Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SD-WAN-Engineer Questions and Answers

Question # 6

What is the default behavior of the Zone-Based Firewall (ZBFW) for traffic originating from the ION device itself (e.g., DNS queries, NTP sync, or Controller connectivity) destined for the "Internet" zone?

A.

 It is denied by the default "Deny All" rule unless explicitly allowed.

B.

 It is allowed by the implicit "Self-Zone" allow rule.

C.

 It is allowed only if the "Management" interface is used.

D.

 It is inspected by the "Global" security stack but bypasses local rules.

Full Access
Question # 7

An ION 3000 device at a remote branch has suffered a critical hardware failure and must be replaced via the RMA process. The administrator has received the replacement unit.

What is the correct procedure to transfer the configuration and license from the defective unit to the replacement unit to ensure minimal downtime and retention of historical data?

A.

 Manually configure the new device from scratch, then open a support ticket to transfer the license.

B.

 Use the "Replace Device" workflow in the Prisma SD-WAN portal, which automatically transfers the configuration (Device Shell) and re-associates the site to the new serial number.

C.

 Backup the configuration of the old device to a USB drive and restore it to the new device using the local console.

D.

 Delete the old device from the portal, create a new site for the replacement device, and rebuild the policies manually.

Full Access
Question # 8

In a Prisma SD-WAN deployment, what is the defining characteristic of a "Standard VPN" compared to a "Secure Fabric Link"?

A.

 Standard VPNs use GRE encapsulation, while Secure Fabric Links use VXLAN.

B.

 Standard VPNs are automatically built between ION devices, while Secure Fabric Links require manual configuration.

C.

 Standard VPNs are manually configured IPSec tunnels to non-ION endpoints, while Secure Fabric Links are automated tunnels between ION devices.

D.

 Standard VPNs support BGP, whereas Secure Fabric Links only support static routing.

Full Access
Question # 9

Where is route leaking configured between VRFs?

A.

VRF definition

B.

BGP peer

C.

Site configuration

D.

VRF profile

Full Access
Question # 10

Which statements accurately describes how the Prisma SD-WAN zone-based firewall functions within a branch network?

A.

North-south traffic (internet/WAN egress) is handled by zone-based firewall and relies on external firewalls for east-west segmentation.1

B.

East-west traffic between the zones can be explicitly blocked, but traditional Access Control List (ACLs) are required to block north-south traffic.

C.

North-south traffic is handled by application-aware policies, while east-west traffic requires traditional Access Control List (ACLs).

D.

Security zones enable granular control over both WAN-to-LAN and LAN-to-WAN as well as east-west (LAN-to-LAN) traffic flows within the branch.

Full Access
Question # 11

Which component of Prisma SD-WAN is responsible for distributing User-IP and user-group mappings to branch devices that match the corresponding source IPs?

A.

DC ION

B.

Cloud Identity Engine

C.

Controller

D.

NGFW

Full Access
Question # 12

An organization has created a custom internal application definition for "Inventory_App" on the Prisma SD-WAN controller based on its destination IP address and port (L3/L4 rule). The application server IP has just changed.

After updating the custom application definition on the controller, how is this change propagated to the branch ION devices?

A.

 The administrator must manually "Push" the policy to all sites.

B.

 The administrator must reboot the ION devices for the new object to load.

C.

 The controller automatically pushes the updated Application Definition (App-Def) to all ION devices immediately.

D.

 The change will only take effect after the daily "App-ID" scheduled update.

Full Access
Question # 13

For how many hours are Prisma SD-WAN VPN shared secrets valid?

A.

1

B.

8

C.

24

D.

72

Full Access
Question # 14

User-ID integration is configured for a Prisma SD-WAN deployment. Branch-1 has the user-to-IP mappings available, and User-1 is mapped to IP-1.

To which two use cases can User-ID based zone-based firewall policies be applied? (Choose two.)

A.

User-1 accessing a SaaS application on direct internet and source User-ID based zone-based firewall rules on Branch-1 ION

B.

User-1 accessing a private application within Branch-1, and source User-ID based zone-based firewall rules on Branch-1 ION

C.

User-1 accessing a private application in data center via SD-WAN overlay, and destination User-ID based zone-based firewall rules on DC ION

D.

User-1 accessing a private application in Branch-2 via SD-WAN overlay, and destination User-ID based zone-based firewall rules on Branch-2 ION

Full Access
Question # 15

There are periodic complaints about the poor performance of a real-time application.

What can be inferred about the performance issue, based on the Network Transfer Time (NTT) and Server Response Time (SRT) image below?

A.

The NTT value increases periodically resulting in higher SRT.

B.

The NTT value drops periodically due to network related issues.

C.

The SRT value increases periodically due to Application Server side issues.

D.

The SRT value drops periodically due to Application Server side issues.

Full Access
Question # 16

A network engineer is troubleshooting a user complaint regarding "slow application performance" for an internal web application. While viewing the Flow Browser in the Prisma SD-WAN portal, the engineer notices that the Server Response Time (SRT) is consistently high (over 500ms), while the Network Transfer Time (NTT) and Round Trip Time (RTT) are low (under 50ms).

What does this data indicate about the root cause of the issue?

A.

The issue is likely caused by congestion on the WAN circuit, requiring a QoS policy adjustment.

B.

The issue is likely on the application server itself (e.g., high CPU, slow database query), not the network.

C.

The issue is caused by a high packet loss rate on the internet path.

D.

The issue is due to a misconfigured DNS server at the branch.

Full Access
Question # 17

What is the primary function of the "CloudBlade" platform in a Prisma SD-WAN deployment when integrating with third-party services or Prisma Access?

A.

It acts as a physical line card on the ION device to provide additional 10Gbps interfaces.

B.

It is a containerized application running on the ION device that performs Deep Packet Inspection (DPI).

C.

It is a cloud-based API integration layer that automates the configuration of the ION devices and the remote service.

D.

It is a monitoring dashboard used exclusively for viewing flow records.

Full Access
Question # 18

Which specialized hardware feature is available on the ION 9000 series but NOT on the ION 3000 series, making it suitable for high-throughput Data Center deployments?

A.

 Support for LTE/5G SIM cards

B.

 Fail-to-Wire Bypass Pairs

C.

 10 Gigabit Ethernet (SFP+) ports

D.

 PoE+ (Power over Ethernet) output ports

Full Access
Question # 19

A network administrator notices that a branch ION device is experiencing high CPU utilization due to a suspected TCP SYN Flood attack originating from a compromised host on the local LAN.

Which specific security feature should be configured and applied to the "LAN" zone to mitigate this Denial of Service (DoS) attack?

A.

 Zone-Based Firewall (ZBFW) Rule with a "Deny" action

B.

 Zone Protection Profile

C.

 Application Quality Profile (AQP)

D.

 Access Control List (ACL) on the WAN interface

Full Access
Question # 20

Based on the HA topology image below, which two statements describe the end-state when power is removed from the ION 1200-S labeled “Active”, assuming that the ION labeled “Standby” becomes the active ION? (Choose two.)

A.

Both the connection to ISP A and the connection to LTE/5G will be usable.

B.

The VRRP Virtual IP address assigned to any SVIs will be moved to the newly active ION.

C.

The newly active ION will send a gratuitous ARP to the LAN for the IP address of any SVIs.

D.

The connection to ISP A will be usable, but the connection to LTE/5G will not.

Full Access
Question # 21

A network engineer is troubleshooting an ION device that is showing as "Offline" in the Prisma SD-WAN portal, despite the site reporting that local internet access is working. The engineer has console access to the device.

Which CLI command should be used to specifically validate the device's ability to resolve the controller's hostname and establish a secure connection to it over a specific interface?

A.

 ping

B.

 debug controller reachability

C.

 show system connectivity

D.

 dump vpn summary

Full Access
Question # 22

What does Prisma SD-WAN use for monitoring and operations to deliver flow data and application visibility?

A.

ADEM

B.

IPFIX

C.

SNMPv3

D.

IP SLA

Full Access
Question # 23

Which component of the Prisma SD-WAN solution is responsible for the deep application identification (App-ID) and the generation of flow metrics (Network Transfer Time, Server Response Time) at the branch?

A.

 The CloudBlade container

B.

 The Prisma SD-WAN Controller

C.

 The ION Device Data Plane

D.

 The API Gateway

Full Access
Question # 24

When configuring a Path Policy rule for a "Real-Time Video" application, the administrator wants to ensure the traffic uses the path with the lowest packet loss.

How does the Prisma SD-WAN ION determine the "Packet Loss" metric for a given path when there is no active user traffic flowing on that link?

A.

 It sends Active Probes (synthetic UDP packets) across the Secure Fabric to measure path quality continuously.

B.

 It relies solely on Passive Monitoring of TCP retransmissions from other user traffic on that link.

C.

 It queries the ISP's router via SNMP to retrieve interface error counters.

D.

 It defaults to a static value of 0% loss until user traffic begins.

Full Access
Question # 25

By default, how many days will Prisma SD-WAN VPNs stay operational before the keys expire when an ION device loses connection with the controller?

A.

1

B.

3

C.

5

D.

7

Full Access