Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Paloalto Networks NGFW-Engineer Dumps

Palo Alto Networks Next-Generation Firewall Engineer Questions and Answers

Question 1

Without performing a context switch, which set of operations can be performed that will affect the operation of a connected firewall on the Panorama GUI?

Options:

A.

Restarting the local firewall, running a packet capture, accessing the firewall CLI

B.

Modification of local security rules, modification of a Layer 3 interface, modification of the firewall device hostname

C.

Modification of pre-security rules, modification of a virtual router, modification of an IKE Gateway Network Profile

D.

Modification of post NAT rules, creation of new views on the local firewall ACC tab, creation of local custom reports

Question 2

An NGFW engineer is configuring multiple Layer 2 interfaces on a Palo Alto Networks firewall, and all interfaces must be assigned to the same VLAN. During initial testing, it is reported that clients located behind the various interfaces cannot communicate with each other.

Which action taken by the engineer will resolve this issue?

Options:

A.

Configure each interface to belong to the same Layer 2 zone and enable IP routing between them.

B.

Assign each interface to the appropriate Layer 2 zone and configure a policy that allows traffic within the VLAN.

C.

Assign each interface to the appropriate Layer 2 zone and configure Security policies for interfaces not assigned to the same zone.

D.

Enable IP routing between the interfaces and configure a Security policy to allow traffic between interfaces within the VLAN.

Question 3

Which two services are configured by applying an SSL/TLS service profile? (Choose two answers)

Options:

A.

GlobalProtect portal

B.

Log forwarding to Strata Logging Service

C.

Forward-Trust certificate

D.

Syslog server monitoring

Question 4

Which two statements describe an external zone in the context of virtual systems (VSYS) on a Palo Alto Networks firewall? (Choose two.)

Options:

A.

It is associated with an interface within a VSYS of a firewall.

B.

It is a security object associated with a specific virtual router of a VSYS.

C.

It is not associated with an interface; it is associated with a VSYS itself.

D.

It is a security object associated with a specific VSYS.

Question 5

An administrator plans to upgrade a pair of active/passive firewalls to a new PAN-OS release. The environment is highly sensitive, and downtime must be minimized.

What is the recommended upgrade process for minimal disruption in this high availability (HA) scenario?

Options:

A.

Suspend the active firewall to trigger a failover to the passive firewall. With traffic now running on the former passive unit, upgrade the suspended (now passive) firewall and confirm proper operation. Then fail traffic back and upgrade the remaining firewall.

B.

Shut down the currently active firewall and upgrade it offline, allowing the passive firewall to handle all traffic. Once the active firewall finishes upgrading, bring it back online and rejoin the HA cluster. Finally, upgrade the passive firewall while the newly upgraded unit remains active.

C.

Isolate both firewalls from the production environment and upgrade them in a separate, offline setup. Reconnect them only after validating the new software version, resuming HA functionality once both units are fully upgraded and tested.

D.

Push the new PAN-OS version simultaneously to both firewalls, having them upgrade and reboot in parallel. Rely on automated HA reconvergence to restore normal operations without manually failing over traffic.

Question 6

A PA-Series firewall with all licensable features is being installed. The customer’s Security policy requires that users do not directly access websites. Instead, a security device must create the connection, and there must be authentication back to the Active Directory servers for all sessions.

Which action meets the requirements in this scenario?

Options:

A.

Deploy the transparent proxy with Web Cache Communications Protocol (WCCP).

B.

Deploy the Next-Generation Firewalls as normal and install the User-ID agent.

C.

Deploy the Advanced URL Filtering license and captive portal.

D.

Deploy the explicit proxy with Kerberos authentication scheme.

Question 7

An engineer is configuring a site-to-site IPSec VPN to a partner network. The IKE Gateway and IPSec tunnel configurations are complete, and the tunnel interface has been assigned to a security zone. However, the tunnel fails to establish, and no application traffic passes through it once it is up. Which two Security policy configurations are required to allow tunnel establishment and data traffic flow in this scenario? (Choose two answers)

Options:

A.

A security rule is needed to allow IKE and IPSec traffic between the zone where the physical interface resides and the zone of the partner gateway.

B.

A single bidirectional security rule must be configured to manage traffic flowing through the tunnel interface.

C.

Security rules must be configured to permit application traffic from the local zone to the tunnel zone, and from the tunnel zone to the local zone.

D.

An Application Override policy is needed to allow both the IKE negotiation and the encapsulated data traffic.

Question 8

What is a result of enabling split tunneling in the GlobalProtect portal configuration with the “Both Network Traffic and DNS” option?

Options:

A.

It specifies when the secondary DNS server is used for resolution to allow access to specific domains that are not managed by the VPN.

B.

It allows users to access internal resources when connected locally and external resources when connected remotely using the same FQDN.

C.

lt allows devices on a local network to access blocked websites by changing which DNS server resolves certain domain names.

D.

It specifies which domains are resolved by the VPN-assigned DNS servers and which domains are resolved by the local DNS servers.

Question 9

An organization runs multiple Kubernetes clusters both on-premises and in public clouds (AWS, Azure, GCP). They want to deploy the Palo Alto Networks CN-Series NGFW to secure east-west traffic within each cluster, maintain consistent Security policies across all environments, and dynamically scale as containerized workloads spin up or down. They also plan to use a centralized Panorama instance for policy management and visibility.

Which approach meets these requirements?

Options:

A.

Install standalone CN-Series instances in each cluster with local configuration only. Export daily policy configuration snapshots to Panorama for recordkeeping, but do not unify policy enforcement.

B.

Configure the CN-Series only in public cloud clusters, and rely on Kubernetes Network Policies for on-premises cluster security. Synchronize partial policy information into Panorama manually as needed.

C.

Use Kubernetes-native deployment tools (e.g., Helm) to deploy CN-Series in each cluster, ensuring local insertion into the service mesh or CNI. Manage all CN-Series firewalls centrally from Panorama, applying uniform Security policies across on-premises and cloud clusters.

D.

Deploy a single CN-Series firewall in the on-premises data center to process traffic for all clusters, connecting remote clusters via VPN or peering. Manage this single instance through Panorama.

Question 10

In regard to the Advanced Routing Engine (ARE), what must be enabled first when configuring a logical router on a PAN-OS firewall?

Options:

A.

License

B.

Plugin

C.

Content update

D.

General setting

Question 11

Which PAN-OS method of mapping users to IP addresses is the most reliable?

Options:

A.

Port mapping

B.

GlobalProtect

C.

Syslog

D.

Server monitoring

Question 12

What is the purpose of assigning an Admin Role Profile to a user in a Palo Alto Networks NGFW?

Options:

A.

Allow access to all resources without restrictions.

B.

Enable multi-factor authentication (MFA) for administrator access.

C.

Define granular permissions for management tasks.

D.

Restrict access to sensitive report data.

Question 13

Which two statements apply to configuring required security rules when setting up an IPSec tunnel between a Palo Alto Networks firewall and a third- party gateway? (Choose two.)

Options:

A.

For incoming and outgoing traffic through the tunnel, creating separate rules for each direction is optional.

B.

The IKE negotiation and IPSec/ESP packets are allowed by default via the intrazone default allow policy.

C.

For incoming and outgoing traffic through the tunnel, separate rules must be created for each direction.

D.

The IKE negotiation and IPSec/ESP packets are denied by default via the interzone default deny policy.

Question 14

After an engineer configures an IPSec tunnel with a Cisco ASA, the Palo Alto Networks firewall generates system messages reporting the tunnel is failing to establish.

Which of the following actions will resolve this issue?

Options:

A.

Ensure that an active static or dynamic route exists for the VPN peer with next hop as the tunnel interface.

B.

Configure the Proxy IDs to match the Cisco ASA configuration.

C.

Check that IPSec is enabled in the management profile on the external interface.

D.

Validate the tunnel interface VLAN against the peer’s configuration.

Question 15

Which CLI command is used to configure the management interface as a DHCP client?

Options:

A.

set network dhcp interface management

B.

set network dhcp type management-interface

C.

set deviceconfig system type dhcp-client

D.

set deviceconfig management type dhcp-client

Question 16

When considering the various methods for User-ID to learn user-to-IP address mappings, which source is considered the most accurate due to the mapping being explicitly created through an authentication event directly with the firewall?

Options:

A.

X-Forwarded-For (XFF) headers

B.

Server monitoring

C.

GlobalProtect

D.

Authentication Portal

Question 17

A network security engineer needs to permit traffic between two distinct VSYS that reside on one Palo Alto Networks firewall. This traffic will not egress the firewall to an external device. Which zone type must be configured to act as the logical source and destination for this traffic flow?

Options:

A.

TAP

B.

Layer 2

C.

Layer 3

D.

External

Question 18

An enterprise uses GlobalProtect with both user- and machine-based certificate authentication and requires pre-logon, OCSP checks, and minimal user disruption. They manage multiple firewalls via Panorama and deploy domain-issued machine certificates via Group Policy.

Which approach ensures continuous, secure connectivity and consistent policy enforcement?

Options:

A.

Use a wildcard certificate from a public CA, disable all revocation checks to reduce latency, and manage certificate renewals manually on each firewall.

B.

Distribute root and intermediate CAs via Panorama template, use distinct certificate profiles for user versus machine certs, reference an internal OCSP responder, and automate certificate deployment with Group Policy.

C.

Configure a single certificate profile for both user and machine certificates. Rely solely on CRLs for revocation to minimize complexity.

D.

Deploy self-signed certificates on each firewall, allow IP-based authentication to override certificate checks, and use default GlobalProtect settings for user / machine identification.

Question 19

To maintain security efficacy of its public cloud resources by using native tools, a company purchases Cloud NGFW credits to replicate the Panorama, PA-Series, and VM-Series devices used in physical data centers. Resources exist on AWS and Azure:

The AWS deployment is architected with AWS Transit Gateway, to which all resources connect

The Azure deployment is architected with each application independently routing traffic

The engineer deploying Cloud NGFW in these two cloud environments must account for the following:

Minimize changes to the two cloud environments

Scale to the demands of the applications while using the least amount of compute resources

Allow the company to unify the Security policies across all protected areas

Which two implementations will meet these requirements? (Choose two.)

Options:

A.

Deploy a VM-Series firewall in AWS in each VPC, create an IPSec tunnel between AWS and Azure, and manage the policy with Panorama.

B.

Deploy Cloud NGFW for Azure in vNET/s, update the vNET/s routing to path traffic through the deployed NGFWs, and manage the policy with Panorama.

C.

Deploy Cloud NGFW for Azure in vWAN, create a vWAN to route all appropriate traffic to the Cloud NGFW attached to the vWAN, and manage the policy with local rules.

D.

Deploy Cloud NGFW for AWS in a centralized Security VPC, update the Transit Gateway to route all appropriate traffic through the Security VPC, and manage the policy with Panorama.

Page: 1 / 5
Total 50 questions