Paloalto Networks NetSec-Analyst Palo Alto Networks Network Security Analyst Exam Practice Test
Palo Alto Networks Network Security Analyst Questions and Answers
A financial company is deploying NGFWs with the Advanced SD-WAN subscription to improve uptime and bandwidth across thousands of ATMs. The company requires that traffic flows to the internal application needed by the ATMs always use the path with the lowest latency and packet loss.
Which unique SD-WAN rule parameters meet this criteria?
A financial institution must comply with a regulation that prohibits the decryption of any traffic destined for "Banking" or "Healthcare" websites. How should the analyst implement this requirement while still decrypting other web traffic?
Which object type allows an analyst to group multiple IP addresses based on their geographical location (country) to simplify "Geo-blocking" policies?
Which security profile is specifically designed to protect against "Domain Generation Algorithms" (DGA) and DNS tunneling?
A security administrator needs to block access to a specific list of 500 malicious domains. These domains are updated daily by a third-party intelligence feed. What is the most efficient way to manage these domains as an object?
An analyst wants to ensure that any traffic from the "Guest-Zone" to the "Internal-Zone" is always inspected, even if there is no explicit security rule defined. Which default behavior should the analyst be aware of?
DNS rewrite can only be configured on a NAT rule with which type of destination address translation?
What is the purpose of the "Config Audit" feature in Panorama?
An analyst notices that a security rule intended to block a specific application is being bypassed. Upon investigation, the analyst finds that the traffic is matching a rule higher in the list. Which tool provides a visual "Shadowing" check to identify rules that will never be hit?
When performing a "Push to Devices" from Panorama, an analyst wants to ensure that the push only affects a specific firewall in a shared Device Group. Which option in the push window allows this granular selection?
What is the most granular method for ensuring that traffic to a firewall’s public IP address on the public interface is translated to the private IP address of the web server?
What is the function of a "Service" object in a Palo Alto Networks firewall configuration?
Which tool should an analyst use to view a real-time, graphical representation of the top applications, users, and threats across the network to identify immediate anomalies?
A company requires that all encrypted traffic from the "Accounting" department be decrypted for inspection, while all other departments remain encrypted. How should the analyst configure the Decryption Policy?
A company wants to ensure that any file uploaded to a specific cloud storage provider is immediately analyzed for malware, even if the file has never been seen before. Which action should be set in the WildFire Analysis Profile?
A security administrator is creating an address object for a partner organization whose public IP address is unknown but who always uses a specific domain name. Which address object type should be used?
An analyst needs to create a rule that allows a specific group of users to access a cloud application. The application's IP addresses change frequently, but the application is associated with a specific FQDN. What is the most efficient object type to use in this scenario?
An organization uses several different web-conferencing tools (Zoom, Microsoft Teams, WebEx). The analyst wants to create a single security rule to allow all these tools without listing each App-ID individually. What should the analyst create?
A firewall is showing high "Packet Buffer" utilization, causing network latency. Which type of traffic is most likely to cause this issue if it is not correctly managed?
An analyst is troubleshooting a policy that is not matching traffic as expected. After reviewing the logs, the analyst sees that the traffic is matching a rule with a lower priority. Which feature allows the analyst to compare two rules side-by-side to identify the conflict?
What are two valid pattern types in a Data Filtering profile? (Choose two.)
Which object allows an analyst to group different applications together based on a specific business function, such as "Social-Media" or "Collaboration," to simplify policy management?