Palo Alto Networks NetSec-Analyst Exam
Palo Alto Networks Network Security Analyst (Page 6 )

Updated On: 7-Feb-2026

Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.

What is the quickest way to reset the hit counter to zero in all the security policy rules?

  1. At the CLI enter the command reset rules and press Enter
  2. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule
  3. Reboot the firewall
  4. Use the Reset Rule Hit Counter > All Rules option

Answer(s): D



Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)

  1. facebook
  2. facebook-chat
  3. facebook-base
  4. facebook-email

Answer(s): B,C



Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

  1. Windows-based agent deployed on the internal network
  2. PAN-OS integrated agent deployed on the internal network
  3. Citrix terminal server deployed on the internal network
  4. Windows-based agent deployed on each of the WAN Links

Answer(s): A

Explanation:

Another reason to choose the Windows agent over the integrated PAN-OS agent is to save processing cycles on the firewall's management plane.



Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP ­to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.

Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.

  1. syslog
  2. RADIUS
  3. UID redistribution
  4. XFF headers

Answer(s): A



An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact a command-and-control (C2) server.
Which two security profile components will detect and prevent this threat after the firewall's signature database has been updated? (Choose two.)

  1. vulnerability protection profile applied to outbound security policies
  2. anti-spyware profile applied to outbound security policies
  3. antivirus profile applied to outbound security policies
  4. URL filtering profile applied to outbound security policies

Answer(s): B,D






Post your Comments and Discuss Palo Alto Networks NetSec-Analyst exam prep with other Community members:

Join the NetSec-Analyst Discussion