Palo Alto Networks Next-Generation Firewall Engineer NGFW-Engineer Exam Questions in PDF

Free Palo Alto Networks NGFW-Engineer Dumps Questions (page: 3)

For which two purposes is an IP address configured on a tunnel interface? (Choose two.)

  1. Use of dynamic routing protocols
  2. Tunnel monitoring
  3. Use of peer IP
  4. Redistribution of User-ID

Answer(s): A,B

Explanation:

Use of dynamic routing protocols: An IP address is needed on the tunnel interface to participate in dynamic routing protocols (like OSPF, BGP, etc.) over the tunnel. This allows the firewall to advertise routes and receive updates over the tunnel.

Tunnel monitoring: The IP address on the tunnel interface can also be used for monitoring the tunnel's status. Tunnel monitoring (such as IPSec tunnel monitoring) requires an IP address on the tunnel interface to check the health and availability of the tunnel.



Which PAN-OS method of mapping users to IP addresses is the most reliable?

  1. Port mapping
  2. GlobalProtect
  3. Syslog
  4. Server monitoring

Answer(s): D

Explanation:

Server monitoring is the most reliable method for mapping users to IP addresses in PAN-OS. This method allows the firewall to monitor specific servers, such as Microsoft Active Directory (AD) or LDAP servers, to dynamically retrieve and update user-to-IP mappings. It provides a more accurate and up-to-date mapping of users to their associated IP addresses, as it directly queries user databases in real time.



In an active/active high availability (HA) configuration with two PA-Series firewalls, how do the firewalls use the HA3 interface?

  1. To forward packets to the HA peer during session setup and asymmetric traffic flow
  2. To exchange hellos, heartbeats, HA state information, and management plane synchronization for routing and User-ID information
  3. To synchronize sessions, forwarding tables, IPSec security associations, and ARP tables between firewalls in an HA pair
  4. To perform session cache synchronization among all HA peers having the same cluster ID

Answer(s): B

Explanation:

In an active/active HA configuration with two PA-Series firewalls, the HA3 interface is used primarily for the exchange of HA state information between the firewalls. This includes:
Hellos and heartbeats to monitor the status of the HA peer.

Synchronization of management plane data, which includes critical routing and User-ID information.



A PA-Series firewall with all licensable features is being installed. The customer's Security policy requires that users do not directly access websites. Instead, a security device must create the connection, and there must be authentication back to the Active Directory servers for all sessions.

Which action meets the requirements in this scenario?

  1. Deploy the transparent proxy with Web Cache Communications Protocol (WCCP).
  2. Deploy the Next-Generation Firewalls as normal and install the User-ID agent.
  3. Deploy the Advanced URL Filtering license and captive portal.
  4. Deploy the explicit proxy with Kerberos authentication scheme.

Answer(s): D

Explanation:

In this scenario, the customer requires that users do not directly access websites and that a security device (the firewall) manages the connection, while also ensuring that there is authentication back to the Active Directory (AD) servers for all sessions. The explicit proxy with Kerberos authentication is the best solution because:
The explicit proxy allows the firewall to intercept user web traffic and manage the connections on behalf of users.
Kerberos authentication ensures that the user's identity is validated against the Active Directory servers before the session is allowed, fulfilling the authentication requirement.



What must be configured before a firewall administrator can define policy rules based on users and groups?

  1. User Mapping profile
  2. Authentication profile
  3. Group mapping settings
  4. LDAP Server profile

Answer(s): C

Explanation:

Before a firewall administrator can define policy rules based on users and groups, the Group Mapping settings must be configured. These settings enable the firewall to map users to their respective Active Directory (AD) groups. This mapping allows the firewall to use user and group information to create policy rules based on group membership.



Which statement applies to the relationship between Panorama-pushed Security policy and local firewall Security policy?

  1. When a policy match is found in a local firewall policy, if any Panorama shared post-rule is configured, it will still be evaluated.
  2. Local firewall rules are evaluated after Panorama pre-rules and before Panorama post-rules.
  3. Panorama post-rules can be configured to be evaluated before local firewall policy for the purpose of troubleshooting.
  4. The order of policy evaluation can be configured differently in different device groups.

Answer(s): B

Explanation:

Local firewall rules are evaluated after Panorama pre-rules (those applied before the firewall's local policies) and before Panorama post-rules (those applied after the firewall's local policies). This ensures that the local firewall rules do not override the central Panorama policy and are only applied in the appropriate order within the policy evaluation sequence.



Which networking technology can be configured on Layer 3 interfaces but not on Layer 2 interfaces?

  1. DDNS
  2. Link Duplex
  3. NetFlow
  4. LLDP

Answer(s): C

Explanation:

NetFlow is a Layer 3 (network layer) protocol that collects and monitors IP traffic flows. It is typically configured on Layer 3 interfaces because it relies on IP information for traffic flow analysis, which is not available on Layer 2 interfaces. Layer 2 interfaces handle frames within the local network, and they don't have IP-related details that NetFlow uses to generate traffic statistics.



What is a result of enabling split tunneling in the GlobalProtect portal configuration with the "Both Network Traffic and DNS" option?

  1. It specifies when the secondary DNS server is used for resolution to allow access to specific domains that are not managed by the VPN.
  2. It allows users to access internal resources when connected locally and external resources when connected remotely using the same FQDN.
  3. It allows devices on a local network to access blocked websites by changing which DNS server resolves certain domain names.
  4. It specifies which domains are resolved by the VPN-assigned DNS servers and which domains are resolved by the local DNS servers.

Answer(s): D

Explanation:

When split tunneling is enabled with the "Both Network Traffic and DNS" option in the GlobalProtect portal configuration, it allows the firewall to control which traffic is sent over the VPN tunnel and which is not.
Specifically, it determines which domains are resolved by the VPN-assigned DNS servers (for domains requiring VPN access) and which are resolved by local DNS servers (for domains that can be accessed without the VPN tunnel).



Share your comments for Palo Alto Networks NGFW-Engineer exam with other users:

S
Sarah
6/13/2023 1:42:00 PM

anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried

S
Shuv
10/3/2023 8:19:00 AM

good questions

R
Reb974
8/5/2023 1:44:00 AM

hello are these questions valid for ms-102

M
Mchal
7/20/2023 3:38:00 AM

some questions are wrongly answered but its good nonetheless

S
Sonbir
8/8/2023 1:04:00 PM

how to get system serial number using intune

M
Manju
10/19/2023 1:19:00 PM

is it really helpful to pass the exam

L
LeAnne Hair
8/24/2023 12:47:00 PM

#229 in incorrect - all the customers require an annual review

A
Abdul SK
9/28/2023 11:42:00 PM

kindy upload

A
Aderonke
10/23/2023 12:53:00 PM

fantastic assessment on psm 1

S
SAJI
7/20/2023 2:51:00 AM

56 question correct answer a,b

R
Raj Kumar
10/23/2023 8:52:00 PM

thank you for providing the q bank

P
piyush keshari
7/7/2023 9:46:00 PM

true quesstions

B
B.A.J
11/6/2023 7:01:00 AM

i can´t believe ms asks things like this, seems to be only marketing material.

G
Guss
5/23/2023 12:28:00 PM

hi, could you please add the last update of ns0-527

R
Rond65
8/22/2023 4:39:00 PM

question #3 refers to vnet4 and vnet5. however, there is no vnet5 listed in the case study (testlet 2).

C
Cheers
12/13/2023 9:55:00 AM

sometimes it may be good some times it may be

S
Sumita Bose
7/21/2023 1:01:00 AM

qs 4 answer seems wrong- please check

A
Amit
9/7/2023 12:53:00 AM

very detailed explanation !

F
FisherGirl
5/16/2022 10:36:00 PM

the interactive nature of the test engine application makes the preparation process less boring.

C
Chiranthaka
9/20/2023 11:15:00 AM

very useful.

S
SK
7/15/2023 3:51:00 AM

complete question dump should be made available for practice.

G
Gamerrr420
5/25/2022 9:38:00 PM

i just passed my first exam. i got 2 exam dumps as part of the 50% sale. my second exam is under work. once i write that exam i report my result. but so far i am confident.

K
Kudu hgeur
9/21/2023 5:58:00 PM

nice create dewey stefen

A
Anorag
9/6/2023 9:24:00 AM

i just wrote this exam and it is still valid. the questions are exactly the same but there are about 4 or 5 questions that are answered incorrectly. so watch out for those. best of luck with your exam.

N
Nathan
1/10/2023 3:54:00 PM

passed my exam today. this is a good start to 2023.

1
1
10/28/2023 7:32:00 AM

great sharing

A
Anand
1/20/2024 10:36:00 AM

very helpful

K
Kumar
6/23/2023 1:07:00 PM

thanks.. very helpful

U
User random
11/15/2023 3:01:00 AM

i registered for 1z0-1047-23 but dumps qre available for 1z0-1047-22. help me with this...

K
kk
1/17/2024 3:00:00 PM

very helpful

R
Raj
7/24/2023 10:20:00 AM

please upload oracle 1z0-1110-22 exam pdf

B
Blessious Phiri
8/13/2023 11:58:00 AM

becoming interesting on the logical part of the cdbs and pdbs

L
LOL what a joke
9/10/2023 9:09:00 AM

some of the answers are incorrect, i would be wary of using this until an admin goes back and reviews all the answers

M
Muhammad Rawish Siddiqui
12/9/2023 7:40:00 AM

question # 267: federated operating model is also correct.

AI Tutor 👋 I’m here to help!