Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Paloalto Networks NGFW-Engineer Palo Alto Networks Next-Generation Firewall Engineer Exam Practice Test

Demo: 14 questions
Total 50 questions

Palo Alto Networks Next-Generation Firewall Engineer Questions and Answers

Question 1

Without performing a context switch, which set of operations can be performed that will affect the operation of a connected firewall on the Panorama GUI?

Options:

A.

Restarting the local firewall, running a packet capture, accessing the firewall CLI

B.

Modification of local security rules, modification of a Layer 3 interface, modification of the firewall device hostname

C.

Modification of pre-security rules, modification of a virtual router, modification of an IKE Gateway Network Profile

D.

Modification of post NAT rules, creation of new views on the local firewall ACC tab, creation of local custom reports

Question 2

Which statement applies to Log Collector Groups?

Options:

A.

Log redundancy is available only if each Log Collector has the same amount of total disk storage.

B.

Enabling redundancy increases the log processing traffic in a Collector Group by 50%.

C.

In any single Collector Group, all the Log Collectors must run on the same Panorama model.

D.

The maximum number of Log Collectors in a Log Collector Group is 18 plus two hot spares.

Question 3

To maintain security efficacy of its public cloud resources by using native tools, a company purchases Cloud NGFW credits to replicate the Panorama, PA-Series, and VM-Series devices used in physical data centers. Resources exist on AWS and Azure:

The AWS deployment is architected with AWS Transit Gateway, to which all resources connect

The Azure deployment is architected with each application independently routing traffic

The engineer deploying Cloud NGFW in these two cloud environments must account for the following:

Minimize changes to the two cloud environments

Scale to the demands of the applications while using the least amount of compute resources

Allow the company to unify the Security policies across all protected areas

Which two implementations will meet these requirements? (Choose two.)

Options:

A.

Deploy a VM-Series firewall in AWS in each VPC, create an IPSec tunnel between AWS and Azure, and manage the policy with Panorama.

B.

Deploy Cloud NGFW for Azure in vNET/s, update the vNET/s routing to path traffic through the deployed NGFWs, and manage the policy with Panorama.

C.

Deploy Cloud NGFW for Azure in vWAN, create a vWAN to route all appropriate traffic to the Cloud NGFW attached to the vWAN, and manage the policy with local rules.

D.

Deploy Cloud NGFW for AWS in a centralized Security VPC, update the Transit Gateway to route all appropriate traffic through the Security VPC, and manage the policy with Panorama.

Question 4

An NGFW engineer is configuring multiple Panorama-managed firewalls to start sending all logs to Strata Logging Service. The Strata Logging Service instance has been provisioned, the required device certificates have been installed, and Panorama and the firewalls have been successfully onboarded to Strata Logging Service.

Which configuration task must be performed to start sending the logs to Strata Logging Service and continue forwarding them to the Panorama log collectors as well?

Options:

A.

Modify all active Log Forwarding profiles to select the “Cloud Logging” option in each profile match list in the appropriate device groups.

B.

Enable the “Panorama/Cloud Logging” option in the Logging and Reporting Settings section under Device --> Setup --> Management in the appropriate templates.

C.

Select the “Enable Duplicate Logging” option in the Cloud Logging section under Device --> Setup --> Management in the appropriate templates.

D.

Select the “Enable Cloud Logging” option in the Cloud Logging section under Device --> Setup --> Management in the appropriate templates.

Question 5

When configuring a Zone Protection profile, in which section (protection type) would an NGFW engineer configure options to protect against activities such as spoofed IP addresses and split handshake session establishment attempts?

Options:

A.

Flood Protection

B.

Protocol Protection

C.

Packet-Based Attack Protection

D.

Reconnaissance Protection

Question 6

How does a Palo Alto Networks NGFW respond when the preemptive hold time is set to 0 minutes during configuration of route monitoring?

Options:

A.

It does not accept the configuration.

B.

It accepts the configuration but throws a warning message.

C.

It removes the static route because 0 is a NULL value

D.

It reinstalls the route into the routing information base (RIB) as soon as the path comes up.

Question 7

Which PAN-OS method of mapping users to IP addresses is the most reliable?

Options:

A.

Port mapping

B.

GlobalProtect

C.

Syslog

D.

Server monitoring

Question 8

An NGFW engineer is configuring multiple Layer 2 interfaces on a Palo Alto Networks firewall, and all interfaces must be assigned to the same VLAN. During initial testing, it is reported that clients located behind the various interfaces cannot communicate with each other.

Which action taken by the engineer will resolve this issue?

Options:

A.

Configure each interface to belong to the same Layer 2 zone and enable IP routing between them.

B.

Assign each interface to the appropriate Layer 2 zone and configure a policy that allows traffic within the VLAN.

C.

Assign each interface to the appropriate Layer 2 zone and configure Security policies for interfaces not assigned to the same zone.

D.

Enable IP routing between the interfaces and configure a Security policy to allow traffic between interfaces within the VLAN.

Question 9

Which two statements describe an external zone in the context of virtual systems (VSYS) on a Palo Alto Networks firewall? (Choose two.)

Options:

A.

It is associated with an interface within a VSYS of a firewall.

B.

It is a security object associated with a specific virtual router of a VSYS.

C.

It is not associated with an interface; it is associated with a VSYS itself.

D.

It is a security object associated with a specific VSYS.

Question 10

What is the purpose of assigning an Admin Role Profile to a user in a Palo Alto Networks NGFW?

Options:

A.

Allow access to all resources without restrictions.

B.

Enable multi-factor authentication (MFA) for administrator access.

C.

Define granular permissions for management tasks.

D.

Restrict access to sensitive report data.

Question 11

What are the phases of the Palo Alto Networks AI Runtime Security: Network Intercept solution?

Options:

A.

Scanning, Isolation, Whitelisting, Logging

B.

Discovery, Deployment, Detection, Prevention

C.

Policy Generation, Discovery, Enforcement, Logging

D.

Profiling, Policy Generation, Enforcement, Reporting

Question 12

What is a result of enabling split tunneling in the GlobalProtect portal configuration with the “Both Network Traffic and DNS” option?

Options:

A.

It specifies when the secondary DNS server is used for resolution to allow access to specific domains that are not managed by the VPN.

B.

It allows users to access internal resources when connected locally and external resources when connected remotely using the same FQDN.

C.

lt allows devices on a local network to access blocked websites by changing which DNS server resolves certain domain names.

D.

It specifies which domains are resolved by the VPN-assigned DNS servers and which domains are resolved by the local DNS servers.

Question 13

Which statement describes the role of Terraform in deploying Palo Alto Networks NGFWs?

Options:

A.

It acts as a logging service for NGFW performance metrics.

B.

It orchestrates real-time traffic inspection for network segments.

C.

It provides Infrastructure-as-Code (IaC) to automate NGFW deployment.

D.

It manages threat intelligence data synchronization with NGFWs.

Question 14

In an active/active high availability (HA) configuration with two PA-Series firewalls, how do the firewalls use the HA3 interface?

Options:

A.

To forward packets to the HA peer during session setup and asymmetric traffic flow

B.

To exchange hellos, heartbeats, HA state information, and management plane synchronization for routing and User-ID information

C.

To synchronize sessions, forwarding tables, IPSec security associations, and ARP tables between firewalls in an HA pair

D.

To perform session cache synchronization among all HA peers having the same cluster ID

Demo: 14 questions
Total 50 questions