Free Palo Alto Networks NetSec-Analyst Exam Questions (page: 15)

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?

  1. every 30 minutes
  2. every 5 minutes
  3. once every 24 hours
  4. every 1 minute

Answer(s): D

Explanation:

Because new WildFire signatures are now available every five minutes, it is a best practice to use this setting to ensure the firewall retrieves these signatures within a minute of availability.



A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

  1. Windows-based agent on a domain controller
  2. Captive Portal
  3. Citrix terminal server with adequate data-plane resources
  4. PAN-OS integrated agent

Answer(s): A



DRAG DROP (Drag and Drop is not supported)

Arrange the correct order that the URL classifications are processed within the system.

  1. See Explanation for the Answer.

Answer(s): A

Explanation:

First ­ Block List

Second ­ Allow List

Third ­ Custom URL Categories

Fourth ­ External Dynamic Lists

Fifth ­ Downloaded PAN-DB Files

Sixth - PAN-DB Cloud



What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?

  1. authentication sequence
  2. LDAP server profile
  3. authentication server list
  4. authentication list profile

Answer(s): A



Which prevention technique will prevent attacks based on packet count?

  1. zone protection profile
  2. URL filtering profile
  3. antivirus profile
  4. vulnerability profile

Answer(s): A



Which interface type can use virtual routers and routing protocols?

  1. Tap
  2. Layer3
  3. Virtual Wire
  4. Layer2

Answer(s): B



Which URL profiling action does not generate a log entry when a user attempts to access that URL?

  1. Override
  2. Allow
  3. Block
  4. Continue

Answer(s): B



An internal host wants to connect to servers of the internet through using source NAT.

Which policy is required to enable source NAT on the firewall?

  1. NAT policy with source zone and destination zone specified
  2. post-NAT policy with external source and any destination address
  3. NAT policy with no source of destination zone selected
  4. pre-NAT policy with external source and any destination address

Answer(s): A



Viewing page 15 of 48
Viewing questions 113 - 120 out of 372 questions



Post your Comments and Discuss Palo Alto Networks NetSec-Analyst exam prep with other Community members:

NetSec-Analyst Exam Discussions & Posts