Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks NetSec-Generalist - Palo Alto Networks Network Security Generalist

Which Security profile should be queried when investigating logs for upload attempts that were recently blocked due to sensitive information leaks?

A.

Anti-spyware

B.

Data Filtering

C.

Antivirus

D.

URL Filtering

All branch sites in an organization have NGFWs running in production, and the organization wants to centralize its logs with Strata Logging Service.

Which type of certificate is required to ensure connectivity from the NGFWs to Strata Logging Service?

A.

Device

B.

Server

C.

Root

D.

Intermediate CA

How does Panorama improve reporting capabilities of an organization's next-generation firewall deployment?

A.

By aggregating and analyzing logs from multiple firewalls

B.

By automating all Security policy creations for multiple firewalls

C.

By pushing out all firewall policies from a single physical appliance

D.

By replacing the need forindividual firewall deployment

Which network design for internet of things (loT) Security allows traffic mirroring from the switch to a TAP interface on the firewall to monitor traffic not otherwise seen?

A.

DHCP server on firewall

B.

Firewall as DHCP relay

C.

Firewall in DHCP path

D.

Firewall outside DHCP path

A security administrator is adding a new sanctioned cloud application to SaaS Data Security.

After authentication, how does the tool gain API access for monitoring?

A.

It transmits the configured SAML user profile to the cloud application for security event attribution.

B.

It establishes an encrypted key pair with the cloud application to safely transmit user data.

C.

It generates a certificate and sends it to the cloud application for TLS decryption and inspection.

D.

It receives a token from the cloud application for establishing and maintaining a secure connection.

Which two policies in Strata Cloud Manager (SCM) will ensure the personal data of employees remains private while enabling decryption for mobile users in Prisma Access? (Choose two.)

A.

SSH Decryption

B.

SSL Inbound Inspection

C.

SSL Forward Proxy

D.

No Decryption

Which action in the Customer Support Portal is required to generate authorization codes for Software NGFWs?

A.

Download authorization codes from the public cloud marketplace.

B.

Create a deployment profile.

C.

Use the Enterprise Support Agreement (ESA) authorization code.

D.

Register the device with the cloud service provider.

How many places will a firewall administrator need to create and configure a custom data loss prevention (DLP) profile across Prisma Access and the NGFW?

A.

One

B.

Two

C.

Three

D.

Four