Free Palo Alto Networks NetSec-Analyst Exam Questions (page: 7)

Given the image, which two options are true about the Security policy rules. (Choose two.)

  1. The Allow Office Programs rule is using an Application Filter
  2. In the Allow FTP to web server rule, FTP is allowed using App-ID
  3. The Allow Office Programs rule is using an Application Group
  4. In the Allow Social Networking rule, allows all of Facebook's functions

Answer(s): A,D

Explanation:

In the Allow FTP to web server rule, FTP is allowed using port based rule and not APP-ID.



Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

  1. global
  2. intrazone
  3. interzone
  4. universal

Answer(s): D


Reference:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC



Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

  1. GlobalProtect
  2. AutoFocus
  3. Aperture
  4. Panorama

Answer(s): A

Explanation:

GlobalProtect: GlobalProtect safeguards your mobile workforce by inspecting all traffic using your next-generation firewalls deployed as internet gateways, whether at the perimeter, in the Demilitarized Zone (DMZ), or in the cloud.



Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)

  1. Path monitoring does not determine if route is useable
  2. Route with highest metric is actively used
  3. Path monitoring determines if route is useable
  4. Route with lowest metric is actively used

Answer(s): C,D



Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

  1. Exploitation
  2. Installation
  3. Reconnaissance
  4. Act on Objective

Answer(s): A



Which file is used to save the running configuration with a Palo Alto Networks firewall?

  1. running-config.xml
  2. run-config.xml
  3. running-configuration.xml
  4. run-configuratin.xml

Answer(s): A



In the example security policy shown, which two websites fcked? (Choose two.)

  1. LinkedIn
  2. Facebook
  3. YouTube
  4. Amazon

Answer(s): A,B



Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

  1. GlobalProtect
  2. Panorama
  3. Aperture
  4. AutoFocus

Answer(s): B,D



Viewing page 7 of 48
Viewing questions 49 - 56 out of 372 questions



Post your Comments and Discuss Palo Alto Networks NetSec-Analyst exam prep with other Community members:

NetSec-Analyst Exam Discussions & Posts