palo alto networks netsec-pro practice test

Palo Alto Networks Certified Network Security Professional

Last exam update: Nov 18 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 60

Question 1

Which procedure is most effective for maintaining continuity and security during a Prisma Access
data plane software upgrade?

  • A. Back up configurations, schedule upgrades during off-peak hours, and use a phased approach rather than attempting a network-wide rollout.
  • B. Use Strata Cloud Manager (SCM) to perform dynamic upgrades automatically and simultaneously across all locations at once to ensure network-wide uniformity.
  • C. Disable all security features during the upgrade to prevent conflicts and re-enable them after completion to ensure a smooth rollout process.
  • D. Perform the upgrade during peak business hours, quickly address any user-reported issues, and ensure immediate troubleshooting post-rollout.
Mark Question:
Answer:

A


Explanation:
The best practice for Prisma Access data plane upgrades involves backing up configurations,
scheduling upgrades during off-peak hours, and using a phased approach to minimize disruption and
maintain continuity. As per the Palo Alto Networks documentation:
“To minimize disruptions, it is recommended to perform Prisma Access upgrades during non-
business hours and in a phased manner, starting with less critical sites to validate the process before
moving to critical locations. Backup configurations and validate the system’s readiness to avoid data
loss and maintain service continuity.”
(Source: Prisma Access Best Practices)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

An NGFW administrator is updating PAN-OS on company data center firewalls managed by Panoram
a. Prior to installing the update, what must the administrator verify to ensure the devices will
continue to be supported by Panorama?

  • A. Device telemetry is enabled.
  • B. Panorama is configured as the primary device in the log collecting group for the data center firewalls.
  • C. All devices are in the same template stack.
  • D. Panorama is running the same or newer PAN-OS release as the one being installed.
Mark Question:
Answer:

D


Explanation:
The firewall must be running a PAN-OS version that is supported by Panorama. This means that
Panorama must be running the same or a newer PAN-OS version as the one being installed on the
firewalls to maintain compatibility.
“Before you upgrade the firewall, ensure that Panorama is running the same or a later PAN-OS
version than the firewall. Panorama must always be at the same or a higher version to maintain
compatibility.”
(Source: Panorama Admin Guide – Upgrade Process)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

In which two applications can Prisma Access threat logs for mobile user traffic be reviewed? (Choose
two.)

  • A. Prisma Cloud dashboard
  • B. Strata Cloud Manager (SCM)
  • C. Strata Logging Service
  • D. Service connection firewall
Mark Question:
Answer:

B, C


Explanation:
Threat logs for Prisma Access mobile users can be reviewed in both Strata Cloud Manager (SCM) and
Strata Logging Service. Prisma Cloud and service connection firewalls are not directly tied to mobile
user traffic logs.
“Prisma Access logs are available in the Strata Cloud Manager and can also be sent to the Strata
Logging Service for detailed analysis and threat visibility.”
(Source: Prisma Access Administration Guide)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which two tools can be used to configure Cloud NGFWs for AWS? (Choose two.)

  • A. Cortex XSIAM
  • B. Prisma Cloud management console
  • C. Panorama
  • D. Cloud service provider's management console
Mark Question:
Answer:

C, D


Explanation:
Cloud NGFW for AWS can be configured using Panorama for centralized management, as well as the
AWS management console for native integration and configuration.
“You can configure Cloud NGFW for AWS using Panorama for centralized security management, or
directly through the AWS management console to deploy and manage security services for your AWS
resources.”
(Source: Cloud NGFW for AWS Guide)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Using Prisma Access, which solution provides the most security coverage of network protocols for
the mobile workforce?

  • A. Explicit proxy
  • B. Client-based VPN
  • C. Enterprise browser
  • D. Clientless VPN
Mark Question:
Answer:

B


Explanation:
Client-based VPN solutions like GlobalProtect provide full coverage for the mobile workforce by
extending the enterprise security stack to remote endpoints. It establishes a secure tunnel, allowing
consistent security policies across the enterprise perimeter and the mobile workforce.
“GlobalProtect is a client-based VPN that provides secure, consistent protection for mobile users by
extending the security capabilities of Prisma Access to remote endpoints, covering all network
protocols.”
(Source: GlobalProtect Admin Guide)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which two prerequisites must be evaluated when decrypting internet-bound traffic? (Choose two.)

  • A. RADIUS profile
  • B. Incomplete certificate chains
  • C. Certificate pinning
  • D. SAML certificate
Mark Question:
Answer:

B, C


Explanation:
When implementing SSL Forward Proxy decryption for outbound traffic, two key challenges that must
be evaluated are:
Incomplete certificate chains: This occurs when the firewall cannot validate the entire certificate
chain for a site, which may cause decryption failures.
Certificate pinning: Applications like banking apps may use certificate pinning to prevent MITM
(man-in-the-middle) attacks, and these applications will break if SSL Forward Proxy is used.
“When decrypting outbound SSL traffic, you must consider incomplete certificate chains, which can
cause decryption to fail if the firewall cannot validate the entire chain. Also, be aware of certificate
pinning in applications that prevents decryption by rejecting forged certificates.”
(Source: Palo Alto Networks Decryption Concepts)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which firewall attribute can an engineer use to simplify rule creation and automatically adapt to
changes in server roles or security posture based on log events?

  • A. Address objects
  • B. Dynamic Address Groups
  • C. Dynamic User Groups
  • D. Predefined IP addresses
Mark Question:
Answer:

B


Explanation:
Dynamic Address Groups enable the firewall to automatically adjust security policies based on tags
assigned dynamically (via log events, API, etc.). This eliminates the need for manual updates to
policies when server roles or IPs change.
“Dynamic Address Groups allow you to create policies that automatically adapt to changes in the
environment. These groups are populated dynamically based on tags, enabling automated security
policy updates without manual intervention.”
(Source: Dynamic Address Groups)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

How does a firewall behave when SSL Inbound Inspection is enabled?

  • A. It acts transparently between the client and the internal server.
  • B. It decrypts inbound and outbound SSH connections.
  • C. It decrypts traffic between the client and the external server.
  • D. It acts as meddler-in-the-middle between the client and the internal server.
Mark Question:
Answer:

D


Explanation:
SSL Inbound Inspection allows the firewall to decrypt incoming encrypted traffic to internal servers
(e.g., web servers) by acting as a man-in-the-middle (MITM). The firewall uses the private key of the
server to decrypt the session and apply security policies before re-encrypting the traffic.
“SSL Inbound Inspection requires you to import the server’s private key and certificate into the
firewall. The firewall then acts as a man-in-the-middle (MITM) to decrypt inbound sessions from
external clients to internal servers for inspection.”
(Source: SSL Inbound Inspection)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

When a firewall acts as an application-level gateway (ALG), what does it require in order to establish
a connection?

  • A. Dynamic IP and Port (DIPP)
  • B. Payload
  • C. Session Initiation Protocol (SIP)
  • D. Pinholes
Mark Question:
Answer:

B


Explanation:
An ALG is designed to inspect and modify the payload of application-layer protocols (like SIP, FTP,
etc.) to manage dynamic port allocations and session information.
“Application Layer Gateways (ALGs) inspect the payload of certain protocols to dynamically manage
sessions that use dynamic port assignments. By modifying payloads, the ALG ensures that NAT and
security policies are correctly applied.”
(Source: ALG Support)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which security profile provides real-time protection against threat actors who exploit the
misconfigurations of DNS infrastructure and redirect traffic to malicious domains?

  • A. Antivirus
  • B. URL Filtering
  • C. Vulnerability Protection
  • D. Anti-spyware
Mark Question:
Answer:

D


Explanation:
The Anti-spyware profile includes DNS-based protections like sinkholing and detection of DNS
queries to malicious domains, offering real-time protection against attacks that exploit DNS
misconfigurations.
“The Anti-Spyware profile protects against DNS-based threats by sinkholing DNS queries to malicious
domains and detecting suspicious DNS activity, thus blocking data exfiltration and C2
communication.”
(Source: Anti-Spyware Profiles)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which method in the WildFire analysis report detonates unknown submissions to provide visibility
into real-world effects and behavior?

  • A. Dynamic analysis
  • B. Static analysis
  • C. Intelligent Run-time Memory Analysis
  • D. Machine learning (ML)
Mark Question:
Answer:

A


Explanation:
Dynamic analysis in WildFire refers to executing unknown files in a controlled environment (sandbox)
to observe their real-world behavior. This allows the firewall to detect zero-day threats and advanced
malware by directly analyzing the file’s impact on a system.
“WildFire dynamic analysis detonates unknown files in a secure sandbox environment, analyzing
real-world effects, behaviors, and potential malicious activity.”
(Source: WildFire Analysis)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

How many places will a firewall administrator need to create and configure a custom data loss
prevention (DLP) profile across Prisma Access and the NGFW?

  • A. One
  • B. Two
  • C. Three
  • D. Four
Mark Question:
Answer:

A


Explanation:
Palo Alto Networks' Enterprise DLP uses a centralized DLP profile that can be applied consistently
across both Prisma Access and NGFWs using Strata Cloud Manager (SCM). This eliminates the need
for duplicating efforts across multiple locations.
“Enterprise DLP profiles are created and managed centrally through the Cloud Management
Interface and can be used seamlessly across NGFW and Prisma Access deployments.”
(Source: Enterprise DLP Overview)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

A cloud security architect is designing a certificate management strategy for Strata Cloud Manager
(SCM) across hybrid environments. Which practice ensures optimal security with low management
overhead?

  • A. Deploy centralized certificate automation with standardized protocols and continuous monitoring.
  • B. Implement separate certificate authorities with independent validation rules for each cloud environment.
  • C. Configure manual certificate deployment with quarterly reviews and environment-specific security protocols.
  • D. Use cloud provider default certificates with scheduled synchronization and localized renewal processes.
Mark Question:
Answer:

A


Explanation:
A centralized certificate automation approach reduces management overhead and security risks by
standardizing processes, automating renewals, and continuously monitoring the certificate lifecycle.
“Implementing a centralized certificate management approach with automation and continuous
monitoring ensures optimal security while reducing operational complexity in hybrid environments.”
(Source: Best Practices for Certificate Management)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which set of practices should be implemented with Cloud Access Security Broker (CASB) to ensure
robust data encryption and protect sensitive information in SaaS applications?

  • A. Do not enable encryption for data-at-rest to improve performance.
  • B. Use default encryption keys provided by the SaaS provider.
  • C. Perform annual encryption key rotations.
  • D. Enable encryption for data-at-rest and in transit, regularly update encryption keys, and use strong encryption algorithms.
Mark Question:
Answer:

D


Explanation:
CASB integration should focus on comprehensive data protection, which includes encryption for
data-at-rest and in transit, frequent key updates, and using strong encryption algorithms to ensure
confidentiality and data integrity.
“CASB solutions should enforce encryption for data-at-rest and in transit, implement key rotation
policies, and leverage robust encryption algorithms to protect sensitive SaaS application data.”
(Source: CASB Deployment Best Practices)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

How does Strata Logging Service help resolve ever-increasing log retention needs for a company
using Prisma Access?

  • A. It increases resilience due to decentralized collection and storage of logs.
  • B. Automatic selection of physical data storage regions decreases adoption time.
  • C. It can scale to meet the capacity needs of new locations as business grows.
  • D. Log traffic using the licensed bandwidth purchased for Prisma Access reduces overhead.
Mark Question:
Answer:

C


Explanation:
The Strata Logging Service offers scalable log storage to accommodate data growth, which ensures
organizations can retain logs for compliance and threat hunting as their environments expand.
“The Strata Logging Service is designed to scale dynamically to accommodate growing log retention
needs, allowing enterprises to maintain comprehensive visibility as they expand their network
footprint.”
(Source: Strata Logging Service Overview)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2