D.

URL Filtering Profile set to "Override" for HTTP Header Insertion.

An analyst determines that several sanctioned, predefined applications are being intermittently blocked, even though there is an existing policy permitting them. An investigation reveals that the applications are using non-standard ports, which is causing them to be blocked. The applications are critical for business operations, and the analyst has approval to allow them.

Which configuration adjustment should be implemented to ensure secure access to the applications?

A.

Apply Disable Server Response Inspection (DSRI) to the existing Security policy to allow the non-standard ports.

B.

Disable App-ID and port filtering and rely solely on IP addresses of the applications to allow the non-standard ports.

C.

Clone the existing Security policy rule and include the non-standard ports under services.

D.

Clone the existing Security policy rule and include unknown-tcp and unknown-udp applications with service set to “any”

Which tool should an analyst use to view a real-time, graphical representation of the top applications, users, and threats across the network to identify immediate anomalies?

A.

Log Viewer

B.

ACC (Application Command Center)

C.

Config Audit

D.

Policy Optimizer

A financial institution must comply with a regulation that prohibits the decryption of any traffic destined for "Banking" or "Healthcare" websites. How should the analyst implement this requirement while still decrypting other web traffic?

A.

Set the default Decryption Profile to "No-Decrypt."

B.

Create a Decryption Policy with the action "No Decrypt" and select the relevant URL categories.

C.

Add the banking URLs to the "External Dynamic List."

D.

Use a NAT policy to bypass the SSL engine for those categories.

An analyst is troubleshooting a policy that is not matching traffic as expected. After reviewing the logs, the analyst sees that the traffic is matching a rule with a lower priority. Which feature allows the analyst to compare two rules side-by-side to identify the conflict?

A.

Policy Optimizer

B.

Rule Comparison

C.

ACC (Application Command Center)

D.

Config Audit

Beyond being a SaaS-based delivery platform, what is an advantage of Strata Cloud Manager (SCM) over Panorama? (Choose one answer)

A.

Live, inline best practice checks

B.

Real-time alerting

C.

Customizable dashboards

D.

NGFW and Prisma Access management

Which log type should be checked first using Log Viewer when a user reports being unable to access a specific website?

A.

Firewall/URL

B.

Firewall/Traffic

C.

Firewall/Threat

D.

Firewall/DNS Security

A financial company is deploying NGFWs with the Advanced SD-WAN subscription to improve uptime and bandwidth across thousands of ATMs. The company requires that traffic flows to the internal application needed by the ATMs always use the path with the lowest latency and packet loss.

Which unique SD-WAN rule parameters meet this criteria?

A.

Application/Service: "Internal Application for ATMs" → Path Selection: "Best Available Path" in Traffic Distribution Profile.

B.

Application/Service: "Internal Application for ATMs" & "Management" in Path Quality Profile → Path Selection "Any."

C.

Application/Service: "Internal Application for ATMs" → Path Selection "Weighted Distribution" in Traffic Distribution Profile.

D.

Application/Service: "Internal Application for ATMs" & "ATM Path(Custom)" in Path Quality Profile → Path Selection "Any."