Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NetSec-Pro Questions and Answers

Question # 6

Which firewall attribute can an engineer use to simplify rule creation and automatically adapt to changes in server roles or security posture based on log events?

A.

Address objects

B.

Dynamic Address Groups

C.

Dynamic User Groups

D.

Predefined IP addresses

Full Access
Question # 7

In a service provider environment, what key advantage does implementing virtual systems provide for managing multiple customer environments?

A.

Shared threat prevention policies across all tenants

B.

Centralized authentication for all customer domains

C.

Unified logging across all virtual systems

D.

Logical separation of control and Security policy

Full Access
Question # 8

Which set of attributes is used by IoT Security to identify and classify appliances on a network when determining Device-ID?

A.

IP address, network traffic patterns, and device type

B.

MAC address, device manufacturer, and operating system

C.

Hostname, application usage, and encryption method

D.

Device model, firmware version, and user credential

Full Access
Question # 9

What key capability distinguishes Content-ID technology from conventional network security approaches?

A.

It performs packet header analysis short of deep packet inspection.

B.

It provides single-pass application layer inspection for real-time threat prevention.

C.

It exclusively monitors network traffic volumes.

D.

It relies primarily on reputation-based filtering.

Full Access
Question # 10

Which step is necessary to ensure an organization is using the inline cloud analysis features in its Advanced Threat Prevention subscription?

A.

Disable anti-spyware to avoid performance impacts and rely solely on external threat intelligence.

B.

Enable SSL decryption in Security policies to inspect and analyze encrypted traffic for threats.

C.

Update or create a new anti-spyware security profile and enable the appropriate local deep learning models.

D.

Configure Advanced Threat Prevention profiles with default settings and only focus on high-risk traffic to avoid affecting network performance.

Full Access
Question # 11

Which action optimizes user experience across a segmented network architecture and implements the most effective method to maintain secure connectivity between branch and campus locations?

A.

Establish site-to-site tunnels on each branch and campus firewall and have individual VLANs for each department.

B.

Configure all branch and campus firewalls to use a single shared broadcast domain.

C.

Implement SD-WAN to route all traffic based on network performance metrics and use zone protection profiles.

D.

Configure a single campus firewall to handle the routing of all branch traffic.

Full Access
Question # 12

During a security incident investigation, which Security profile will have logs of attempted confidential data exfiltration?

A.

File Blocking Profile

B.

Enterprise DLP Profile

C.

Vulnerability Protection Profile

D.

WildFire Analysis Profile

Full Access
Question # 13

How are policies evaluated in the AWS management console when creating a Security policy for a Cloud NGFW?

A.

The administrator sets a rule order to determine the order in which they are evaluated.

B.

They can be dragged up or down the stack as they are evaluated.

C.

The administrator sets a rule priority to determine the order in which they are evaluated.

D.

They must be created in the order they are intended to be evaluated.

Full Access
Question # 14

Which two features can a network administrator use to troubleshoot the issue of a Prisma Access mobile user who is unable to access SaaS applications? (Choose two.)

A.

SaaS Application Risk Portal

B.

Capacity Analyzer

C.

GlobalProtect logs

D.

Autonomous Digital Experience Manager (ADEM) console

Full Access
Question # 15

A network engineer pushes specific Panorama reports of new AI URL category types to branch NGFWs. Which two report types achieve this goal? (Choose two.)

A.

SNMP

B.

Custom

C.

PDF summary

D.

CSV export

Full Access
Question # 16

Which two security services are required for configuration of NGFW Security policies to protect against malicious and misconfigured domains? (Choose two.)

A.

Advanced Threat Prevention

B.

SaaS Security

C.

Advanced WildFire

D.

Advanced DNS Security

Full Access
Question # 17

Which two types of logs must be forwarded to Strata Logging Service for IoT Security to function? (Choose two.)

A.

WildFire

B.

Enhanced application

C.

Threat

D.

URL Filtering

Full Access
Question # 18

What must be configured to successfully onboard a Prisma Access remote network using Strata Cloud Manager (SCM)?

A.

Cloud Identity Engine

B.

Autonomous Digital Experience Manager (ADEM)

C.

GlobalProtect agent

D.

IPSec termination node

Full Access