Easter Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks NGFW-Engineer Palo Alto Networks Next-Generation Firewall Engineer Exam Practice Test

Page: 1 / 5
Total 50 questions

Palo Alto Networks Next-Generation Firewall Engineer Questions and Answers

Question 1

In a Palo Alto Networks environment, GlobalProtect has been enabled using certificate-based authentication for both users and devices. To ensure proper validation of certificates, one or more certificate profiles are configured.

What function do certificate profiles serve in this context?

Options:

A.

They store private keys for users and devices, effectively allowing the firewall to issue or reissue certificates if the primary Certificate Authority (CA) becomes unavailable, providing a built-in fallback CA to maintain continuous certificate issuance and authentication.

B.

They define trust anchors (root / intermediate Certificate Authorities (CAs)), specify revocation checks (CRL/OCSP), and map certificate attributes (e.g., CN) for user or device authentication.

C.

They allow the firewall to bypass certificate validation entirely, focusing only on username / password-based authentication.

D.

They provide a one-click mechanism to distribute certificates to all endpoints without relying on external enrollment methods.

Question 2

Which two statements describe an external zone in the context of virtual systems (VSYS) on a Palo Alto Networks firewall? (Choose two.)

Options:

A.

It is associated with an interface within a VSYS of a firewall.

B.

It is a security object associated with a specific virtual router of a VSYS.

C.

It is not associated with an interface; it is associated with a VSYS itself.

D.

It is a security object associated with a specific VSYS.

Question 3

To maintain security efficacy of its public cloud resources by using native tools, a company purchases Cloud NGFW credits to replicate the Panorama, PA-Series, and VM-Series devices used in physical data centers. Resources exist on AWS and Azure:

The AWS deployment is architected with AWS Transit Gateway, to which all resources connect

The Azure deployment is architected with each application independently routing traffic

The engineer deploying Cloud NGFW in these two cloud environments must account for the following:

Minimize changes to the two cloud environments

Scale to the demands of the applications while using the least amount of compute resources

Allow the company to unify the Security policies across all protected areas

Which two implementations will meet these requirements? (Choose two.)

Options:

A.

Deploy a VM-Series firewall in AWS in each VPC, create an IPSec tunnel between AWS and Azure, and manage the policy with Panorama.

B.

Deploy Cloud NGFW for Azure in vNET/s, update the vNET/s routing to path traffic through the deployed NGFWs, and manage the policy with Panorama.

C.

Deploy Cloud NGFW for Azure in vWAN, create a vWAN to route all appropriate traffic to the Cloud NGFW attached to the vWAN, and manage the policy with local rules.

D.

Deploy Cloud NGFW for AWS in a centralized Security VPC, update the Transit Gateway to route all appropriate traffic through the Security VPC, and manage the policy with Panorama.

Question 4

An engineer at a managed services provider is updating an application that allows its customers to request firewall changes to also manage SD-WAN. The application will be able to make any approved changes directly to devices via API.

What is a requirement for the application to create SD-WAN interfaces?

Options:

A.

REST API’s “sdwanInterfaceprofiles” parameter on a Panorama device

B.

REST API’s “sdwanInterfaces” parameter on a firewall device

C.

XML API’s “sdwanprofiles/interfaces” parameter on a Panorama device

D.

XML API’s “InterfaceProfiles/sdwan” parameter on a firewall device

Question 5

Which statement describes the role of Terraform in deploying Palo Alto Networks NGFWs?

Options:

A.

It acts as a logging service for NGFW performance metrics.

B.

It orchestrates real-time traffic inspection for network segments.

C.

It provides Infrastructure-as-Code (IaC) to automate NGFW deployment.

D.

It manages threat intelligence data synchronization with NGFWs.

Question 6

Which configuration step is required when implementing a new self-signed root certificate authority (CA) certificate for SSL decryption on a Palo Alto Networks firewall?

Options:

A.

Import the new subordinate CA certificate into the trust stores of all client devices.

B.

Set the subordinate CA certificate as the default routing certificate for all network traffic.

C.

Configure the subordinate CA to issue certificates with indefinite validity periods.

D.

Disable all existing SSL decryption rules until the new certificate is fully propagated.

Question 7

How does a Palo Alto Networks firewall choose the best route when it receives routes for the same destination from different routing protocols?

Options:

A.

The route that was received first will be entered into the forwarding table, and all subsequent routes will be rejected.

B.

It will attempt to load balance the traffic across all routes.

C.

It compares the administrative distance and chooses the one with the highest value.

D.

It compares the administrative distance and chooses the one with the lowest value.

Question 8

A PA-Series firewall with all licensable features is being installed. The customer’s Security policy requires that users do not directly access websites. Instead, a security device must create the connection, and there must be authentication back to the Active Directory servers for all sessions.

Which action meets the requirements in this scenario?

Options:

A.

Deploy the transparent proxy with Web Cache Communications Protocol (WCCP).

B.

Deploy the Next-Generation Firewalls as normal and install the User-ID agent.

C.

Deploy the Advanced URL Filtering license and captive portal.

D.

Deploy the explicit proxy with Kerberos authentication scheme.

Question 9

According to dynamic updates best practices, what is the recommended threshold value for content updates in a mission- critical network?

Options:

A.

8 hours

B.

16 hours

C.

32 hours

D.

48 hours

Question 10

Which two statements apply to configuring required security rules when setting up an IPSec tunnel between a Palo Alto Networks firewall and a third- party gateway? (Choose two.)

Options:

A.

For incoming and outgoing traffic through the tunnel, creating separate rules for each direction is optional.

B.

The IKE negotiation and IPSec/ESP packets are allowed by default via the intrazone default allow policy.

C.

For incoming and outgoing traffic through the tunnel, separate rules must be created for each direction.

D.

The IKE negotiation and IPSec/ESP packets are denied by default via the interzone default deny policy.

Question 11

Which zone type allows traffic between zones in different virtual systems (VSYS), without the traffic leaving the firewall?

Options:

A.

Isolated

B.

Transient

C.

External

D.

Internal

Question 12

An NGFW engineer is configuring multiple Panorama-managed firewalls to start sending all logs to Strata Logging Service. The Strata Logging Service instance has been provisioned, the required device certificates have been installed, and Panorama and the firewalls have been successfully onboarded to Strata Logging Service.

Which configuration task must be performed to start sending the logs to Strata Logging Service and continue forwarding them to the Panorama log collectors as well?

Options:

A.

Modify all active Log Forwarding profiles to select the “Cloud Logging” option in each profile match list in the appropriate device groups.

B.

Enable the “Panorama/Cloud Logging” option in the Logging and Reporting Settings section under Device --> Setup --> Management in the appropriate templates.

C.

Select the “Enable Duplicate Logging” option in the Cloud Logging section under Device --> Setup --> Management in the appropriate templates.

D.

Select the “Enable Cloud Logging” option in the Cloud Logging section under Device --> Setup --> Management in the appropriate templates.

Question 13

An organization runs multiple Kubernetes clusters both on-premises and in public clouds (AWS, Azure, GCP). They want to deploy the Palo Alto Networks CN-Series NGFW to secure east-west traffic within each cluster, maintain consistent Security policies across all environments, and dynamically scale as containerized workloads spin up or down. They also plan to use a centralized Panorama instance for policy management and visibility.

Which approach meets these requirements?

Options:

A.

Install standalone CN-Series instances in each cluster with local configuration only. Export daily policy configuration snapshots to Panorama for recordkeeping, but do not unify policy enforcement.

B.

Configure the CN-Series only in public cloud clusters, and rely on Kubernetes Network Policies for on-premises cluster security. Synchronize partial policy information into Panorama manually as needed.

C.

Use Kubernetes-native deployment tools (e.g., Helm) to deploy CN-Series in each cluster, ensuring local insertion into the service mesh or CNI. Manage all CN-Series firewalls centrally from Panorama, applying uniform Security policies across on-premises and cloud clusters.

D.

Deploy a single CN-Series firewall in the on-premises data center to process traffic for all clusters, connecting remote clusters via VPN or peering. Manage this single instance through Panorama.

Question 14

A multinational organization wants to use the Cloud Identity Engine (CIE) to aggregate identity data from multiple sources (on premises AD, Azure AD, Okta) while enforcing strict data isolation for different regional business units. Each region’s firewalls, managed via Panorama, must only receive the user and group information relevant to that region. The organization aims to minimize administrative overhead while meeting data sovereignty requirements.

Which approach achieves this segmentation of identity data?

Options:

A.

Create one CIE tenant, aggregate all identity data into a single view, and redistribute the full dataset to all firewalls. Rely on per-firewall Security policies to restrict access to out-of-scope user and group information.

B.

Establish separate CIE tenants for each business unit, integrating each tenant with the relevant identity sources. Redistribute user and group data from each tenant only to the region’s firewalls, maintaining a strict one-to-one mapping of tenant to business unit.

C.

Disable redistribution of identity data entirely. Instead, configure each regional firewall to pull user and group details directly from its local identity providers (IdPs).

D.

Deploy a single CIE tenant that collects all identity data, then configure segments within the tenant to filter and redistribute only the relevant user/group sets to each regional firewall group.

Question 15

Which set of options is available for detailed logs when building a custom report on a Palo Alto Networks NGFW?

Options:

A.

Traffic, User-ID, URL

B.

Traffic, threat, data filtering, User-ID

C.

GlobalProtect, traffic, application statistics

D.

Threat, GlobalProtect, application statistics, WildFire submissions

Page: 1 / 5
Total 50 questions