Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks NetSec-Analyst - Palo Alto Networks Network Security Analyst

Page: 1 / 3
Total 74 questions

An organization uses several different web-conferencing tools (Zoom, Microsoft Teams, WebEx). The analyst wants to create a single security rule to allow all these tools without listing each App-ID individually. What should the analyst create?

A.

Application Filter

B.

Application Group

C.

Service Group

D.

Custom App-ID

Which object allows an analyst to group different applications together based on a specific business function, such as "Social-Media" or "Collaboration," to simplify policy management?

A.

Application Group

B.

Application Filter

C.

Service Group

D.

Custom URL Category

A security analyst is using the Strata Cloud Manager (SCM) Policy Optimizer to create specific and focused rules. The analyst accepts the new rules from Policy Optimizer and updates the rule base, but the traffic does not hit these new rules.

Which action needs to be taken to resolve this issue?

A.

Execute a push configuration

B.

Remove the original Security policy rule

C.

Enable the newly created Security policy rules

D.

Perform a commit

What is the function of a "Service" object in a Palo Alto Networks firewall configuration?

A.

To define the Layer 7 App-ID signatures.

B.

To define the Layer 4 protocol (TCP/UDP) and port numbers.

C.

To specify the URL categories to be blocked.

D.

To set the QoS priority for specific traffic.

To comply with new regulations, a company requires all traffic logs related to the "HR-App" application across all Security policies be sent to a compliance syslog server. A Log Forwarding profile already exists to send logs to a default syslog server.

What is the most efficient process for configuring an NGFW to comply with the new regulations without disrupting existing traffic logs being sent to the default syslog server?

A.

Edit the existing Log Forwarding profile by adding a new match list consisting of Log Forwarding filter for the application named "HR-App" to direct logs to the compliance syslog server.

B.

Create a new Log Forwarding profile, update the profile with the details of the compliance syslog server and attach the profile to the relevant Security policy rule.

C.

Edit the existing Log Forwarding profile, add a new entry, use the filter builder to match on application "HR-App," and add the details for the compliance syslog server.

D.

Create a Log Forwarding profile and enable the predefined filter for "Application" In the associated dropdown, select or create a new application object with the name "HR-App," and add the details for the compliance syslog server.

In a Zero Trust environment, why is it recommended to use "User-ID" instead of just IP addresses in Security policy rules?

A.

To allow the firewall to perform hardware-level decryption.

B.

IP addresses are dynamic and do not provide persistent identity in modern networks.

C.

User-ID is required to enable the "application-default" service setting.

D.

Using User-ID reduces the CPU load on the Management Plane.

A security administrator is creating an internet of things (IoT) Security policy and needs to select behaviors for the traffic.

Which characteristic has the greatest impact to the risk level of applications?

A.

Used by Malware

B.

Pervasive

C.

Tunnels Other Apps

D.

Known Vulnerabilities

An analyst needs to create a rule that allows a specific group of users to access a cloud application. The application's IP addresses change frequently, but the application is associated with a specific FQDN. What is the most efficient object type to use in this scenario?

A.

Static Address Object

B.

FQDN Address Object

C.

Range Address Object

D.

IP Multicast Object

A company wants to ensure that its internal web server is only accessible from the internet on port 443, but the server is actually listening on port 8443. Which NAT configuration should be used?

A.

Source NAT with Static IP translation.

B.

Destination NAT with Port Translation.

C.

Bi-directional NAT with Dynamic IP and Port.

D.

Hide NAT with Overload.

An analyst notices an unusual amount of bandwidth being consumed by "web-browsing" traffic. Which ACC tab provides a breakdown of which specific URLs and URL Categories are responsible for this bandwidth usage?

A.

Network Activity

B.

Threat Activity

C.

Blocked Activity

D.

SSL Activity