Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass NetSec-Analyst Exam Guide

Palo Alto Networks Network Security Analyst Questions and Answers

Question 17

A company requires that all file transfers only over HTTP (tcp/80 and tcp/8080) to SaaS storage must be inspected for data exfiltration. Traffic to encrypted HTTPS SaaS storage cannot be inspected based on the company decryption restrictions.

When using a security profile group, which Security policy configuration meets this requirement?

Options:

A.

One with data filtering to inspect all HTTP traffic on the web-browsing application using application-default for the service.

B.

One with URL filtering and file blocking to block all file uploads to the URL category online-storage-and-backup, then set the service to tcp/80 and tcp/8080.

C.

One with data filtering and the service set to tcp/80 and tcp/8080, then verify block threshold is set to "1" to stop exfiltration.

D.

One with data filtering and an application filter that matches "file-sharing" applications, then set the service to tcp/80 and tcp/8080.

Question 18

An analyst needs to prevent users from downloading executable files from "High-Risk" URL categories while allowing them from "Business-and-Economy." Which profile should be configured to achieve this specific file-type restriction?

Options:

A.

URL Filtering Profile

B.

Data Filtering Profile

C.

File Blocking Profile

D.

Vulnerability Protection Profile

Question 19

Which log type is the most useful for identifying if a user is repeatedly attempting to visit an "Unauthorized" website category that is being blocked by a security profile?

Options:

A.

Traffic Log

B.

URL Filtering Log

C.

System Log

D.

Authentication Log

Question 20

A company wants to implement a security policy that only allows "web-browsing" if it is initiated by an authorized user. If the user is not identified, they should be prompted to authenticate via a web portal. Which policy type must be configured to trigger this portal?

Options:

A.

Security Policy

B.

Authentication Policy

C.

Decryption Policy

D.

NAT Policy