Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Paloalto Networks Network Security Administrator NGFW-Engineer Questions and answers with ValidTests

Exam NGFW-Engineer All Questions
Exam NGFW-Engineer Premium Access

View all detail and faqs for the NGFW-Engineer exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two actions in the IKE Gateways will allow implementation of post-quantum cryptography when building VPNs between multiple Palo Alto Networks NGFWs? (Choose two.)

Options:

A.

Select IKE v2, enable the Advanced Options • PQ PPK, then set a 64+ character string for the post-quantum pre shared key.

B.

Ensure Authentication is set to “certificate,” then import a post-quantum derived certificate.

C.

Select IKE v2 Preferred, enable the Advanced Options • PQ KEM, then add one or more “Rounds.”

D.

Select IKE v2, enable the Advanced Options • PQ KEM, then create an IKE Crypto Profile with Advanced Options adding one or more “Rounds.”

Expert Solution
Questions # 2:

Which networking technology can be configured on Layer 3 interfaces but not on Layer 2 interfaces?

Options:

A.

DDNS

B.

Link Duplex

C.

NetFlow

D.

LLDP

Expert Solution
Questions # 3:

An organization has configured GlobalProtect in a hybrid authentication model using both certificate-based authentication for the pre-logon stage and SAML-based multi-factor authentication (MFA) for user logon.

How does the GlobalProtect agent process the authentication flow on Windows endpoints?

Options:

A.

The GlobalProtect agent uses the machine certificate to establish a pre-logon tunnel; upon user sign-in, it prompts for SAML-based MFA credentials, ensuring both device and user identities are validated before granting full access.

B.

The GlobalProtect agent uses the machine certificate during pre-logon for initial tunnel establishment, and then seamlessly reuses the same machine certificate for user-based authentication without requiring MFA.

C.

Once the machine certificate is validated at pre-logon, the Windows endpoint completes MFA on behalf of the user by passing existing Windows Credential Provider details to the GlobalProtect gateway without prompting the user.

D.

GlobalProtect requires the user to log in first for SAML-based MFA before establishing the pre-logon tunnel, rendering the pre-logon certificate authentication (CA) flow redundant.

Expert Solution
Questions # 4:

Which forwarding methods can be used on the Objects tab when configuring the Log Forwarding profile?

Options:

A.

Panorama, syslog, email

B.

Syslog, HTTP, NetFlow

C.

Panorama, ADEM, syslog

D.

SNMP, HTTP, RADIUS

Expert Solution
Questions # 5:

When deploying Palo Alto Networks NGFWs in a cloud service provider (CSP) environment, which method ensures high availability (HA) across multiple availability zones?

Options:

A.

Deploying Ansible scripts for zone-specific scaling

B.

Implementing Terraform templates for redundancy within one availability zone

C.

Using load balancer and health probes

D.

Configuring active/active HA

Expert Solution
Questions # 6:

Which configuration in the LACP tab will enable pre-negotiation for an Aggregate Ethernet (AE) interface on a Palo Alto Networks high availability (HA) active/passive pair?

Options:

A.

Set Transmission Rate to “fast.”

B.

Set passive link state to “Auto.”

C.

Set “Enable in HA Passive State.”

D.

Set LACP mode to “Active.”

Expert Solution
Questions # 7:

Which interface types should be used to configure link monitoring for a high availability (HA) deployment on a Palo Alto Networks NGFW?

Options:

A.

HA, Virtual Wire, and Layer 2

B.

Tap, Virtual Wire, and Layer 3

C.

Virtual Wire, Layer 2, and Layer 3

D.

HA, Layer 2. and Layer 3

Expert Solution
Questions # 8:

Which type of firewall resource can be assigned when configuring a new firewall virtual system (VSYS)?

Options:

A.

ICPU

B.

Sessions limit

C.

Memory

D.

Security profile limit

Expert Solution
Questions # 9:

An engineer at a managed services provider is updating an application that allows its customers to request firewall changes to also manage SD-WAN. The application will be able to make any approved changes directly to devices via API.

What is a requirement for the application to create SD-WAN interfaces?

Options:

A.

REST API’s “sdwanInterfaceprofiles” parameter on a Panorama device

B.

REST API’s “sdwanInterfaces” parameter on a firewall device

C.

XML API’s “sdwanprofiles/interfaces” parameter on a Panorama device

D.

XML API’s “InterfaceProfiles/sdwan” parameter on a firewall device

Expert Solution
Questions # 10:

Which two statements apply to configuring required security rules when setting up an IPSec tunnel between a Palo Alto Networks firewall and a third- party gateway? (Choose two.)

Options:

A.

For incoming and outgoing traffic through the tunnel, creating separate rules for each direction is optional.

B.

The IKE negotiation and IPSec/ESP packets are allowed by default via the intrazone default allow policy.

C.

For incoming and outgoing traffic through the tunnel, separate rules must be created for each direction.

D.

The IKE negotiation and IPSec/ESP packets are denied by default via the interzone default deny policy.

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions