Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks NetSec-Generalist - Palo Alto Networks Network Security Generalist

Which subscription sends non-file format-based traffic that matches Data Filtering Profile criteria to a cloud service to render a verdict?

Enterprise DLP

A.

SaaS Security Inline

B.

Advanced URL Filtering

C.

Advanced WildFire

In which mode should an ION device be configured at a newly acquired site to allow site traffic to be audited without steering traffic?

A.

Access

B.

Control

C.

Disabled

D.

Analytics

After a Best Practice Assessment (BPA) is complete, it is determined that dynamic updates for Cloud-Delivered Security Services (CDSS) used by company branch offices do not match recommendations. The snippet used for dynamic updates is currently set to download and install updates weekly.

Knowing these devices have the Precision Al bundle, which two statements describe how the settings need to be adjusted in the snippet? (Choose two.)

A.

Applications and threats should be updated daily.

B.

Antivirus should be updated daily.

C.

WildFire shouldbe updated every five minutes.

D.

URL filtering should be updated hourly.

A company currently uses Prisma Access for its mobile users. A use case is discovered in which mobile users will need to access an internal site, but there is no existing network communication between the mobile users and the internal site.

Which Prisma Access functionality needs to be deployed to enable routing between the mobile users and the internal site?

A.

Interconnect license

B.

Service connection

C.

Autonomous Digital Experience Manager (ADEM)

D.

Security processing node

Which two cloud deployment high availability (HA) options would cause a firewall administrator to use Cloud NGFW? (Choose two.)

A.

Automated autoscaling

B.

Terraform to automate HA

C.

Dedicated vNIC for HA

D.

Deployed with load balancers

What is the main security benefit of adding a CN-Series firewall to an existing VM-Series firewall deployment when the customer is using containers?

A.

It provides perimeter threat detection and inspection outside the container itself.

B.

It prevents lateral threat movement within the container itself.

C.

It monitors and logs traffic outside the container itself.

D.

It enables core zone segmentation within the container itself.

Which zone is available for use in Prisma Access?

A.

DMZ

B.

Interzone

C.

Intrazone

D.

Clientless VPN

A company uses Prisma Access to provide secure connectivity for mobile users to access its corporate-sanctioned Google Workspace and wants to block access to all unsanctioned Google Workspace environments.

What would an administrator configure in the snippet to achieve this goal?

A.

Dynamic Address Groups

B.

Tenant restrictions

C.

Dynamic User Groups

D.

URL category

In conjunction with Advanced URL Filtering, which feature can be enabled after usemame-to-IP mapping is set up?

A.

Host information profile (HIP)

B.

Credential phishing prevention

C.

Client probing

D.

Indexed data matching

A hospital system allows mobile medical imaging trailers to connect directly to the internal network of its various campuses. The network security team is concerned about this direct connection and wants to begin implementing a Zero Trust approach in the flat network.

Which solution provides cost-effective network segmentation and security enforcement in this scenario?

A.

Deploy edge firewalls at each campus entry point to monitor and control various traffic types through direct connection with the trailers.

B.

Manually inspect large images like holograms and MRIs, but permit smaller images to pass freely through the campus core firewalls.

C.

Configure separate zones to isolate the imaging trailer's traffic and apply enforcement using the existing campus core firewalls.

D.

Configure access control lists on the campus core switches to control and inspect traffic based on image size, type, and frequency.