Palo Alto Networks NetSec-Generalist Practice Test - Questions Answers, Page 4

List of questions
Question 31

A hospital system allows mobile medical imaging trailers to connect directly to the internal network of its various campuses. The network security team is concerned about this direct connection and wants to begin implementing a Zero Trust approach in the flat network.
Which solution provides cost-effective network segmentation and security enforcement in this scenario?
Question 32

How does Panorama improve reporting capabilities of an organization's next-generation firewall deployment?
Question 33

Which two content updates can be pushed to next-generation firewalls from Panorama? (Choose two.)
Question 34

Refer to the exhibit.
A network administrator is using DNAT to map two servers to one public IP address. Traffic will be directed to a specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two sets of Security policy rules will accomplish this configuration? (Choose two.)
Question 35

A company has an ongoing initiative to monitor and control IT-sanctioned SaaS applications. To be successful, it will require configuration of decryption policies, along with data filtering and URL Filtering Profiles used in Security policies.
Based on the need to decrypt SaaS applications, which two steps are appropriate to ensure success? (Choose two.)
Question 36

Which two security profiles must be updated to prevent data exfiltration in outbound traffic on NGFWs? (Choose two.)
Question 37

All branch sites in an organization have NGFWs running in production, and the organization wants to centralize its logs with Strata Logging Service.
Which type of certificate is required to ensure connectivity from the NGFWs to Strata Logging Service?
Question 38

What is a benefit of virtual systems for multitenancy?
Question 39

Which action must a firewall administrator take to incorporate custom vulnerability signatures into current Security policies?
Question 40

Which step is necessary to ensure an organization is using the inline cloud analysis features in its Advanced Threat Prevention subscription?
Question