Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Paloalto Networks NetSec-Analyst Dumps

Palo Alto Networks Network Security Analyst Questions and Answers

Question 1

When performing a "Push to Devices" from Panorama, an analyst wants to ensure that the push only affects a specific firewall in a shared Device Group. Which option in the push window allows this granular selection?

Options:

A.

Include Device and Network Templates

B.

Force Template Values

C.

Edit Selections

D.

Merge with Device Candidate Config

Question 2

A security administrator needs to block access to a specific list of 500 malicious domains. These domains are updated daily by a third-party intelligence feed. What is the most efficient way to manage these domains as an object?

Options:

A.

Create a Custom URL Category and manually paste the domains daily.

B.

Create an External Dynamic List (EDL) of type "Domain."

C.

Create a Domain-based FQDN Address Group.

D.

Add the domains to the "Block List" of a URL Filtering profile.

Question 3

An organization needs to implement a security rule that allows users to access "Facebook" but prevents them from using "Facebook-Chat." What is the best way to achieve this?

Options:

A.

Create a URL Filtering profile to block the chat URL.

B.

Create a security rule allowing the "Facebook-base" App-ID and another rule blocking the "Facebook-chat" App-ID.

C.

Use an Application Override rule for Facebook traffic.

D.

Block the specific IP addresses used by Facebook Chat.

Question 4

Which Strata Cloud Manager (SCM) feature provides a consolidated view of all high-priority security incidents across a global network, including those from firewalls and Prisma Access?

Options:

A.

Activity Insights

B.

Command Center

C.

Policy Optimizer

D.

Device Health Dashboard

Question 5

Which feature allows the firewall to automatically identify and categorize IoT (Internet of Things) devices based on their unique network behavior?

Options:

A.

Device-ID

B.

App-ID

C.

User-ID

D.

IoT Security Subscription

Question 6

A user reports that they can reach a website, but the page elements are not loading correctly. The analyst suspects that a security profile is silently dropping some of the web content. Which log, when filtered by the user's IP, will show the specific Content-ID match that is causing the partial page failure?

Options:

A.

Traffic Log

B.

Threat Log

C.

URL Filtering Log

D.

Data Filtering Log

Question 7

What is a primary benefit of using "Templates" within Panorama or Strata Cloud Manager?

Options:

A.

To group firewalls based on their physical location.

B.

To manage Layer 2 and Layer 3 network configurations across multiple devices.

C.

To synchronize Security policy rules between firewalls.

D.

To automate the backup of firewall configurations.

Question 8

When using Strata Cloud Manager (SCM), which tool allows an analyst to automatically migrate local firewall configurations to a centralized management folder?

Options:

A.

Strata Cloud Manager Transition

B.

Policy Optimizer

C.

Config Audit

D.

Template Variable

Question 9

Which log type should be checked first using Log Viewer when a user reports being unable to access a specific website?

Options:

A.

Firewall/URL

B.

Firewall/Traffic

C.

Firewall/Threat

D.

Firewall/DNS Security

Question 10

A firewall administrator is creating an application override rule to bypass Layer 7 inspection for a pre-defined application. What is the expected behavior for Content-ID checks for this application?

Options:

A.

WildFire will only use inline-ML checks instead of sending items to WildFire Cloud.

B.

Threat inspection will occur if the pre-defined application supports threat inspection.

C.

DNS Security will have degraded performance for advanced features.

D.

No additional security checks will occur due to there being only Layer 4 handling.

Question 11

A company wants to implement a security policy that only allows "web-browsing" if it is initiated by an authorized user. If the user is not identified, they should be prompted to authenticate via a web portal. Which policy type must be configured to trigger this portal?

Options:

A.

Security Policy

B.

Authentication Policy

C.

Decryption Policy

D.

NAT Policy

Question 12

An analyst needs to prevent users from downloading executable files from "High-Risk" URL categories while allowing them from "Business-and-Economy." Which profile should be configured to achieve this specific file-type restriction?

Options:

A.

URL Filtering Profile

B.

Data Filtering Profile

C.

File Blocking Profile

D.

Vulnerability Protection Profile

Question 13

Which type of Security profile is required to prevent a "Brute Force" attack on a management portal or server by monitoring the rate of connection attempts?

Options:

A.

Antivirus Profile

B.

Anti-Spyware Profile

C.

Vulnerability Protection Profile

D.

URL Filtering Profile

Question 14

There are intermittent connectivity issues between two internal zones on a PA-Series firewall. Although the Security policies appear correctly configured, traffic between the zones is experiencing unexpected drops. Which troubleshooting step will isolate the root cause of this behavior?

Options:

A.

Use the CLI command tcpdump filter and set the source and destination zones in the filter to capture and analyze traffic flows between zones, checking for packet loss on the data plane.

B.

Use the CLI command show system info to monitor CPU and memory usage, ensuring that resource constraints are not causing interfaces to drop packets between zones.

C.

Use the PAN-OS GUI Troubleshooting tool to review interface status, verify zone assignments, and confirm that all links are operational.

D.

Use the CLI command show system state filter sys.sl.* | match Error to find interface errors across all the interfaces.

Question 15

An analyst notices an unusual amount of bandwidth being consumed by "web-browsing" traffic. Which ACC tab provides a breakdown of which specific URLs and URL Categories are responsible for this bandwidth usage?

Options:

A.

Network Activity

B.

Threat Activity

C.

Blocked Activity

D.

SSL Activity

Question 16

When pushing a configuration from Panorama to multiple firewalls, an analyst wants to ensure that a specific local interface setting on one firewall is not overwritten by the template value. Which feature should be used?

Options:

A.

Template Stack

B.

Template Variable

C.

Device Group Override

D.

Policy Optimizer

Question 17

An analyst wants to create a custom application for an internal tool that uses a specific proprietary protocol. Which information is required to ensure the firewall correctly identifies this application using App-ID?

Options:

A.

Source and Destination IP addresses.

B.

Signature patterns found in the packet payload.

C.

The URL category of the server.

D.

The MAC address of the server.

Question 18

An organization uses several different web-conferencing tools (Zoom, Microsoft Teams, WebEx). The analyst wants to create a single security rule to allow all these tools without listing each App-ID individually. What should the analyst create?

Options:

A.

Application Filter

B.

Application Group

C.

Service Group

D.

Custom App-ID

Question 19

An analyst determines that several sanctioned, predefined applications are being intermittently blocked, even though there is an existing policy permitting them. An investigation reveals that the applications are using non-standard ports, which is causing them to be blocked. The applications are critical for business operations, and the analyst has approval to allow them.

Which configuration adjustment should be implemented to ensure secure access to the applications?

Options:

A.

Apply Disable Server Response Inspection (DSRI) to the existing Security policy to allow the non-standard ports.

B.

Disable App-ID and port filtering and rely solely on IP addresses of the applications to allow the non-standard ports.

C.

Clone the existing Security policy rule and include the non-standard ports under services.

D.

Clone the existing Security policy rule and include unknown-tcp and unknown-udp applications with service set to “any”

Question 20

An analyst is troubleshooting a policy that is not matching traffic as expected. After reviewing the logs, the analyst sees that the traffic is matching a rule with a lower priority. Which feature allows the analyst to compare two rules side-by-side to identify the conflict?

Options:

A.

Policy Optimizer

B.

Rule Comparison

C.

ACC (Application Command Center)

D.

Config Audit

Question 21

An analyst is configuring a "WildFire Analysis Profile." Which file types can be sent to the WildFire cloud for sandbox analysis?

Options:

A.

Only .exe and .msi files.

B.

Only Microsoft Office documents.

C.

All file types supported by the Content-ID engine, including PDFs and APKs.

D.

Only encrypted files that cannot be decrypted locally.

Question 22

Which security profile is specifically designed to protect against "Domain Generation Algorithms" (DGA) and DNS tunneling?

Options:

A.

Anti-Spyware Profile

B.

URL Filtering Profile

C.

DNS Security Profile

D.

Vulnerability Protection Profile

Page: 1 / 7
Total 74 questions