Paloalto Networks NetSec-Generalist Practice Exams
Last updated on Apr 06,2025 - Exam Code: NetSec-Generalist
- Exam Name: Palo Alto Networks Network Security Generalist
- Certification Provider: Paloalto Networks
- Latest update: Apr 06,2025
Which zone is available for use in Prisma Access?
- A . DMZ
- B . Interzone
- C . Intrazone
- D . Clientless VPN
Which two configurations are required when creating deployment profiles to migrate a perpetual VM-Series firewall to a flexible VM? (Choose two.)
- A . Choose "Fixed vCPU Models" for configuration type.
- B . Allocate the same number of vCPUs as the perpetual VM.
- C . Deploy virtual Panorama for management.
- D . Allow only the same security services as the perpetual VM.
A network security engineer wants to forward Strata Logging Service data to tools used by the Security Operations Center (SOC) for further investigation.
In which best practice step of Palo Alto Networks Zero Trust does this fit?
- A . Implementation
- B . Report and Maintenance
- C . Map and Verify Transactions
- D . Standards and Designs
Which type of traffic can a firewall use for proper classification and visibility of internet of things (loT) devices?
- A . DHCP
- B . RTP
- C . RADIUS
- D . SSH
How many places will a firewall administrator need to create and configure a custom data loss prevention (DLP) profile across Prisma Access and the NGFW?
- A . One
- B . Two
- C . Three
- D . Four
What will collect device information when a user has authenticated and connected to a GlobalProtect gateway?
- A . RADIUS Authentication
- B . IP address
- C . Host information profile (HIP)
- D . Session ID
What is the primary role of Advanced DNS Security in protecting against DNS-based threats?
- A . It replaces traditional DNS servers with more reliable and secure ones.
- B . It centralizes all DNS management and simplifies policy creation.
- C . It automatically redirects all DNS traffic through encrypted tunnels.
- D . It uses machine learning (ML) to detect and block malicious domains in real-time.
Which action must a firewall administrator take to incorporate custom vulnerability signatures into current Security policies?
- A . Create custom objects.
- B . Download WildFire updates.
- C . Download threat updates.
- D . Create custom policies.
Which action must a firewall administrator take to incorporate custom vulnerability signatures into current Security policies?
- A . Create custom objects.
- B . Download WildFire updates.
- C . Download threat updates.
- D . Create custom policies.
What should be reviewed when log forwarding from an NGFW to Strata Logging Service becomes disconnected?
- A . Device certificates
- B . Decryption profile
- C . Auth codes
- D . Software warranty