Palo Alto Networks Network Security Analyst 認定 NetSec-Analyst 試験問題:
1. Consider the following XML snippet representing a partial SD-WAN template configuration in Panorama for a new branch template stack:
Which of the following statements accurately describe the implications or missing crucial components for this SD-WAN template to effectively manage application-specific traffic with performance objectives, specifically for a VoIP' application?
A) The template is missing the definition of 'Path Monitoring' profiles, which are essential for the 'path-quality-profiles' to gather real-time link metrics.
B) The 'Rule_1' entry needs to be modified to specify 'application: VoIP' and its 'path-selection' changed to reference 'High_Quality_Voice' for performance-based routing.
C) While 'High_Quality_Voice' defines performance thresholds, it does not explicitly define which links or paths are preferred for an application, only what constitutes 'high quality'.
D) The 'High_Quality_Voice' profile needs to be applied to specific interfaces or zones for it to take effect, which is not shown in this SD-WAN profile snippet.
E) The 'path-quality-profiles' are correctly defined, but 'Rule_1' is too generic. A new SD-WAN policy rule specifically for 'VoIP' is required, linked to the 'High_Quality_Voice' profile, and positioned at a higher priority.
2. A Security Architect is designing a multi-tenant environment using Palo Alto Networks firewalls managed by Panoram a. Each tenant requires isolation of their network configurations, security policies, and administrative access. How can folders and device groups in Panorama be effectively leveraged to achieve this multi-tenant segregation, and what are the key considerations for object management across tenants?
A) Utilize Virtual Systems (vsys) on individual firewalls for tenant segregation, and manage each vsys as a separate entry in Panorama's Device Group hierarchy. All objects should be created locally within each vsys configuration.
B) Manage all tenant configurations in a single 'Shared' Device Group, relying on security zones and address objects with specific naming conventions to differentiate tenant traffic.
C) Create a separate Device Group for each tenant, ensuring that all policies and objects related to a tenant are contained within their respective Device Group folder. Avoid using shared objects at the 'Shared' level to maintain strict isolation.
D) Establish a hierarchical folder structure where each tenant has its own top-level folder under 'Shared'. Within each tenant's folder, create Device Groups for their firewalls. Common objects shared across tenants (e.g., standard DNS servers) can reside in the 'Shared' folder at the very top, while tenant-specific objects reside within their respective tenant folders.
E) Deploy a dedicated Panorama instance for each tenant to ensure complete isolation and prevent any cross-tenant visibility or configuration conflicts.
3. A Palo Alto Networks firewall is experiencing frequent 'URL Filtering: category-not-resolved' errors in the traffic logs, leading to inconsistent web access for users. The firewall has valid subscriptions for URL Filtering and DNS Proxy is configured. The external DNS servers are reachable. Which of the following is the MOST LIKELY cause of this issue, and what specific configuration element should be scrutinized?
A) There is a routing issue preventing the firewall from sending DNS requests for URL resolution to its configured DNS servers. Check 'Network > Virtual Routers > <Router Name> > Static Routes' and 'Network > DNS' settings.
B) The URL Filtering profile applied to the security policy has an action of 'alert' or 'allow' for 'unknown' categories, but the default action for 'category-not-resolved' is implicit deny. Review 'Objects > URL Filtering Profile > <Profile Name> > Categories'.
C) The URL Filtering license has expired, preventing category lookups. Check 'Device > Licenses' for the URL Filtering license status.
D) The firewall is unable to reach the Palo Alto Networks URL Filtering cloud database. Verify connectivity to update servers (update.paloaltonetworks.com) and check 'Device > Dynamic Updates' for URL database status.
E) The DNS Proxy configuration is incorrectly routing DNS queries for URL lookups through an internal DNS server that cannot resolve external URLs. Review 'Network > DNS Proxy' and ensure 'DNS Proxy Rule' for Palo Alto Networks Services' is correctly configured.
4. A large enterprise uses a Palo Alto Networks firewall in an active/passive HA pair. They need to implement a data loss prevention (DLP) solution for outbound traffic, specifically to prevent sensitive intellectual property (IP) from leaving the network via email (SMTP, SMTPS) or file transfers (FTP, SMB). The IP is defined by a set of keywords and regular expressions. Additionally, they must ensure that this DLP inspection does not significantly degrade performance for high-volume, non-sensitive traffic. How would you configure Data Filtering profiles and apply them, considering performance and security?
A) Configure a Data Filtering profile with sensitive patterns and 'block' action. Implement PBF to divert all outbound SMTP, SMTPS, FTP, and SMB traffic to a dedicated Vwire interface. On this Vwire, apply a Security Profile Group that includes the Data Filtering profile and other relevant threat prevention. Other traffic bypasses this path.
B) Create a Data Filtering profile for each sensitive IP type. Configure a custom data pattern (e.g., 'ProjectX-code', 'CustomerDB-records'). Set the action to 'block' for high severity. Create security policy rules specifically for SMTP/SMTPS, FTP, and SMB applications destined for the untrust zone. Attach a Security Profile Group containing only the Data Filtering profile to these specific rules.
C) Utilize a common Security Profile Group with Antivirus, Anti-Spyware, and Vulnerability Protection for all outbound traffic. Then, create a separate Security Profile Group containing the Data Filtering profile for sensitive IP. Apply this Data Filtering-specific group to a separate 'DLP security policy rule, ensuring it's evaluated before the general outbound rules.
D) Define a Data Filtering profile with sensitive data patterns. Set the action to 'block' and enable 'log at session start' and 'log at session end'. Apply this profile to a Security Profile Group. Create a security policy rule for each relevant application (SMTP, SMTPS, FTP, SMB) with source as 'internal zones' and destination as 'untrust zone', applying the Security Profile Group to these rules. Ensure the 'any' application is not used.
E) Create a single Data Filtering profile. Define multiple data patterns (keywords, regex) for the IR Set the action for all patterns to 'block'. Apply this Data Filtering profile to a Security Profile Group, which is then attached to all outbound security policy rules. This ensures full coverage.
5. A security architect is designing an automated incident response playbook within their Security Orchestration, Automation, and Response (SOAR) platform. This playbook needs to interact with Strata Cloud Manager (SCM) to perform actions like blocking malicious IPs, quarantining compromised devices, and retrieving firewall logs. Which of the following Python code snippets demonstrates the correct initial step to authenticate and interact with SCM's API for such operations?
A)
B)
C)
D)
E)
質問と回答:
質問 # 1 正解: A、C、E | 質問 # 2 正解: D | 質問 # 3 正解: D | 質問 # 4 正解: D | 質問 # 5 正解: A |