Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Network Security Administrator NGFW-Engineer Questions and answers with Dumpstech

Exam NGFW-Engineer Premium Access

View all detail and faqs for the NGFW-Engineer exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

When considering the various methods for User-ID to learn user-to-IP address mappings, which source is considered the most accurate due to the mapping being explicitly created through an authentication event directly with the firewall?

Options:

A.

X-Forwarded-For (XFF) headers

B.

Server monitoring

C.

GlobalProtect

D.

Authentication Portal

Questions # 12:

In a hybrid cloud deployment, what is the primary function of Ansible in managing Palo Alto Networks NGFWs?

Options:

A.

It provides a web interface for managing NGFW hardware clusters.

B.

It enables centralized log collection and correlation for NGFWs.

C.

It facilitates dynamic updates to NGFW threat databases.

D.

It automates NGFW policy updates and configurations through playbooks.

Questions # 13:

Which two statements describe an external zone in the context of virtual systems (VSYS) on a Palo Alto Networks firewall? (Choose two.)

Options:

A.

It is associated with an interface within a VSYS of a firewall.

B.

It is a security object associated with a specific virtual router of a VSYS.

C.

It is not associated with an interface; it is associated with a VSYS itself.

D.

It is a security object associated with a specific VSYS.

Questions # 14:

Without performing a context switch, which set of operations can be performed that will affect the operation of a connected firewall on the Panorama GUI?

Options:

A.

Restarting the local firewall, running a packet capture, accessing the firewall CLI

B.

Modification of local security rules, modification of a Layer 3 interface, modification of the firewall device hostname

C.

Modification of pre-security rules, modification of a virtual router, modification of an IKE Gateway Network Profile

D.

Modification of post NAT rules, creation of new views on the local firewall ACC tab, creation of local custom reports

Questions # 15:

A PA-Series firewall with all licensable features is being installed. The customer’s Security policy requires that users do not directly access websites. Instead, a security device must create the connection, and there must be authentication back to the Active Directory servers for all sessions.

Which action meets the requirements in this scenario?

Options:

A.

Deploy the transparent proxy with Web Cache Communications Protocol (WCCP).

B.

Deploy the Next-Generation Firewalls as normal and install the User-ID agent.

C.

Deploy the Advanced URL Filtering license and captive portal.

D.

Deploy the explicit proxy with Kerberos authentication scheme.

Questions # 16:

An NGFW engineer is configuring multiple Layer 2 interfaces on a Palo Alto Networks firewall, and all interfaces must be assigned to the same VLAN. During initial testing, it is reported that clients located behind the various interfaces cannot communicate with each other.

Which action taken by the engineer will resolve this issue?

Options:

A.

Configure each interface to belong to the same Layer 2 zone and enable IP routing between them.

B.

Assign each interface to the appropriate Layer 2 zone and configure a policy that allows traffic within the VLAN.

C.

Assign each interface to the appropriate Layer 2 zone and configure Security policies for interfaces not assigned to the same zone.

D.

Enable IP routing between the interfaces and configure a Security policy to allow traffic between interfaces within the VLAN.

Questions # 17:

A network security engineer needs to permit traffic between two distinct VSYS that reside on one Palo Alto Networks firewall. This traffic will not egress the firewall to an external device. Which zone type must be configured to act as the logical source and destination for this traffic flow?

Options:

A.

TAP

B.

Layer 2

C.

Layer 3

D.

External

Questions # 18:

According to dynamic updates best practices, what is the recommended threshold value for content updates in a mission- critical network?

Options:

A.

8 hours

B.

16 hours

C.

32 hours

D.

48 hours

Questions # 19:

What must be configured before a firewall administrator can define policy rules based on users and groups?

Options:

A.

User Mapping profile

B.

Authentication profile

C.

Group mapping settings

D.

LDAP Server profile

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions