Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks NetSec-Pro - Palo Alto Networks Network Security Professional

Page: 1 / 2
Total 60 questions

A network administrator obtains Palo Alto Networks Advanced Threat Prevention and Advanced DNS Security subscriptions for edge NGFWs and is setting up security profiles. Which step should be included in the initial configuration of the Advanced DNS Security service?

A.

Create a decryption policy rule to decrypt DNS-over-TLS / port 853 traffic.

B.

Create overrides for all company owned FQDNs.

C.

Configure DNS Security signature policy settings to sinkhole malicious DNS queries.

D.

Enable Advanced Threat Prevention with default settings and only focus on high-risk traffic.

Which firewall attribute can an engineer use to simplify rule creation and automatically adapt to changes in server roles or security posture based on log events?

A.

Address objects

B.

Dynamic Address Groups

C.

Dynamic User Groups

D.

Predefined IP addresses

How does Strata Logging Service help resolve ever-increasing log retention needs for a company using Prisma Access?

A.

It increases resilience due to decentralized collection and storage of logs.

B.

Automatic selection of physical data storage regions decreases adoption time.

C.

It can scale to meet the capacity needs of new locations as business grows.

D.

Log traffic using the licensed bandwidth purchased for Prisma Access reduces overhead.

Which action optimizes user experience across a segmented network architecture and implements the most effective method to maintain secure connectivity between branch and campus locations?

A.

Establish site-to-site tunnels on each branch and campus firewall and have individual VLANs for each department.

B.

Configure all branch and campus firewalls to use a single shared broadcast domain.

C.

Implement SD-WAN to route all traffic based on network performance metrics and use zone protection profiles.

D.

Configure a single campus firewall to handle the routing of all branch traffic.

Which NGFW function can be used to enhance visibility, protect, block, and log the use of Post-quantum Cryptography (PQC)?

A.

DNS Security profile

B.

Decryption policy

C.

Security policy

D.

Decryption profile

Which procedure is most effective for maintaining continuity and security during a Prisma Access data plane software upgrade?

A.

Back up configurations, schedule upgrades during off-peak hours, and use a phased approach rather than attempting a network-wide rollout.

B.

Use Strata Cloud Manager (SCM) to perform dynamic upgrades automatically and simultaneously across all locations at once to ensure network-wide uniformity.

C.

Disable all security features during the upgrade to prevent conflicts and re-enable them after completion to ensure a smooth rollout process.

D.

Perform the upgrade during peak business hours, quickly address any user-reported issues, and ensure immediate troubleshooting post-rollout.

Which method in the WildFire analysis report detonates unknown submissions to provide visibility into real-world effects and behavior?

A.

Dynamic analysis

B.

Static analysis

C.

Intelligent Run-time Memory Analysis

D.

Machine learning (ML)

Which two tools can be used to configure Cloud NGFWs for AWS? (Choose two.)

A.

Cortex XSIAM

B.

Prisma Cloud management console

C.

Panorama

D.

Cloud service provider's management console

In a distributed enterprise implementing Prisma SD-WAN, which configuration element should be implemented first to ensure optimal traffic flow between remote sites and headquarters?

A.

Deploy redundant ION devices at each location.

B.

Implement dynamic path selection using real-time performance metrics.

C.

Configure static routes between all the branch offices.

D.

Enable split tunneling for all branch locations.

A network engineer pushes specific Panorama reports of new AI URL category types to branch NGFWs. Which two report types achieve this goal? (Choose two.)

A.

SNMP

B.

Custom

C.

PDF summary

D.

CSV export