Palo Alto Networks NetSec-Analyst Exam Questions 2025

Updated:

Our NetSec-Analyst exam questions are built to match the real 2025 exam format, featuring updated content that covers key Palo Alto firewall and security operations topics. Reviewed by certified professionals, each question includes clear explanations and verified answers. Youโ€™ll also get access to our powerful online simulator to test your skills in a real exam-like setup. Preview sample questions below and see why Cert Empire is trusted for top-tier exam prep.

Exam Questions

Question 1

Which two types of DoS Protection policies exist in PAN-OS?
Options
A: Aggregate
B: Zone-Based
C: Classified
D: GlobalProtect
Show Answer
Correct Answer:
Aggregate, Classified
Explanation
PAN-OS provides two distinct types of Denial-of-Service (DoS) Protection policies: Aggregate and Classified. These policies are configured within a DoS Protection profile, which is then applied to an ingress zone. Aggregate policies apply a single connections-per-second (CPS) limit to all traffic matching the policy rule. This provides a broad defense against resource exhaustion. Classified policies allow for more granular control by defining protections for specific or groups of destination IP addresses. They protect against SYN, UDP, and ICMP floods with specific thresholds for each protocol.
Why Incorrect Options are Wrong

B. Zone-Based: This describes the method of application (DoS Protection profiles are applied to zones), not the type of policy rule itself.

D. GlobalProtect: This is a Palo Alto Networks product for securing remote and mobile users (VPN), not a type of DoS Protection policy.

References

1. Palo Alto Networks. (2023). PAN-OSยฎ Administratorโ€™s Guide 10.2.

Section: DoS Protection > DoS Protection Policy Rules.

Content: "You can configure two types of DoS protection policies: Classified and Aggregate. A classified policy applies to a group of classified addresses (source or destination IP addresses). An aggregate policy applies to all traffic that matches the policy."

2. Palo Alto Networks. (n.d.). TechDocs: DoS Protection Against Flooding of New Sessions.

Section: DoS Protection Policy Types.

Content: The document explicitly details the functionality and configuration of "Aggregate DoS Protection" and "Classified DoS Protection" as the two primary policy types for mitigating flood attacks. It explains that Aggregate policies use a single bucket for all traffic, while Classified policies use separate buckets for each destination IP.

Question 2

Which option describes the function of "Random Early Drop (RED)" in DoS profiles?
Options
A: Terminates SSL sessions
B: Preemptively drops packets before thresholds are exceeded
C: Blocks specific URL categories
D: Filters sensitive data
Show Answer
Correct Answer:
Preemptively drops packets before thresholds are exceeded
Explanation
Random Early Drop (RED) is a congestion avoidance mechanism used within Palo Alto Networks DoS Protection profiles. When the rate of incoming packets for a specific traffic type reaches the configured "Activate" threshold, the firewall begins to randomly drop some of these packets. The drop rate increases as the traffic approaches the "Maximum" threshold. This preemptive dropping signals congestion to the source (for TCP) and mitigates the flood attack before the firewall's session table or resources are completely exhausted, thus preventing a more severe service disruption.
Why Incorrect Options are Wrong

A. Terminating SSL sessions is a function of Decryption policies and profiles, not the RED mechanism within a DoS profile.

C. Blocking specific URL categories is the primary function of a URL Filtering security profile, which operates at the application layer.

D. Filtering sensitive data is performed by Data Filtering profiles or a Data Loss Prevention (DLP) solution, not by DoS protection mechanisms.

References

1. Palo Alto Networks PAN-OSยฎ Administratorโ€™s Guide 10.2. In the section on DoS Protection, under Flood Protection, the guide describes the Protect action. It states for Random Early Drop (RED): "The firewall begins to drop packets when the incoming packet rate reaches the Activate Rate threshold. The drop rate increases as the packet rate approaches the Maximum Rate threshold." This confirms that dropping starts preemptively at the "Activate" rate before the "Maximum" rate is exceeded. (Reference: Objects > Security Profiles > DoS Protection > Flood Protection).

2. Palo Alto Networks Beacon Courseware, EDU-210: Firewall 10.2 Essentials: Configuration and Management. Module 9, "Denial-of-Service (DoS) Protection," explains that DoS Protection profiles use thresholds (Alarm, Activate, Maximum) to mitigate flood attacks. The RED action is detailed as a method that starts dropping packets at the Activate rate to proactively manage the attack traffic before the hard limit (Maximum rate) is reached.

Question 3

Which two parameters can be configured in DoS Protection profiles to mitigate volumetric floods?
Options
A: Maximum Concurrent Sessions
B: Max Bandwidth per User
C: SYN Flood Thresholds
D: UDP Flood Thresholds
Show Answer
Correct Answer:
SYN Flood Thresholds, UDP Flood Thresholds
Explanation
DoS Protection profiles are designed to mitigate flood-based attacks by monitoring the rate of incoming packets or connections per second (CPS). Volumetric floods aim to overwhelm a target with a high volume of traffic. The SYN Flood and UDP Flood protection mechanisms within a DoS Protection profile directly counter these attacks. They allow an administrator to configure specific thresholds (Alarm, Activate, and Max rates) for SYN and UDP packets. When the rate of these packets exceeds the configured "Activate" threshold, the firewall begins dropping packets to protect the targeted resource, thus mitigating the volumetric flood.
Why Incorrect Options are Wrong

A. Maximum Concurrent Sessions: This is a feature of Zone Protection Profiles, not DoS Protection profiles. It limits session table resources, not the packet rate characteristic of a volumetric flood.

B. Max Bandwidth per User: This is a Quality of Service (QoS) policy feature used for traffic shaping and bandwidth management, not a security mechanism within a DoS Protection profile.

References

1. Palo Alto Networks PAN-OSยฎ Administratorโ€™s Guide 10.2, "DoS Protection" Chapter:

Section: DoS Protection Profiles and Policy Rules > Configure DoS Protection > Flood Protection

Content: The documentation explicitly details the configuration of flood protection within a DoS Protection profile. It states, "The firewall provides flood protection for SYN, UDP, ICMP, ICMPv6, and other IP protocols... For each type of flood, you can set three thresholds... Activate Rate (CPS)... Max Rate (CPS)." This directly supports that SYN and UDP flood thresholds are the configurable parameters for mitigating such attacks.

2. Palo Alto Networks PAN-OSยฎ Administratorโ€™s Guide 10.2, "Zone Protection and DoS Protection" Chapter:

Section: Zone Protection Profiles > Configure Zone Protection to Prevent Floods

Content: This section describes the settings for a Zone Protection Profile, which include "TCP Port Scan," "Host Sweep," and session limits based on source or destination IP. It clarifies that "Maximum Concurrent Sessions" is a zone-level protection, distinct from the resource-specific DoS Protection profile.

3. Palo Alto Networks PAN-OSยฎ Administratorโ€™s Guide 10.2, "Quality of Service" Chapter:

Section: QoS Concepts > QoS for Applications and Users

Content: This chapter details how QoS policies are used to "manage bandwidth by setting a guaranteed bandwidth and a maximum bandwidth for a user, an application, or a service." This confirms that "Max Bandwidth per User" is a QoS function, separate from DoS protection.

Question 4

Which SD-WAN feature ensures that voice traffic uses the lowest-latency path?
Options
A: Application SLA Profile
B: Path Quality Profile
C: Data Filtering Profile
D: Antivirus Profile
Show Answer
Correct Answer:
Path Quality Profile
Explanation
A Path Quality Profile defines the maximum acceptable latency, jitter, and packet-loss values for an SD-WAN link and establishes the metric-priority order that the firewall uses when more than one path satisfies the thresholds. By assigning a profile that puts latency first to the SD-WAN policy rule that matches voice applications, the firewall constantly measures all available WAN links and automatically selects the path with the lowest latency that still meets the defined thresholds, guaranteeing optimum quality for delay-sensitive voice traffic.
Why Incorrect Options are Wrong

A. Application SLA Profile โ€“ No such SD-WAN object exists in PAN-OS; path selection is driven by Path Quality Profiles, not an โ€œApplication SLAโ€ profile.

C. Data Filtering Profile โ€“ Provides DLP-style file and data control; it is unrelated to SD-WAN path measurement or selection.

D. Antivirus Profile โ€“ Detects malware in traffic; it has no influence on WAN-link monitoring or latency-based steering.

References

1. Palo Alto Networks, PAN-OS 10.2 Administratorโ€™s Guide, โ€œSD-WANโ€”Path Quality Profile,โ€ paras. 1-4: describes latency/jitter/loss thresholds and metric priority used to pick the best path.

2. Palo Alto Networks TechDocs, โ€œBest Path Selection and Failover for SD-WANโ€ (rev. 2023), section โ€œHow the Firewall Chooses the Pathโ€: explains that the firewall selects the path with the best (lowest) value of the highest-priority metric, typically latency for voice.

3. Palo Alto Networks, PAN-OS 11.0 Administratorโ€™s Guide, โ€œExample: Prioritizing Voice Traffic with SD-WAN,โ€ Example configuration step 3: shows assigning a Path Quality Profile with latency priority to voice applications.

Question 5

Which two factors can trigger SD-WAN path failover?
Options
A: Excessive Latency
B: Application Signature Change
C: High Jitter
D: Username Change
Show Answer
Correct Answer:
Excessive Latency, High Jitter
Explanation
Palo Alto Networks SD-WAN functionality relies on continuous monitoring of path quality to make intelligent routing decisions. This is configured through Path Quality Profiles, which measure key performance metrics of a link. When the measured values for latency, jitter, or packet loss on an active path exceed the predefined thresholds, the firewall considers the path to be degraded. This degradation triggers a path failover, causing the SD-WAN policy to redirect the specified application traffic to a different, better-performing path that meets the quality requirements.
Why Incorrect Options are Wrong

B. Application Signature Change: This relates to App-ID and traffic classification for policy enforcement, not the performance or health of the physical network path.

D. Username Change: This is a User-ID event relevant for identity-based security policies and has no direct impact on network link performance metrics that trigger SD-WAN failover.

References

1. Palo Alto Networks PAN-OSยฎ SD-WAN Administrator's Guide (PAN-OS 10.2): In the section "Path Quality Profiles," the documentation states, "You can monitor path quality based on latency, jitter, and packet loss. You set thresholds for these metrics... When the path quality degrades, the firewall can select a new path for the application." This directly confirms that latency and jitter are monitored metrics that can trigger path changes. (Reference: Chapter: SD-WAN Configuration, Section: Path Quality Profiles).

2. Palo Alto Networks PAN-OSยฎ SD-WAN Administrator's Guide (PAN-OS 11.0): The section "Monitor SD-WAN Link Performance" details the metrics used for path selection. It specifies, "SD-WAN measures path quality for each path to a remote site based on the latency, jitter, and packet loss statistics..." and explains that these measurements are compared against thresholds in Path Quality Profiles to determine path health and trigger failovers. (Reference: Chapter: Monitor SD-WAN, Section: Monitor SD-WAN Link Performance).

Question 6

In Panorama-managed SD-WAN, what is the main role of an SD-WAN template?
Options
A: Enforcing file blocking policies
B: Centralizing SD-WAN policy deployment across firewalls
C: Controlling certificate validity checks
D: Creating decryption bypass rules
Show Answer
Correct Answer:
Centralizing SD-WAN policy deployment across firewalls
Explanation
In a Palo Alto Networks SD-WAN deployment managed by Panorama, templates are the core mechanism for centralizing configuration. An SD-WAN template is specifically used to configure and standardize SD-WAN settingsโ€”such as path quality profiles, traffic distribution profiles, and policiesโ€”and then push this configuration to multiple managed firewalls. This ensures consistent policy enforcement and simplifies the management of a large-scale SD-WAN fabric by eliminating the need to configure each device individually. The main role is therefore the centralized deployment and management of SD-WAN policies and related objects.
Why Incorrect Options are Wrong

A. Enforcing file blocking policies is a function of Security Policy rules and profiles, not the primary role of an SD-WAN template, which focuses on path selection.

C. Controlling certificate validity checks is typically managed within device certificate settings or Decryption profiles, which are distinct from SD-WAN configuration objects.

D. Creating decryption bypass rules is a component of Decryption Policy, which governs SSL/TLS inspection, not the traffic steering function of SD-WAN.

References

1. Palo Alto Networks PAN-OSยฎ SD-WAN Administrator's Guide 10.2: In the "SD-WAN Configuration Overview" section, it states, "You use Panorama to centrally configure and manage your SD-WAN deployment... You configure SD-WAN on a template and push the configuration to the managed firewalls that are branch or hub sites." This directly confirms the role of templates in centralizing SD-WAN configuration deployment. (Reference: Chapter: "Get Started with SD-WAN", Section: "SD-WAN Configuration Overview").

2. Palo Alto Networks Panoramaโ„ข Administrator's Guide 10.2: The guide explains the fundamental purpose of templates: "Templates allow you to create a configuration that you can easily and consistently apply to multiple firewalls." When applied to the SD-WAN feature, this principle supports the answer that an SD-WAN template's main role is to centralize SD-WAN policy deployment. (Reference: Chapter: "Templates", Section: "Template Stacks").

Question 7

Which metric is critical for SD-WAN path selection when streaming video applications are used?
Options
A: Packet Loss
B: Session Timeout
C: CPU Utilization
D: URL Category
Show Answer
Correct Answer:
Packet Loss
Explanation
SD-WAN functionality on Palo Alto Networks firewalls makes path selection decisions based on real-time network path quality. For applications like video streaming, which are highly sensitive to data loss, the packet loss rate is a critical performance metric. High packet loss directly results in a degraded user experience, causing video artifacts, buffering, and stuttering. An SD-WAN policy for video traffic would use a Path Quality Profile with a stringent packet loss threshold to ensure traffic is routed over the most stable and reliable link, thereby preserving the quality of the stream.
Why Incorrect Options are Wrong

B. Session Timeout: This is a firewall state-table management parameter that determines how long an idle session is maintained; it is not a network path performance metric used for SD-WAN path selection.

C. CPU Utilization: This metric reflects the processing load on the firewall appliance itself, not the quality or performance of the external WAN links that SD-WAN evaluates for path selection.

D. URL Category: This is a traffic identification and policy enforcement criterion. It is used to classify the traffic (e.g., as "streaming-video") so a specific SD-WAN policy can be applied, but it is not the metric used to measure path health.

---

References

1. Palo Alto Networks, PAN-OSยฎ SD-WAN Administratorโ€™s Guide, Version 10.2, "Path Quality Measurement," Page 12.

"The firewall measures path quality based on the latency, jitter, and packet loss of the traffic on the link. The firewall uses path quality monitoring to determine the health of the links to an SD-WAN device in a remote site." This document explicitly names packet loss as one of the three core metrics for measuring path quality.

2. Palo Alto Networks, PAN-OSยฎ SD-WAN Administratorโ€™s Guide, Version 10.2, "Configure a Path Quality Profile," Page 41.

This section details the configuration steps for a Path Quality Profile, which includes setting specific thresholds for "Packet Loss Threshold (%)", "Latency Threshold (ms)", and "Jitter Threshold (ms)". This confirms that packet loss is a primary, configurable metric used by the system to make path-forwarding decisions.

3. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. Chapter 7, "Multimedia Networking."

This standard university textbook explains the network requirements for multimedia applications. In sections discussing streaming video (e.g., Section 7.2), it is established that packet loss is a major impairment, as lost packets can result in missing frames or portions of frames, leading to significant visual degradation. This academic source validates the criticality of minimizing packet loss for video applications.

Question 8

Which two link types are typically included in SD-WAN path selection?
Options
A: MPLS
B: Broadband Internet
C: USB Tethering
D: Internal Loopback
Show Answer
Correct Answer:
MPLS, Broadband Internet
Explanation
SD-WAN (Software-Defined Wide Area Network) technology is designed to intelligently manage and route traffic across multiple types of WAN connections. The primary goal is to create a hybrid WAN that optimizes application performance, enhances security, and reduces costs. The two most common link types aggregated in an SD-WAN fabric are traditional, private, high-quality links like MPLS and cost-effective, high-bandwidth public connections such as broadband internet. SD-WAN path selection policies dynamically steer traffic over the most appropriate link based on real-time performance metrics and application requirements, leveraging the distinct advantages of each transport type.
Why Incorrect Options are Wrong

C. USB Tethering: This is an ad-hoc method of providing internet access from a mobile device and is not a typical, stable, or scalable link type for enterprise SD-WAN deployments.

D. Internal Loopback: This is a virtual network interface used for diagnostics and communication within a single host; it is not a physical WAN link used for external site-to-site connectivity.

References

1. Palo Alto Networks Documentation, "What is SD-WAN?": "SD-WAN enables organizations to use any combination of transport services, including MPLS, LTE and broadband internet services, to securely connect users to applications." This source explicitly lists both MPLS and broadband internet as core transport services for SD-WAN.

2. Palo Alto Networks, PAN-OSยฎ SD-WAN Administratorโ€™s Guide 10.2, "SD-WAN Overview": "SD-WAN allows you to manage your WAN and optimize traffic steering over any combination of transport, including low-cost internet, MPLS, 4G, and 5G." This official guide confirms that MPLS and internet (which includes broadband) are fundamental transport options for path selection.

Question 9

Which SD-WAN policy object defines what applications are subject to path selection rules?
Options
A: Application SLA Profile
B: Application Group
C: Device Group
D: QoS Profile
Show Answer
Correct Answer:
Application Group
Explanation
An Application Group is a configurable object that allows an administrator to logically group multiple individual applications. This object is then used as a match criterion within an SD-WAN policy rule. The rule is configured to apply specific path selection logic (based on SLA profiles) to all traffic that matches the applications defined within that Application Group. This directly addresses the need to define which applications are subject to the rule.
Why Incorrect Options are Wrong

A. Application SLA Profile: This object defines the performance thresholds (latency, jitter, packet loss) for path health monitoring, not the applications themselves.

C. Device Group: This is a Panorama management object used to group firewalls for configuration and policy deployment, unrelated to application identification in SD-WAN rules.

D. QoS Profile: This object is used to apply Quality of Service policies, such as traffic shaping and prioritization, to traffic after it has been matched by a rule.

---

References

1. Palo Alto Networks, PAN-OSยฎ Administratorโ€™s Guide 10.2, "SD-WAN Concepts":

Section: SD-WAN Policy Rule

Content: "An SD-WAN policy rule matches applications and application groups and directs them to an external network through a virtual or physical interface that has a specific path quality profile." This statement explicitly confirms that Application Groups are used as the matching criteria for applications.

2. Palo Alto Networks, PAN-OSยฎ Administratorโ€™s Guide 10.2, "Objects > Application Groups":

Section: Application Groups

Content: This section describes Application Groups as "named groups of applications that you can use to create policies." It details how these objects serve as a container for applications, which are then referenced in various policy types, including SD-WAN.

3. Palo Alto Networks, PAN-OSยฎ Administratorโ€™s Guide 10.2, "SD-WAN > Configure SD-WAN":

Section: Create an SD-WAN Policy Rule

Content: The procedural steps for creating an SD-WAN policy rule show that in the "Application" tab, an administrator selects either individual applications or pre-configured Application Groups to define the traffic that the rule will act upon.

Question 10

What benefit does SD-WAN provide for SaaS applications like Office 365?
Options
A: Encrypts all SaaS traffic
B: Routes traffic based on application performance metrics
C: Blocks malicious domains automatically
D: Reduces the need for antivirus scanning
Show Answer
Correct Answer:
Routes traffic based on application performance metrics
Explanation
Palo Alto Networks SD-WAN (Prisma SD-WAN) improves the performance of SaaS applications like Office 365 by using application-aware routing. It continuously monitors the performance metrics of all available network paths, including latency, jitter, and packet loss. Based on predefined application policies (App-SLAs), the SD-WAN solution dynamically steers traffic for a specific application onto the path that currently offers the best performance. This ensures a consistent and high-quality user experience by avoiding network congestion and suboptimal routing, which is critical for latency-sensitive SaaS applications.
Why Incorrect Options are Wrong

A. Encrypts all SaaS traffic: SaaS traffic is typically already encrypted by the application provider using TLS/SSL. While SD-WAN encrypts its overlay tunnels, this is not its unique or primary benefit for SaaS.

C. Blocks malicious domains automatically: This is a function of a security service, such as DNS Security or a Next-Generation Firewall (NGFW), not a core networking capability of SD-WAN itself.

D. Reduces the need for antivirus scanning: SD-WAN is a network routing and optimization technology. It does not perform file inspection and therefore does not replace or reduce the need for antivirus solutions.

---

References

1. Palo Alto Networks. (2023). Prisma SD-WAN Datasheet.

Page 2, "Key Features," Section: "Application-defined SD-WAN policies": "Prisma SD-WAN enables you to create application-based policies that consider application performance, security, and link cost. This allows you to steer traffic to the preferred path to meet application SLAs." This directly supports the concept of routing based on application performance metrics.

2. Palo Alto Networks. (2022). Prisma SD-WAN At-a-Glance.

Page 1, Section: "Improve End-User Experience": "Improve end-user experience for cloud and SaaS applications by leveraging application-defined policies that steer traffic based on real-time link performance." This statement explicitly links SD-WAN's performance-based routing to the benefit for SaaS applications.

3. Palo Alto Networks. (2023). Prisma SD-WAN Design Guide.

Section: "Application Path and QoS Policy," Subsection: "Path Selection": The guide details how policies are configured to measure path quality (MOS-v, latency, jitter, loss) and select the best-performing path for specific applications to ensure the application performance requirements are met. This technical detail underpins the functionality described in the correct answer.

Sale!
Total Questions60
Last Update Check November 01, 2025
Online Simulator PDF Downloads
50,000+ Students Helped So Far
$30.00 $60.00 50% off
Rated 5 out of 5
5.0 (1 reviews)

Instant Download & Simulator Access

Secure SSL Encrypted Checkout

100% Money Back Guarantee

What Users Are Saying:

Rated 5 out of 5

โ€œThe practice questions were spot on. Felt like I had already seen half the exam. Passed on my first try!โ€

Sarah J. (Verified Buyer)

Free NetSec-Analyst Practice Test
Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE