NetSec-Analyst 無料問題集「Palo Alto Networks Network Security Analyst」
A sophisticated zero-day attack is suspected to be propagating laterally within your network. You need to quickly identify all active network connections, their associated applications, users, and any related threats, across your distributed environment. Then, you need to rapidly quarantine affected hosts and block the identified malicious application signature. Which set of tools and features provides the most efficient and comprehensive response?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A Security Architect is designing a Zero Trust architecture using Palo Alto Networks firewalls. A key requirement is to ensure that all administrative access to critical infrastructure (e.g., domain controllers, internal PKI servers) is strictly controlled and logged, with any unauthorized access attempts immediately generating a 'critical' incident and being blocked. Furthermore, successful administrative access should trigger a 'low' severity alert for auditing purposes. The design must accommodate multiple zones and user groups. Which combination of Palo Alto Networks features, specifically utilizing Log Viewer and Incidents/Alerts, would MOST effectively meet these requirements?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A financial institution has a requirement to send all traffic originating from the 'Finance' security zone, destined for external banking APIs (known IP ranges), through a dedicated, high-throughput internet link. Simultaneously, all other internet traffic from the 'Finance' zone should use the standard, lower-cost internet uplink. A PBF rule is configured as follows:

After deployment, users in the 'Finance' zone report that some API traffic is still going over the standard link. What is the most probable cause for this misbehavior?

After deployment, users in the 'Finance' zone report that some API traffic is still going over the standard link. What is the most probable cause for this misbehavior?
正解:E
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
An organization is consolidating multiple legacy Palo Alto Networks firewall configurations onto a single Panorama instance. Many firewalls have redundant address objects (e.g., 'DB_Server_1' defined identically on multiple firewalls). The security team wants to de- duplicate these objects and manage them centrally as 'snippets' in the 'Shared' folder, but they also need to handle cases where an object with the same name has different values across different firewalls (e.g., 'VPN_Endpoint' refers to different IP addresses on different regional firewalls). How should Panorama's folder and object management capabilities be utilized to address both de-duplication and unique object handling?
正解:C、E
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A global organization uses Panorama to manage its Palo Alto Networks firewalls. They are implementing SD-WAN across multiple regions. A specific requirement states: all inter-region traffic for a custom application 'Global Sync' must use the lowest latency path available between any two regional hubs, regardless of the primary link type (MPLS or Internet VPN). Furthermore, this traffic must be prioritized with guaranteed bandwidth if possible. Which SD-WAN configurations are crucial to meet this requirement efficiently across regions using Panorama?
正解:A、B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A large enterprise has implemented GlobalProtect and is leveraging Host Information Profile (HIP) for endpoint compliance. A new compliance requirement dictates that no user should be able to access the internal 'Sensitive SharePoint' site unless their device has the latest antivirus definitions and the endpoint security agent is running. All other internal resources should remain accessible even if the HIP check fails, but without the 'Sensitive SharePoint' access. Describe the policy configuration strategy to achieve this granular access control.
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A Palo Alto Networks firewall is configured with a complex data filtering policy to prevent PII exfiltration. A Data Pattern named 'SSN_Pattern' (using a pre-defined regex for Social Security Numbers) is configured with a 'Threshold' of 3 occurrences within a single session to trigger an alert, and an 'Action' of 'Alert'. This 'SSN_Pattern' is part of a Data Filtering Profile named 'PII_Monitoring', which is applied to an 'Allow' security policy rule for all outbound traffic from the 'Internal_Users' zone. During testing, a user from 'Internal_Users' attempts to upload a document containing two valid SSN patterns to an external cloud storage service via HTTPS. Simultaneously, another user from the 'Internal_Users' zone attempts to send an email with four valid SSN patterns through an external SMTP server. Assuming SSL decryption is correctly configured for both traffic flows and working as expected: Which of the following statements accurately describes the expected behavior of the firewall?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
An organization is leveraging Palo Alto Networks Panorama for managing its Next-Generation Firewalls and GlobalProtect. They need to implement dynamic access control for remote users based on their device posture (e.g., patch level, anti-virus status) reported by a third-party Endpoint Detection and Response (EDR) solution. This posture information needs to be consumed by GlobalProtect Security Policies. Which of the following approaches leverages Panorama and its integration capabilities most effectively to achieve this, including an example of how the EDR data might influence policy?
正解:A、E
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A large financial institution uses Panorama to manage their firewall estate. They are implementing a strict change management process where all policy modifications, object creations, or deletions must be reviewed and approved before being committed and pushed. They want to ensure that only approved changes are present in the 'candidate config' before a commit, and that deviations are easily identifiable. Which Panorama feature, when combined with a robust operational process, helps enforce this requirement and identify discrepancies?
正解:A、C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
An administrator creates a new Log Forwarding Profile on a Palo Alto Networks firewall. The profile is named 'LFP_Audit_Trails' and is intended to forward 'configuration' and 'system' logs to a remote syslog server. After configuring the profile, what is the crucial next step to ensure these logs are actually sent to the syslog server?
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A critical industrial control system (ICS) network, isolated from the internet, requires extremely low latency and high availability. While internal DoS attacks are rare, a misconfigured or rogue device could potentially flood the network. The security team wants to implement a DoS protection profile that proactively identifies and drops unusually high rates of UDP traffic targeting specific ICS application ports, without introducing any significant processing overhead or latency. Which configuration approach in Palo Alto Networks firewall DoS protection would best achieve this goal?
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A large enterprise uses a critical, internally developed database replication service that communicates exclusively between two specific database clusters (Cluster-A and Cluster-B) over TCP/1433 and TCP/50000-50005. App-ID occasionally misidentifies traffic on TCP/1433 as 'ms-sql-smb' and TCP/50000-50005 as 'unknown-tcp'. The security team wants to enforce strict security profiles on this replication traffic, ensuring it's always classified as 'internal-db-replication', a custom application previously defined. Additionally, they need to apply a specific QOS profile. Which set of configurations will best achieve this, considering the need for both precise identification and performance?
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)