Q: 1
According to dynamic updates best practices, what is the recommended threshold value for content
updates in a mission- critical network?
Options
Discussion
A is right for mission-critical networks, 8 hours is what Palo Alto recommends. D looks tempting but that's for less critical.
Option A but does it specifically say "mission-critical" or is it just general best practice in the question wording?
A tbh. D is for lower risk sites but trick question if you miss that "mission-critical" part.
Be respectful. No spam.
Q: 2
When deploying Palo Alto Networks NGFWs in a cloud service provider (CSP) environment, which
method ensures high availability (HA) across multiple availability zones?
Options
Discussion
C tbh. Native cloud load balancer and health probes is the only way to span AZs.
D I saw similar questions in the official practice test, and labs usually cover active/active HA configs well.
Probably C. In cloud setups, load balancer with health probes is what keeps NGFWs resilient across zones.
Be respectful. No spam.
Q: 3
An engineer is implementing a new rollout of SAML for administrator authentication across a
company’s Palo Alto Networks NGFWs. User authentication on company firewalls is currently
performed with RADIUS, which will remain available for six months, until it is decommissioned. The
company wants both authentication types to be running in parallel during the transition to SAML.
Which two actions meet the criteria? (Choose two.)
Options
Discussion
Option B. Setting up both profiles in an authentication sequence is how you allow SAML and RADIUS to work together for admin sign-in. This is the supported parallel setup per PAN-OS docs. Anyone see it differently?
B tbh, since you can use an authentication sequence to chain both SAML and RADIUS profiles at the same time. D isn't right though, because you don't add the SAML server profile directly to the RADIUS profile, that's not supported afaik.
Be respectful. No spam.
Q: 4
Which two statements apply to configuring required security rules when setting up an IPSec tunnel
between a Palo Alto Networks firewall and a third- party gateway? (Choose two.)
Options
Discussion
Its C and D, not B. Many miss that interzone default deny blocks tunnel setup traffic so explicit rules are a must.
Do they specify if it's about the traffic THROUGH the tunnel or tunnel setup traffic itself? That changes if C or D fits.
Be respectful. No spam.
Q: 5
What is a result of enabling split tunneling in the GlobalProtect portal configuration with the “Both
Network Traffic and DNS” option?
Options
Discussion
Its B here. With split tunneling set this way, I'm thinking users can hit internal and external resources based on location but using the same FQDN. Not 100% sure, open to other views.
D imo, because when you use "Both Network Traffic and DNS" in GlobalProtect split tunneling, it lets the admin set exactly which domains resolve via VPN-assigned DNS and which through local DNS. It's not about location-based access or letting users pick FQDNs based on where they are (that's more B, but that's a trap here). Pretty sure D is how Palo Alto describes it in docs. Correct me if I'm off.
Its D, split tunneling with both options lets the VPN dictate which DNS queries go to VPN DNS vs local DNS.
Official docs and practice tests back D for split tunneling with DNS, domains route to the right DNS server. D
B tbh. Seems like users could switch between internal and external resources with the same name based on connection, fits my understanding of split tunneling here.
A is wrong, D. Seen similar wording in official guide and practice test, DNS split tunneling lets you control which domains use VPN DNS vs local. Straight to the point.
Probably D, that matches what I've seen in practice. Nice straightforward question for this topic.
Be respectful. No spam.
Q: 6
An engineer at a managed services provider is updating an application that allows its customers to
request firewall changes to also manage SD-WAN. The application will be able to make any approved
changes directly to devices via API.
What is a requirement for the application to create SD-WAN interfaces?
Options
Discussion
Yeah, you got it. B is the way since SD-WAN interface creation needs the REST API endpoint on the firewall itself. Seen similar in docs, but open to correction if Palo changes something.
B tbh, REST API direct to firewall is needed. Option A might trip people up but that's for Panorama not interface creation.
Probably B, since SD-WAN interfaces have to be created via REST API on the firewall, not Panorama.
B , unless the devices are only managed through Panorama, direct REST API to firewall is required for SD-WAN interfaces.
B Not sure but pretty sure you need to call the REST API on the firewall for SD-WAN interfaces right? Someone confirm?
Be respectful. No spam.
Q: 7
What are the phases of the Palo Alto Networks AI Runtime Security: Network Intercept solution?
Options
Discussion
Option B lines up with the phases covered in Palo Alto's docs and official guide. Discovery, Deployment, Detection, then Prevention is the lifecycle sequence for this AI Runtime Security solution. Seen that pattern in practice tests too but open if someone found different.
I always thought C was close since policy generation and enforcement matter a lot for runtime security. C.
For me, B. That matches the typical flow: discover workloads, deploy defenders, detect threats, then prevent attacks. Pretty sure this is how Palo Alto docs lay out the process. Open if someone has seen a different breakdown.
For me, B since that's what the official guide and some practice tests show as the lifecycle for AI Runtime Security.
Yeah, B fits with the standard phase flow for Palo Alto AI Runtime Security. You start with Discovery, set up Deployment, then it's Detection and finally Prevention. Pretty sure that's what the docs show too, but open to correction.
B, Saw a similar question in some exam reports, pretty sure Discovery, Deployment, Detection, Prevention is the correct order here.
Be respectful. No spam.
Q: 8
Which statement applies to the relationship between Panorama-pushed Security policy and local
firewall Security policy?
Options
Discussion
I was thinking C because I thought you could change the order for troubleshooting, but pretty sure that's not how Panorama handles the policy chain. Feel free to correct me if this is wrong.
Not D, B. Had something like this in a mock, B fits if the question means "default order" but if the requirement was to change the order somehow that'd point to D.
Makes sense to pick B here.
Its B
Be respectful. No spam.
Q: 9
Palo Alto Networks NGFWs use SSL/TLS profiles to secure which two types of connections? (Choose
two.)
Options
Discussion
C vs B. User Authentication sometimes needs SSL/TLS when enabling certain features, so feels tricky.
C. D. I don't think B is right here since SSL/TLS profiles are tied to GlobalProtect Portal and Gateway, not user authentication. Pretty common trap if you're not hands-on with GlobalProtect.
Not B in this case, it's C and D. SSL/TLS profiles are for GlobalProtect Portal and Gateway, user authentication like Captive Portal uses a different config. B is an easy trap here imo.
C vs D, but I think both are right for this specific question since GlobalProtect Portal and Gateway each need their own SSL/TLS profile for cert management. B (User Authentication) sometimes feels like a gray area if you're thinking about Captive Portal or SAML, but those don't directly attach SSL/TLS profiles like GP does. Anyone else seen user auth directly use the firewall's profile config? I'm pretty sure it's just C and D.
C and D
C and D imo. SSL/TLS profiles are def required for GlobalProtect Portal and Gateway, since both need certificates for secure access. NAT tables and User Authentication don’t use SSL/TLS profiles directly on the firewall from what I know. Correct me if you’ve seen otherwise.
Its C and D. GlobalProtect needs SSL/TLS profiles for portal and gateways, not for NAT or user auth. Anyone disagree?
Probably C and D. The question's pretty clear for anyone who's set up GlobalProtect before, nice one.
Be respectful. No spam.
Q: 10
In regard to the Advanced Routing Engine (ARE), what must be enabled first when configuring a
logical router on a PAN-OS firewall?
Options
Discussion
Ugh, Palo Alto always makes licensing the first hurdle before you touch anything. A
Quick double check, is this asking for the first requirement or just any prerequisites in general? If it's about 'first', then A.
Its A
Similar question on a practice test, answer was A.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2