Palo Alto Networks NetSec-Generalist Practice Test - Questions Answers, Page 2

List of questions
Question 11

At a minimum, which action must be taken to ensure traffic coming from outside an organization to the DMZ can access the DMZ zone for a company using private IP address space?
Configure static NAT for all incoming traffic.
Create NAT policies on post-NAT addresses for all traffic destined for DMZ.
Configure NAT policies on the pre-NAT addresses and post-NAT zone.
Create policies only for pre-NAT addresses and any destination zone.
Question 12

A company uses Prisma Access to provide secure connectivity for mobile users to access its corporate-sanctioned Google Workspace and wants to block access to all unsanctioned Google Workspace environments.
What would an administrator configure in the snippet to achieve this goal?
Dynamic Address Groups
Tenant restrictions
Dynamic User Groups
URL category
Question 13

Which two cloud deployment high availability (HA) options would cause a firewall administrator to use Cloud NGFW? (Choose two.)
Automated autoscaling
Terraform to automate HA
Dedicated vNIC for HA
Deployed with load balancers
Question 14

A company currently uses Prisma Access for its mobile users. A use case is discovered in which mobile users will need to access an internal site, but there is no existing network communication between the mobile users and the internal site.
Which Prisma Access functionality needs to be deployed to enable routing between the mobile users and the internal site?
Interconnect license
Service connection
Autonomous Digital Experience Manager (ADEM)
Security processing node
Question 15

How are content updates downloaded and installed for Cloud NGFWs?
Through the management console
Through Panorama
Automatically
From the Customer Support Portal
Question 16

Which Cloud-Delivered Security Services (CDSS) solution is required to configure and enable Advanced DNS Security?
Advanced WildFire
Enterprise SaaS Security
Advanced Threat Prevention
Advanced URL Filtering
Question 17

What is the main security benefit of adding a CN-Series firewall to an existing VM-Series firewall deployment when the customer is using containers?
It provides perimeter threat detection and inspection outside the container itself.
It prevents lateral threat movement within the container itself.
It monitors and logs traffic outside the container itself.
It enables core zone segmentation within the container itself.
Question 18

An IT security administrator is maintaining connectivity and security between on-premises infrastructure, private cloud, and public cloud environments in Strata Cloud Manager (SCM).
Which set of practices must be implemented to effectively manage certificates and ensure secure communication across these segmented environments?
Question 19

Which statement best demonstrates a fundamental difference between Content-ID and traditional network security methods?
Question 20

Which two SSH Proxy decryption profile configurations will reduce network attack surface? (Choose two.)
Question