ExamGecko
Home / Palo Alto Networks / NetSec-Generalist / List of questions
Ask Question

Palo Alto Networks NetSec-Generalist Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

At a minimum, which action must be taken to ensure traffic coming from outside an organization to the DMZ can access the DMZ zone for a company using private IP address space?

Configure static NAT for all incoming traffic.

Configure static NAT for all incoming traffic.

Create NAT policies on post-NAT addresses for all traffic destined for DMZ.

Create NAT policies on post-NAT addresses for all traffic destined for DMZ.

Configure NAT policies on the pre-NAT addresses and post-NAT zone.

Configure NAT policies on the pre-NAT addresses and post-NAT zone.

Create policies only for pre-NAT addresses and any destination zone.

Create policies only for pre-NAT addresses and any destination zone.

Suggested answer: B
asked 18/02/2025
Thomas Kringel
42 questions

Question 12

Report Export Collapse

A company uses Prisma Access to provide secure connectivity for mobile users to access its corporate-sanctioned Google Workspace and wants to block access to all unsanctioned Google Workspace environments.

What would an administrator configure in the snippet to achieve this goal?

Dynamic Address Groups

Dynamic Address Groups

Tenant restrictions

Tenant restrictions

Dynamic User Groups

Dynamic User Groups

URL category

URL category

Suggested answer: B
asked 18/02/2025
ERIK BURDETT
50 questions

Question 13

Report Export Collapse

Which two cloud deployment high availability (HA) options would cause a firewall administrator to use Cloud NGFW? (Choose two.)

Automated autoscaling

Automated autoscaling

Terraform to automate HA

Terraform to automate HA

Dedicated vNIC for HA

Dedicated vNIC for HA

Deployed with load balancers

Deployed with load balancers

Suggested answer: A
asked 18/02/2025
Martin White
42 questions

Question 14

Report Export Collapse

A company currently uses Prisma Access for its mobile users. A use case is discovered in which mobile users will need to access an internal site, but there is no existing network communication between the mobile users and the internal site.

Which Prisma Access functionality needs to be deployed to enable routing between the mobile users and the internal site?

Interconnect license

Interconnect license

Service connection

Service connection

Autonomous Digital Experience Manager (ADEM)

Autonomous Digital Experience Manager (ADEM)

Security processing node

Security processing node

Suggested answer: B
asked 18/02/2025
Hassene SAADI
45 questions

Question 15

Report Export Collapse

How are content updates downloaded and installed for Cloud NGFWs?

Through the management console

Through the management console

Through Panorama

Through Panorama

Automatically

Automatically

From the Customer Support Portal

From the Customer Support Portal

Suggested answer: C
asked 18/02/2025
Silfredo Jimenez Munoz
43 questions

Question 16

Report Export Collapse

Which Cloud-Delivered Security Services (CDSS) solution is required to configure and enable Advanced DNS Security?

Advanced WildFire

Advanced WildFire

Enterprise SaaS Security

Enterprise SaaS Security

Advanced Threat Prevention

Advanced Threat Prevention

Advanced URL Filtering

Advanced URL Filtering

Suggested answer: D
asked 18/02/2025
Nestor Quintero
43 questions

Question 17

Report Export Collapse

What is the main security benefit of adding a CN-Series firewall to an existing VM-Series firewall deployment when the customer is using containers?

It provides perimeter threat detection and inspection outside the container itself.

It provides perimeter threat detection and inspection outside the container itself.

It prevents lateral threat movement within the container itself.

It prevents lateral threat movement within the container itself.

It monitors and logs traffic outside the container itself.

It monitors and logs traffic outside the container itself.

It enables core zone segmentation within the container itself.

It enables core zone segmentation within the container itself.

Suggested answer: B
asked 18/02/2025
Michele Valvason
44 questions

Question 18

Report Export Collapse

An IT security administrator is maintaining connectivity and security between on-premises infrastructure, private cloud, and public cloud environments in Strata Cloud Manager (SCM).

Which set of practices must be implemented to effectively manage certificates and ensure secure communication across these segmented environments?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Which statement best demonstrates a fundamental difference between Content-ID and traditional network security methods?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Which two SSH Proxy decryption profile configurations will reduce network attack surface? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 60 questions
Go to page: of 6
Search