Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks NGFW-Engineer Palo Alto Networks Next-Generation Firewall Engineer Exam Practice Test

Palo Alto Networks Next-Generation Firewall Engineer Questions and Answers

Question 1

What is the purpose of assigning an Admin Role Profile to a user in a Palo Alto Networks NGFW?

Options:

A.

Allow access to all resources without restrictions.

B.

Enable multi-factor authentication (MFA) for administrator access.

C.

Define granular permissions for management tasks.

D.

Restrict access to sensitive report data.

Question 2

Which statement applies to Log Collector Groups?

Options:

A.

Log redundancy is available only if each Log Collector has the same amount of total disk storage.

B.

Enabling redundancy increases the log processing traffic in a Collector Group by 50%.

C.

In any single Collector Group, all the Log Collectors must run on the same Panorama model.

D.

The maximum number of Log Collectors in a Log Collector Group is 18 plus two hot spares.

Question 3

When considering the various methods for User-ID to learn user-to-IP address mappings, which source is considered the most accurate due to the mapping being explicitly created through an authentication event directly with the firewall?

Options:

A.

X-Forwarded-For (XFF) headers

B.

Server monitoring

C.

GlobalProtect

D.

Authentication Portal

Question 4

Which two services are configured by applying an SSL/TLS service profile? (Choose two answers)

Options:

A.

GlobalProtect portal

B.

Log forwarding to Strata Logging Service

C.

Forward-Trust certificate

D.

Syslog server monitoring

Question 5

An organization has configured GlobalProtect in a hybrid authentication model using both certificate-based authentication for the pre-logon stage and SAML-based multi-factor authentication (MFA) for user logon.

How does the GlobalProtect agent process the authentication flow on Windows endpoints?

Options:

A.

The GlobalProtect agent uses the machine certificate to establish a pre-logon tunnel; upon user sign-in, it prompts for SAML-based MFA credentials, ensuring both device and user identities are validated before granting full access.

B.

The GlobalProtect agent uses the machine certificate during pre-logon for initial tunnel establishment, and then seamlessly reuses the same machine certificate for user-based authentication without requiring MFA.

C.

Once the machine certificate is validated at pre-logon, the Windows endpoint completes MFA on behalf of the user by passing existing Windows Credential Provider details to the GlobalProtect gateway without prompting the user.

D.

GlobalProtect requires the user to log in first for SAML-based MFA before establishing the pre-logon tunnel, rendering the pre-logon certificate authentication (CA) flow redundant.

Question 6

How does a Palo Alto Networks NGFW respond when the preemptive hold time is set to 0 minutes during configuration of route monitoring?

Options:

A.

It does not accept the configuration.

B.

It accepts the configuration but throws a warning message.

C.

It removes the static route because 0 is a NULL value

D.

It reinstalls the route into the routing information base (RIB) as soon as the path comes up.

Question 7

Which statement applies to the relationship between Panorama-pushed Security policy and local firewall Security policy?

Options:

A.

When a policy match is found in a local firewall policy, if any Panorama shared post-rule is configured, it will still be evaluated.

B.

Local firewall rules are evaluated after Panorama pre-rules and before Panorama post-rules.

C.

Panorama post-rules can be configured to be evaluated before local firewall policy for the purpose of troubleshooting.

D.

The order of policy evaluation can be configured differently in different device groups.

Question 8

Which zone type allows traffic between zones in different virtual systems (VSYS), without the traffic leaving the firewall?

Options:

A.

Isolated

B.

Transient

C.

External

D.

Internal

Question 9

A PA-Series firewall with all licensable features is being installed. The customer’s Security policy requires that users do not directly access websites. Instead, a security device must create the connection, and there must be authentication back to the Active Directory servers for all sessions.

Which action meets the requirements in this scenario?

Options:

A.

Deploy the transparent proxy with Web Cache Communications Protocol (WCCP).

B.

Deploy the Next-Generation Firewalls as normal and install the User-ID agent.

C.

Deploy the Advanced URL Filtering license and captive portal.

D.

Deploy the explicit proxy with Kerberos authentication scheme.

Question 10

Which two zone types are valid when configuring a new security zone? (Choose two.)

Options:

A.

Tunnel

B.

Intrazone

C.

Internal

D.

Virtual Wire

Question 11

A security administrator is hardening the ingress zone of an NGFW. The goal is to prevent attacks that rely on malformed IP address packets with incorrect header lengths or invalid TCP packets that have both the SYN and FIN flags set. Within which section of a Zone Protection profile should these protections be configured?

Options:

A.

Protocol Protection

B.

Packet-Based Attack Protection

C.

Reconnaissance Protection

D.

Flood Protection

Question 12

Which two statements describe an external zone in the context of virtual systems (VSYS) on a Palo Alto Networks firewall? (Choose two.)

Options:

A.

It is associated with an interface within a VSYS of a firewall.

B.

It is a security object associated with a specific virtual router of a VSYS.

C.

It is not associated with an interface; it is associated with a VSYS itself.

D.

It is a security object associated with a specific VSYS.

Question 13

Which statement describes the role of Terraform in deploying Palo Alto Networks NGFWs?

Options:

A.

It acts as a logging service for NGFW performance metrics.

B.

It orchestrates real-time traffic inspection for network segments.

C.

It provides Infrastructure-as-Code (IaC) to automate NGFW deployment.

D.

It manages threat intelligence data synchronization with NGFWs.

Question 14

An enterprise uses GlobalProtect with both user- and machine-based certificate authentication and requires pre-logon, OCSP checks, and minimal user disruption. They manage multiple firewalls via Panorama and deploy domain-issued machine certificates via Group Policy.

Which approach ensures continuous, secure connectivity and consistent policy enforcement?

Options:

A.

Use a wildcard certificate from a public CA, disable all revocation checks to reduce latency, and manage certificate renewals manually on each firewall.

B.

Distribute root and intermediate CAs via Panorama template, use distinct certificate profiles for user versus machine certs, reference an internal OCSP responder, and automate certificate deployment with Group Policy.

C.

Configure a single certificate profile for both user and machine certificates. Rely solely on CRLs for revocation to minimize complexity.

D.

Deploy self-signed certificates on each firewall, allow IP-based authentication to override certificate checks, and use default GlobalProtect settings for user / machine identification.

Question 15

An engineer is implementing a new rollout of SAML for administrator authentication across a company’s Palo Alto Networks NGFWs. User authentication on company firewalls is currently performed with RADIUS, which will remain available for six months, until it is decommissioned. The company wants both authentication types to be running in parallel during the transition to SAML.

Which two actions meet the criteria? (Choose two.)

Options:

A.

Create a testing and rollback plan for the transition from Radius to SAML, as the two authentication profiles cannot be run in tandem.

B.

Create an authentication sequence that includes both the “RADIUS” Server Profile and “SAML Identity Provider” Server Profile to run the two services in tandem.

C.

Create and apply an authentication profile with the “SAML Identity Provider” Server Profile.

D.

Create and add the “SAML Identity Provider” Server Profile to the authentication profile for the “RADIUS” Server Profile.

Question 16

An organization runs multiple Kubernetes clusters both on-premises and in public clouds (AWS, Azure, GCP). They want to deploy the Palo Alto Networks CN-Series NGFW to secure east-west traffic within each cluster, maintain consistent Security policies across all environments, and dynamically scale as containerized workloads spin up or down. They also plan to use a centralized Panorama instance for policy management and visibility.

Which approach meets these requirements?

Options:

A.

Install standalone CN-Series instances in each cluster with local configuration only. Export daily policy configuration snapshots to Panorama for recordkeeping, but do not unify policy enforcement.

B.

Configure the CN-Series only in public cloud clusters, and rely on Kubernetes Network Policies for on-premises cluster security. Synchronize partial policy information into Panorama manually as needed.

C.

Use Kubernetes-native deployment tools (e.g., Helm) to deploy CN-Series in each cluster, ensuring local insertion into the service mesh or CNI. Manage all CN-Series firewalls centrally from Panorama, applying uniform Security policies across on-premises and cloud clusters.

D.

Deploy a single CN-Series firewall in the on-premises data center to process traffic for all clusters, connecting remote clusters via VPN or peering. Manage this single instance through Panorama.

Question 17

A multinational organization wants to use the Cloud Identity Engine (CIE) to aggregate identity data from multiple sources (on premises AD, Azure AD, Okta) while enforcing strict data isolation for different regional business units. Each region’s firewalls, managed via Panorama, must only receive the user and group information relevant to that region. The organization aims to minimize administrative overhead while meeting data sovereignty requirements.

Which approach achieves this segmentation of identity data?

Options:

A.

Create one CIE tenant, aggregate all identity data into a single view, and redistribute the full dataset to all firewalls. Rely on per-firewall Security policies to restrict access to out-of-scope user and group information.

B.

Establish separate CIE tenants for each business unit, integrating each tenant with the relevant identity sources. Redistribute user and group data from each tenant only to the region’s firewalls, maintaining a strict one-to-one mapping of tenant to business unit.

C.

Disable redistribution of identity data entirely. Instead, configure each regional firewall to pull user and group details directly from its local identity providers (IdPs).

D.

Deploy a single CIE tenant that collects all identity data, then configure segments within the tenant to filter and redistribute only the relevant user/group sets to each regional firewall group.

Question 18

Which forwarding methods can be used on the Objects tab when configuring the Log Forwarding profile?

Options:

A.

Panorama, syslog, email

B.

Syslog, HTTP, NetFlow

C.

Panorama, ADEM, syslog

D.

SNMP, HTTP, RADIUS

Question 19

Which CLI command is used to configure the management interface as a DHCP client?

Options:

A.

set network dhcp interface management

B.

set network dhcp type management-interface

C.

set deviceconfig system type dhcp-client

D.

set deviceconfig management type dhcp-client