Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NGFW-Engineer Questions and Answers

Question # 6

By default, which type of traffic is configured by service route configuration to use the management interface?

A.

Security zone

B.

IPSec tunnel

C.

Virtual system (VSYS)

D.

Autonomous Digital Experience Manager (ADEM)

Full Access
Question # 7

An network engineer is configuring SSL Forward Proxy decryption on a Palo Alto Networks firewall. The company's internal clients trust a corporate root certificate authority (CA). To ensure the firewall can properly validate the certificates of external web servers, the engineer must configure a specific component. Which component defines the mechanism for Online Certificate Status Protocol (OCSP) / certificate revocation list (CRL) status?

A.

Certificate revocation checking

B.

SSL/TLS service profile

C.

Decryption profile

D.

Forward trust certificate

Full Access
Question # 8

An NGFW engineer is configuring multiple Panorama-managed firewalls to start sending all logs to Strata Logging Service. The Strata Logging Service instance has been provisioned, the required device certificates have been installed, and Panorama and the firewalls have been successfully onboarded to Strata Logging Service.

Which configuration task must be performed to start sending the logs to Strata Logging Service and continue forwarding them to the Panorama log collectors as well?

A.

Modify all active Log Forwarding profiles to select the “Cloud Logging” option in each profile match list in the appropriate device groups.

B.

Enable the “Panorama/Cloud Logging” option in the Logging and Reporting Settings section under Device --> Setup --> Management in the appropriate templates.

C.

Select the “Enable Duplicate Logging” option in the Cloud Logging section under Device --> Setup --> Management in the appropriate templates.

D.

Select the “Enable Cloud Logging” option in the Cloud Logging section under Device --> Setup --> Management in the appropriate templates.

Full Access
Question # 9

A firewall administrator needs to configure a new Palo Alto Networks firewall so that its management interface automatically obtains an IP address, netmask, and default gateway from the network. Which command should be executed in the CLI to accomplish this goal?

A.

set deviceconfig system type dhcp-client

B.

configure system management-interface ip dynamic

C.

set deviceconfig system interface mgt mode dhcp

D.

set network interface management dhcp enable

Full Access
Question # 10

What is a valid configurable limit for setting resource quotas when defining a new VSYS on a Palo Alto Networks firewall?

A.

Percentage of total CPU utilization

B.

Maximum number of SSL decryption rules

C.

Maximum number of virtual routers

D.

Disk space allocation for logs

Full Access
Question # 11

When considering the various methods for User-ID to learn user-to-IP address mappings, which source is considered the most accurate due to the mapping being explicitly created through an authentication event directly with the firewall?

A.

X-Forwarded-For (XFF) headers

B.

Server monitoring

C.

GlobalProtect

D.

Authentication Portal

Full Access
Question # 12

What is the purpose of assigning an Admin Role Profile to a user in a Palo Alto Networks NGFW?

A.

Allow access to all resources without restrictions.

B.

Enable multi-factor authentication (MFA) for administrator access.

C.

Define granular permissions for management tasks.

D.

Restrict access to sensitive report data.

Full Access
Question # 13

Which configuration step is required when implementing a new self-signed root certificate authority (CA) certificate for SSL decryption on a Palo Alto Networks firewall?

A.

Import the new subordinate CA certificate into the trust stores of all client devices.

B.

Set the subordinate CA certificate as the default routing certificate for all network traffic.

C.

Configure the subordinate CA to issue certificates with indefinite validity periods.

D.

Disable all existing SSL decryption rules until the new certificate is fully propagated.

Full Access
Question # 14

A network security engineer needs to permit traffic between two distinct VSYS that reside on one Palo Alto Networks firewall. This traffic will not egress the firewall to an external device. Which zone type must be configured to act as the logical source and destination for this traffic flow?

A.

TAP

B.

Layer 2

C.

Layer 3

D.

External

Full Access
Question # 15

Which networking technology can be configured on Layer 3 interfaces but not on Layer 2 interfaces?

A.

DDNS

B.

Link Duplex

C.

NetFlow

D.

LLDP

Full Access
Question # 16

Which statement describes the role of Terraform in deploying Palo Alto Networks NGFWs?

A.

It acts as a logging service for NGFW performance metrics.

B.

It orchestrates real-time traffic inspection for network segments.

C.

It provides Infrastructure-as-Code (IaC) to automate NGFW deployment.

D.

It manages threat intelligence data synchronization with NGFWs.

Full Access
Question # 17

A security administrator is hardening the ingress zone of an NGFW. The goal is to prevent attacks that rely on malformed IP address packets with incorrect header lengths or invalid TCP packets that have both the SYN and FIN flags set. Within which section of a Zone Protection profile should these protections be configured?

A.

Protocol Protection

B.

Packet-Based Attack Protection

C.

Reconnaissance Protection

D.

Flood Protection

Full Access
Question # 18

An engineer is configuring a site-to-site IPSec VPN to a partner network. The IKE Gateway and IPSec tunnel configurations are complete, and the tunnel interface has been assigned to a security zone. However, the tunnel fails to establish, and no application traffic passes through it once it is up. Which two Security policy configurations are required to allow tunnel establishment and data traffic flow in this scenario? (Choose two answers)

A.

A security rule is needed to allow IKE and IPSec traffic between the zone where the physical interface resides and the zone of the partner gateway.

B.

A single bidirectional security rule must be configured to manage traffic flowing through the tunnel interface.

C.

Security rules must be configured to permit application traffic from the local zone to the tunnel zone, and from the tunnel zone to the local zone.

D.

An Application Override policy is needed to allow both the IKE negotiation and the encapsulated data traffic.

Full Access
Question # 19

An engineer is troubleshooting a failed inter-VSYS communication path between a DMZ-VSYS and an Internal-VSYS. The configuration includes separate virtual routers with next-vr static routes and appropriate Security policies within each VSYS allowing traffic to and from their external zones. Given that all routing and policy configurations within each individual VSYS are correct, what is the probable cause of the failure?

A.

The intrazone-default policy is blocking the traffic because the two external zones are logically connected.

B.

A tunnel interface is required to connect the two virtual routers instead of using the next-vr option.

C.

The administrator did not configure Visible Virtual System.

D.

The external zones were not assigned the External zone type, preventing them from connecting.

Full Access