Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Paloalto Networks Network Security Administrator NetSec-Generalist Questions and answers with ValidTests

Exam NetSec-Generalist All Questions
Exam NetSec-Generalist Premium Access

View all detail and faqs for the NetSec-Generalist exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two policies in Strata Cloud Manager (SCM) will ensure the personal data of employees remains private while enabling decryption for mobile users in Prisma Access? (Choose two.)

Options:

A.

SSH Decryption

B.

SSL Inbound Inspection

C.

SSL Forward Proxy

D.

No Decryption

Expert Solution
Questions # 2:

Which two SSH Proxy decryption profile configurations will reduce network attack surface? (Choose two.)

Options:

A.

Allow sessions if resources not available.

B.

Allow sessions with unsupported versions.

C.

Block sessions on certificate errors.

D.

Block sessions with unsupported versions.

Expert Solution
Questions # 3:

After a Best Practice Assessment (BPA) is complete, it is determined that dynamic updates for Cloud-Delivered Security Services (CDSS) used by company branch offices do not match recommendations. The snippet used for dynamic updates is currently set to download and install updates weekly.

Knowing these devices have the Precision Al bundle, which two statements describe how the settings need to be adjusted in the snippet? (Choose two.)

Options:

A.

Applications and threats should be updated daily.

B.

Antivirus should be updated daily.

C.

WildFire shouldbe updated every five minutes.

D.

URL filtering should be updated hourly.

Expert Solution
Questions # 4:

Question # 4

A network administrator is using DNAT to map two servers to one public IP address. Traffic will be directed to a specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.

Which two sets of Security policy rules will accomplish this configuration? (Choose two.)

Options:

A.

Source: Untrust (Any) Destination: Untrust Application(s): web-browsing Action: allow

B.

Source: Untrust (Any) Destination: Trust Application(s): web-browsing, ssh Action: allow

C.

Source: Untrust (Any) Destination: DMZ Application(s): web-browsing Action: allow

D.

Source: Untrust (Any) Destination: DMZ Application(s): ssh Action: allow

Expert Solution
Questions # 5:

Why would an enterprise architect use a Zero Trust Network Access (ZTNA) connector instead of a service connection for private application access?

Options:

A.

It controls traffic from the mobile endpoint to any of the organization's internal resources.

B.

It functions as the attachment point for IPSec-based connections to remote site or branch networks.

C.

It supports traffic sourced from on-premises or public cloud-based resources to mobile users and remote networks.

D.

It automatically discovers private applications and suggests Security policy rules for them.

Expert Solution
Questions # 6:

In Prisma SD-WAN. what is the recommended initial action when VoIP traffic experiences high latency and packet loss during business hours?

Options:

A.

Configurea new VPN gateway connection.

B.

Monitor real-time path performance metrics.

C.

Add new link tags to existing interfaces.

D.

Disable the mostrecently created path quality.

Expert Solution
Questions # 7:

Which two security profiles must be updated to prevent data exfiltration in outbound traffic on NGFWs? (Choose two.)

Options:

A.

Data Filtering

B.

DoS Protection

C.

File Blocking

D.

Antivirus

Expert Solution
Questions # 8:

A network engineer needs to configure a Prisma SD-WAN environment to optimize and secure traffic flow between branch offices and the data center.

Which action should the engineer prioritize to achieve the most operationally efficient communication?

Options:

A.

Ensure all branch office traffic is routed through acentral hub for inspection.

B.

Create NAT policies to translate internal branch IP addresses to public IP addresses.

C.

Define security zones for branch offices and the data center.

D.

Configure dynamic path selection based on network performance metrics.

Expert Solution
Questions # 9:

A company uses Prisma Access to provide secure connectivity for mobile users to access its corporate-sanctioned Google Workspace and wants to block access to all unsanctioned Google Workspace environments.

What would an administrator configure in the snippet to achieve this goal?

Options:

A.

Dynamic Address Groups

B.

Tenant restrictions

C.

Dynamic User Groups

D.

URL category

Expert Solution
Questions # 10:

A network security engineer wants to forward Strata Logging Service data to tools used by the Security Operations Center (SOC) for further investigation.

In which best practice step of Palo Alto Networks Zero Trust does this fit?

Options:

A.

Implementation

B.

Report and Maintenance

C.

Map and Verify Transactions

D.

Standards and Designs

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions