Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Network Security Administrator NetSec-Generalist Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam NetSec-Generalist Premium Access

View all detail and faqs for the NetSec-Generalist exam


544 Students Passed

89% Average Score

97% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the most efficient way in Strata Cloud Manager (SCM) to apply a Security policy to all ten firewalls in one data center?

Options:

A.

Create the Security policyon each firewall individually.

B.

Set the configuration scope to "Global" and create the Security policy.

C.

Create the Security policy at any configuration scope, thenclone it to the ten firewalls.

D.

Create a folder that groups the ten firewalls together, then createthe Security policy at thatconfiguration scope.

Questions # 2:

Which action must a firewall administrator take to incorporate custom vulnerability signatures into current Security policies?

Options:

A.

Create custom objects.

B.

Download WildFire updates.

C.

Download threat updates.

D.

Create custom policies.

Questions # 3:

Question # 3

A network administrator is using DNAT to map two servers to one public IP address. Traffic will be directed to a specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.

Which two sets of Security policy rules will accomplish this configuration? (Choose two.)

Options:

A.

Source: Untrust (Any) Destination: Untrust Application(s): web-browsing Action: allow

B.

Source: Untrust (Any) Destination: Trust Application(s): web-browsing, ssh Action: allow

C.

Source: Untrust (Any) Destination: DMZ Application(s): web-browsing Action: allow

D.

Source: Untrust (Any) Destination: DMZ Application(s): ssh Action: allow

Questions # 4:

Which functionality does an NGFW use to determine whether new session setups are legitimate or illegitimate?

Options:

A.

SYN flood protection

B.

SYN bit

C.

Random Early Detection (RED)

D.

SYN cookies

Questions # 5:

What is the primary role of Advanced DNS Security in protecting against DNS-based threats?

Options:

A.

It replaces traditional DNS servers with more reliable and secure ones.

B.

It centralizes all DNS management and simplifies policy creation.

C.

It automatically redirects all DNS traffic through encrypted tunnels.

D.

It uses machine learning (ML) to detect and block malicious domains in real-time.

Questions # 6:

What is the main security benefit of adding a CN-Series firewall to an existing VM-Series firewall deployment when the customer is using containers?

Options:

A.

It provides perimeter threat detection and inspection outside the container itself.

B.

It prevents lateral threat movement within the container itself.

C.

It monitors and logs traffic outside the container itself.

D.

It enables core zone segmentation within the container itself.

Questions # 7:

A company uses Prisma Access to provide secure connectivity for mobile users to access its corporate-sanctioned Google Workspace and wants to block access to all unsanctioned Google Workspace environments.

What would an administrator configure in the snippet to achieve this goal?

Options:

A.

Dynamic Address Groups

B.

Tenant restrictions

C.

Dynamic User Groups

D.

URL category

Questions # 8:

Which feature is available in both Panorama and Strata Cloud Manager (SCM)?

Options:

A.

Template stacks

B.

Configuration snippets

C.

Policy Optimizer

D.

Plug-ins

Questions # 9:

A company currently uses Prisma Access for its mobile users. A use case is discovered in which mobile users will need to access an internal site, but there is no existing network communication between the mobile users and the internal site.

Which Prisma Access functionality needs to be deployed to enable routing between the mobile users and the internal site?

Options:

A.

Interconnect license

B.

Service connection

C.

Autonomous Digital Experience Manager (ADEM)

D.

Security processing node

Questions # 10:

Based on the image below, which source IP address will be seen in the data filtering logs of the Cloud NGFW for AWS with the default rulestack settings?

Question # 10

Options:

A.

10.1.1.3

B.

20.10.10.16

C.

20.10.10.15

D.

10.1.1.2

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.