Palo Alto Networks Network Security Architect v1.0

Page:    1 / 3   
Exam contains 45 questions

A retail organization wants to sanction the use of a particular third-party SaaS-based AI application for inventory management. This application will need network layer data access to the organization’s internal supply chain database with confidential information highly secured in its own DMZ. The implementation is delayed because the CISO is concerned that the sanctioned third-party AI application could get compromised and then used to exfiltrate customer PH from the internal database.
Which solution will address the CISO's concern?

  • A. Prisma AIRS with the AI agent deployed on the database server to monitor for unauthorized access attempts
  • B. Prisma AIRS with AI Security content updates to inspect the model's behavior and block anomalous database queries
  • C. AI Access Security with an App-ID Cloud Engine subscription to precisely identify and then block the inventory management application entirely
  • D. AI Access Security with an Enterprise DLP subscription to identify and block the PII within the traffic to and from the SaaS application


Answer : D

Which factor must be taken into consideration when determining whether an NGFW edge architecture or a SASE architecture is appropriate to recommend to a customer planning to implement a Zero Trust Network Access (ZTNA) solution?

  • A. ZTNA requires User-ID and Group-ID information that is not available in Prisma SD-WAN
  • B. ZTNA can be implemented regardless of the whether an NGFW or SASE solution is selected
  • C. ZTNA revolves around an agent on the endpoint and does not influence the overall NGFW or SASE architecture
  • D. ZTNA is a component of SASE and can only be implemented with Prisma Access


Answer : B

An organization has selected Prisma SD-WAN ION devices for use at branch offices and is working to build a low-level design for its sites. A typical branch site has a 10 Mbps MPLS with fiber LC-SR, and an RJ-45 Ethernet 50 Mbps DIA internet circuit.
There are 75 workstations and a stacked core switch that supports LACP, M-LAG, BGP, and OSPF will be used. The core switch is the default gateway for all local VLANs. The final design will determine the selection of the appropriate model and accessories for the site.
Which statement applies to the Prisma SD-WAN architecture in this use case?

  • A. MPLS underlay paths cannot be used as an active path alongside internet overlay path
  • B. Connectivity over the MPLS will be lost when the device that terminates it loses power
  • C. High availability (HA) for the LAN side connectivity can at most support two interfaces using LAG / LACP
  • D. Only a default route can be advertised on a LAN-side BGP peering from the ION


Answer : B

An architect is designing a security solution for a large AWS environment with numerous application virtual private clouds (VPCs). These applications have diverse and sometimes conflicting inbound security requirements, making a single, unified ruleset challenging to create and maintain. The solution must secure inbound traffic for different application groups while also centrally securing all outbound and east-west traffic via an AWS Transit Gateway.
Which design model recommendation will simplify rule complexity for inbound traffic while meeting all security requirements?

  • A. Transit Gateway model focused on establishing connectivity by creating a full mesh of direct peering connections between all application VPCs
  • B. Combined model using dedicated inbound NGFWs for logical application groups and a central NGFW for east-west and outbound traffic
  • C. Isolated model deploying a separate non-connected security VPC for each application VPC
  • D. Centralized model to consolidating all security functions by directing all inbound, outbound, and east-west traffic through a single, shared security VPC


Answer : B

A security architect needs to design a log collection architecture for a large organization with hundreds of firewalls distributed across multiple geographic regions. The primary requirement is to ensure that if a single Log Collector in any region fails, logs from the firewalls in that region will automatically be sent to another available Log Collector without manual intervention.
What is the recommended Panorama feature to achieve this level of log collection resilience?

  • A. Log Collector Group for each geographic region
  • B. Storage capacity increase on each individual Log Collector
  • C. Load balancer to distribute logs across all Log Collectors
  • D. Log Collectors deployed in a high availability (HA) pair


Answer : A

A global organization is in the process of securing critical applications during a cloud-based migration while migrating to a cloud-first design, and it is currently performing a brownfield migration of its most critical applications — such as CRM and product intellectual property / design systems — into Azure Cloud. The organization already has an active/passive high availability (HA) NGFW deployed at its data center with multiple zones and has replicated that design into its existing Azure HA deployment.
The organization recognizes the need to modernize its security posture as critical workloads move out of the data center and users connect from anywhere. Its security model is defined by a traditional "hard shell, soft center" approach:

Zero Trust Gaps -
Current network segmentation is perimeter-based. The organization wants to expand Zero Trust principles across cloud and on-premises environments.
The network relies heavily on VLANs and IP address-based Access Control Lists (ACLs) segmented primarily by office location and broad departmental groups.
Once employees are on the corporate network (i.e., inside the "perimeter"), they have relatively wide access.
If attackers compromise a single endpoint (e.g., via a phishing email), they can easily move laterally and scan for high-value targets.

Cloud Blind Spots -
The organization uses Azure for its production environments and hosts applications that contain sensitive customer data.
Security controls in the cloud are often managed independently of the on-premises network. Access is frequently granted with overly permissive identity and access management (IAM) roles and keys based on the resource rather than the user’s real-time context or application health.

Remote User Access -
Many remote users are still hairpinning into the corporate data center just to reach internet or SaaS resources, creating latency and inefficiency.
Traditional VPN is used for remote employees.
The VPN grants access to the entire internal network segment making the remote endpoint the new, weaker perimeter. There is no continuous check on the user’s device health after the initial connection.

Visibility and Logging -
Logs are primarily stored on-premises, then forwarded to a local Security Information and Event Management (SIEM) solution. As applications move to Azure, visibility into cloud traffic and user behavior becomes fragmented.

Data Security Concern -
Sensitive data, including product design files, will now live in SaaS and cloud environments. The organization needs data security to prevent leakage and enforce compliance.

Ingress Security -
Third-party partners and suppliers require access into the data center and cloud applications, introducing risk at ingress points.
The current Microsoft Azure NGFW architecture will not support the increased traffic with the new applications being migrated.
Which architectural solution will provide scalable inspection?

  • A. Decommission the firewall pair and use a multi-region deployment of Azure VPN gateways to manage VNet-to-VNet connections.
  • B. Migrate to a load balancer-based autoscaling firewall cluster that uses User-Defined Routes (UDRs) to traffic to multiple concurrent firewall instances for inspection.
  • C. Keep the active/passive firewall only for north-south traffic and rely entirely on Azure Network Security Groups (NSGs) for east-west traffic inspection.
  • D. Maintain the Azure active/passive design and use Azure scale sets to vertically scale the firewall size to handle all current and anticipated future east-west traffic.


Answer : B

A global organization is in the process of securing critical applications during a cloud-based migration while migrating to a cloud-first design, and it is currently performing a brownfield migration of its most critical applications — such as CRM and product intellectual property / design systems — into Azure Cloud. The organization already has an active/passive high availability (HA) NGFW deployed at its data center with multiple zones and has replicated that design into its existing Azure HA deployment.
The organization recognizes the need to modernize its security posture as critical workloads move out of the data center and users connect from anywhere. Its security model is defined by a traditional "hard shell, soft center" approach:

Zero Trust Gaps -
Current network segmentation is perimeter-based. The organization wants to expand Zero Trust principles across cloud and on-premises environments.
The network relies heavily on VLANs and IP address-based Access Control Lists (ACLs) segmented primarily by office location and broad departmental groups.
Once employees are on the corporate network (i.e., inside the "perimeter"), they have relatively wide access.
If attackers compromise a single endpoint (e.g., via a phishing email), they can easily move laterally and scan for high-value targets.

Cloud Blind Spots -
The organization uses Azure for its production environments and hosts applications that contain sensitive customer data.
Security controls in the cloud are often managed independently of the on-premises network. Access is frequently granted with overly permissive identity and access management (IAM) roles and keys based on the resource rather than the user’s real-time context or application health.

Remote User Access -
Many remote users are still hairpinning into the corporate data center just to reach internet or SaaS resources, creating latency and inefficiency.
Traditional VPN is used for remote employees.
The VPN grants access to the entire internal network segment making the remote endpoint the new, weaker perimeter. There is no continuous check on the user’s device health after the initial connection.

Visibility and Logging -
Logs are primarily stored on-premises, then forwarded to a local Security Information and Event Management (SIEM) solution. As applications move to Azure, visibility into cloud traffic and user behavior becomes fragmented.

Data Security Concern -
Sensitive data, including product design files, will now live in SaaS and cloud environments. The organization needs data security to prevent leakage and enforce compliance.

Ingress Security -
Third-party partners and suppliers require access into the data center and cloud applications, introducing risk at ingress points.
The organization needs to ensure data security and prevent the leakage of sensitive product design files since it is migrating to SaaS and cloud environments.
How would implementing a Next-Generation CASB (CASB-X) capability address the concerns in the scenario?

  • A. By replacing the reliance on VLANs and IP address-based Access Control Lists (ACLs) by enforcing a user-to-application microsegmentation policy based on identity
  • B. By providing data loss prevention (DLP) features to scan data-at-rest and data-in-transit in sanctioned SaaS and cloud applications
  • C. By continuously monitoring user behavior and device health from a central control point to prevent lateral movement if an attacker compromises an endpoint
  • D. By applying URL filtering and malware prevention to all traffic destined for unsanctioned or risky cloud applications, reducing the attack surface


Answer : B

A global organization is in the process of securing critical applications during a cloud-based migration while migrating to a cloud-first design, and it is currently performing a brownfield migration of its most critical applications — such as CRM and product intellectual property / design systems — into Azure Cloud. The organization already has an active/passive high availability (HA) NGFW deployed at its data center with multiple zones and has replicated that design into its existing Azure HA deployment.
The organization recognizes the need to modernize its security posture as critical workloads move out of the data center and users connect from anywhere. Its security model is defined by a traditional "hard shell, soft center" approach:

Zero Trust Gaps -
Current network segmentation is perimeter-based. The organization wants to expand Zero Trust principles across cloud and on-premises environments.
The network relies heavily on VLANs and IP address-based Access Control Lists (ACLs) segmented primarily by office location and broad departmental groups.
Once employees are on the corporate network (i.e., inside the "perimeter"), they have relatively wide access.
If attackers compromise a single endpoint (e.g., via a phishing email), they can easily move laterally and scan for high-value targets.

Cloud Blind Spots -
The organization uses Azure for its production environments and hosts applications that contain sensitive customer data.
Security controls in the cloud are often managed independently of the on-premises network. Access is frequently granted with overly permissive identity and access management (IAM) roles and keys based on the resource rather than the user’s real-time context or application health.

Remote User Access -
Many remote users are still hairpinning into the corporate data center just to reach internet or SaaS resources, creating latency and inefficiency.
Traditional VPN is used for remote employees.
The VPN grants access to the entire internal network segment making the remote endpoint the new, weaker perimeter. There is no continuous check on the user’s device health after the initial connection.

Visibility and Logging -
Logs are primarily stored on-premises, then forwarded to a local Security Information and Event Management (SIEM) solution. As applications move to Azure, visibility into cloud traffic and user behavior becomes fragmented.

Data Security Concern -
Sensitive data, including product design files, will now live in SaaS and cloud environments. The organization needs data security to prevent leakage and enforce compliance.

Ingress Security -
Third-party partners and suppliers require access into the data center and cloud applications, introducing risk at ingress points.
Which solution will improve resilience and reduce operational overhead in this scenario?

  • A. Vertically scaling the existing HA solution with enough capacity for the new applications
  • B. Cloud NGFW integrated into the existing virtual network (VNet) design
  • C. Centralized VM-Series NGFW deployed in the existing virtual network (VNet)
  • D. Distributed VM-Series NGFW in a new virtual network (VNet)


Answer : B

An organization wants to modernize its legacy branch architecture. The existing architecture is rigid, complex, and ill-suited for a cloud-first strategy, creating high operational costs and latency.
The four core data centers are strategically located in Dallas, Toronto, London and Tokyo, and they are interconnected by a dedicated MPLS backbone providing reliable connectivity but incurring significant costs and offering limited bandwidth scalability.
Branches rely on MPLS or site-to-site VPN to connect to the nearest geographical data center.
All internet-bound traffic from the branches is backhauled to the data center egress firewalls. This creates latency for SaaS applications and increases bandwidth strain on the MPLS links.
The organization requires a proposal for a new WAN architecture for branch connectivity with the goal of improving security posture and SaaS application access as well as supporting local internet breakout for all branch devices, including IoT.
Which two implementations will achieve the goal of modernizing the branch architecture? (Choose two.)

  • A. NGFW at each branch with Large Scale VPN (LSVPN) for data center access and Direct Internet Access (DIA)
  • B. SD-WAN using on-premises NGFWs for Direct Internet Access (DIA)
  • C. SSE with Prisma Access for mobile users and service connections
  • D. SASE with Prisma Access for remote networks and service connections


Answer : BD

An organization wants to modernize its legacy branch architecture. The existing architecture is rigid, complex, and ill-suited for a cloud-first strategy, creating high operational costs and latency.
The four core data centers are strategically located in Dallas, Toronto, London and Tokyo, and they are interconnected by a dedicated MPLS backbone providing reliable connectivity but incurring significant costs and offering limited bandwidth scalability.
Branches rely on MPLS or site-to-site VPN to connect to the nearest geographical data center.
All internet-bound traffic from the branches is backhauled to the data center egress firewalls. This creates latency for SaaS applications and increases bandwidth strain on the MPLS links.
What is the primary security posture enhancement that can be achieved in this use case by offloading data center backhaul to a PAN-OS SD-WAN model with local internet breakout for SaaS traffic?

  • A. Reduced attack surface on the MPLS / DC edge by removing unnecessary SaaS flows
  • B. Improved resilience by allowing path diversity with DIA, LTE, or broadband
  • C. Better segmentation within the branch LAN allowing for isolation of user groups or devices locally
  • D. Better visibility and granular control at the branch firewall


Answer : D

A global organization is modernizing its data center and private cloud infrastructure. The environment consists of:
A Nutanix AHV cluster hosting critical east-west application workloads
A VMware ESXi cluster with multi-socket hosts, supporting high-throughput workloads (>10 Gbps)
A new pair of PA-5450 firewalls to secure the perimeter and handle encrypted traffic inspection at scale
Strict performance service-level agreements (SLAs) for both north-south and east-west flows, with heavy reliance on TLS 1.3 and IPSec
A Network Functions Virtualization (NFV) environment on KVM to provide high-performance security services to maximize packet throughput and minimize latency
The chief architect is tasked with ensuring that the firewall design avoids hypervisor contention optimizes non-uniform memory access (NUMA) and uses hardware features for encrypted traffic.
VM-Series on Nutanix AHV - Resource Allocation
Because the Nutanix cluster is already heavily used, the architect's main concern is preventing performance degradation of the virtual firewall. Thin provisioning or ballooning could introduce latency and unpredictability which is unacceptable for a security-sensitive workload.
VM-Series on VMware ESXi - NUMA and vCPU Placement
In the VMware ESXi environment, the architect is deploying VM-Series for workloads pushing >10 Gbps. Assigning vCPUs across NUMA nodes or oversubscribing cores would create latency due to cross-socket memory access and scheduling delays. Similarly, dedicating logical hypethreads does not provide the deterministic data plane performance required.
Operational Integration and High Availability
With performance guaranteed by correct hypervisor and hardware provisioning, the architect also considers high availability (HA). VM-Series pairs are deployed in active/passive HA across Nutanix and VMware clusters, while PA-5450s form the data center’s north-south secure perimeter deployment. This ensures resilience without introducing unnecessary east-west inspection bottlenecks.
The recommendation must be a scalable, high-performance firewall deployment aligned with enterprise SLAs and the CISO’s encrypted traffic concerns.
Which resource allocation strategy should the architect use for the VM-Series virtual machine (VM)?

  • A. Enable memory overcommitment (ballooning) on the VM to allow the hypervisor to reclaim unused memory for other workloads.
  • B. Implement CPU and memory reservation for the VM, pinning it to specific physical cores and reserving 100% of its allocated RAM.
  • C. Use thin provisioning for the VM’s virtual disks to save storage space and allow for flexible growth.
  • D. Configure the VM with a high-priority setting in the AHV scheduler to ensure it gets preferential access to CPU cycles.


Answer : B

A global organization is modernizing its data center and private cloud infrastructure. The environment consists of:
A Nutanix AHV cluster hosting critical east-west application workloads
A VMware ESXi cluster with multi-socket hosts, supporting high-throughput workloads (>10 Gbps)
A new pair of PA-5450 firewalls to secure the perimeter and handle encrypted traffic inspection at scale
Strict performance service-level agreements (SLAs) for both north-south and east-west flows, with heavy reliance on TLS 1.3 and IPSec
A Network Functions Virtualization (NFV) environment on KVM to provide high-performance security services to maximize packet throughput and minimize latency
The chief architect is tasked with ensuring that the firewall design avoids hypervisor contention optimizes non-uniform memory access (NUMA) and uses hardware features for encrypted traffic.
VM-Series on Nutanix AHV - Resource Allocation
Because the Nutanix cluster is already heavily used, the architect's main concern is preventing performance degradation of the virtual firewall. Thin provisioning or ballooning could introduce latency and unpredictability which is unacceptable for a security-sensitive workload.
VM-Series on VMware ESXi - NUMA and vCPU Placement
In the VMware ESXi environment, the architect is deploying VM-Series for workloads pushing >10 Gbps. Assigning vCPUs across NUMA nodes or oversubscribing cores would create latency due to cross-socket memory access and scheduling delays. Similarly, dedicating logical hypethreads does not provide the deterministic data plane performance required.
Operational Integration and High Availability
With performance guaranteed by correct hypervisor and hardware provisioning, the architect also considers high availability (HA). VM-Series pairs are deployed in active/passive HA across Nutanix and VMware clusters, while PA-5450s form the data center’s north-south secure perimeter deployment. This ensures resilience without introducing unnecessary east-west inspection bottlenecks.
The recommendation must be a scalable, high-performance firewall deployment aligned with enterprise SLAs and the CISO’s encrypted traffic concerns.
While using the VM-Series to build the NFV environment, which configuration should the architect use?

  • A. SR-IOV-enabled network interfaces and DPDK mode enabled
  • B. SR-IOV-enabled network interfaces and standard Linux bridge networking
  • C. Virtio drivers connected to an Open vSwitch (OVS) bridge
  • D. Virtio drivers and DPDK mode enabled


Answer : A

A global organization is modernizing its data center and private cloud infrastructure. The environment consists of:
A Nutanix AHV cluster hosting critical east-west application workloads
A VMware ESXi cluster with multi-socket hosts, supporting high-throughput workloads (>10 Gbps)
A new pair of PA-5450 firewalls to secure the perimeter and handle encrypted traffic inspection at scale
Strict performance service-level agreements (SLAs) for both north-south and east-west flows, with heavy reliance on TLS 1.3 and IPSec
A Network Functions Virtualization (NFV) environment on KVM to provide high-performance security services to maximize packet throughput and minimize latency
The chief architect is tasked with ensuring that the firewall design avoids hypervisor contention optimizes non-uniform memory access (NUMA) and uses hardware features for encrypted traffic.
VM-Series on Nutanix AHV - Resource Allocation
Because the Nutanix cluster is already heavily used, the architect's main concern is preventing performance degradation of the virtual firewall. Thin provisioning or ballooning could introduce latency and unpredictability which is unacceptable for a security-sensitive workload.
VM-Series on VMware ESXi - NUMA and vCPU Placement
In the VMware ESXi environment, the architect is deploying VM-Series for workloads pushing >10 Gbps. Assigning vCPUs across NUMA nodes or oversubscribing cores would create latency due to cross-socket memory access and scheduling delays. Similarly, dedicating logical hypethreads does not provide the deterministic data plane performance required.
Operational Integration and High Availability
With performance guaranteed by correct hypervisor and hardware provisioning, the architect also considers high availability (HA). VM-Series pairs are deployed in active/passive HA across Nutanix and VMware clusters, while PA-5450s form the data center’s north-south secure perimeter deployment. This ensures resilience without introducing unnecessary east-west inspection bottlenecks.
The recommendation must be a scalable, high-performance firewall deployment aligned with enterprise SLAs and the CISO’s encrypted traffic concerns.
Which PAN-OS feature will meet the CISO’s need for north-south traffic inspection?

  • A. High-density DAC/QSFP ports for flexible network connectivity
  • B. Dedicated out-of-band management port for separating management and data traffic
  • C. Dual redundant, hot-swappable power supplies for HA
  • D. Dedicated hardware crypto engines for offloading SSL/TLS decryption and IPSec processing


Answer : D

A global organization is modernizing its data center and private cloud infrastructure. The environment consists of:
A Nutanix AHV cluster hosting critical east-west application workloads
A VMware ESXi cluster with multi-socket hosts, supporting high-throughput workloads (>10 Gbps)
A new pair of PA-5450 firewalls to secure the perimeter and handle encrypted traffic inspection at scale
Strict performance service-level agreements (SLAs) for both north-south and east-west flows, with heavy reliance on TLS 1.3 and IPSec
A Network Functions Virtualization (NFV) environment on KVM to provide high-performance security services to maximize packet throughput and minimize latency
The chief architect is tasked with ensuring that the firewall design avoids hypervisor contention optimizes non-uniform memory access (NUMA) and uses hardware features for encrypted traffic.
VM-Series on Nutanix AHV - Resource Allocation
Because the Nutanix cluster is already heavily used, the architect's main concern is preventing performance degradation of the virtual firewall. Thin provisioning or ballooning could introduce latency and unpredictability which is unacceptable for a security-sensitive workload.
VM-Series on VMware ESXi - NUMA and vCPU Placement
In the VMware ESXi environment, the architect is deploying VM-Series for workloads pushing >10 Gbps. Assigning vCPUs across NUMA nodes or oversubscribing cores would create latency due to cross-socket memory access and scheduling delays. Similarly, dedicating logical hypethreads does not provide the deterministic data plane performance required.
Operational Integration and High Availability
With performance guaranteed by correct hypervisor and hardware provisioning, the architect also considers high availability (HA). VM-Series pairs are deployed in active/passive HA across Nutanix and VMware clusters, while PA-5450s form the data center’s north-south secure perimeter deployment. This ensures resilience without introducing unnecessary east-west inspection bottlenecks.
The recommendation must be a scalable, high-performance firewall deployment aligned with enterprise SLAs and the CISO’s encrypted traffic concerns.
To optimize throughput and minimize latency, what is recommended to configure the vCPUs and NUMA for this deployment?

  • A. Ensure that all vCPUs assigned to the VM’s data plane reside on a single physical NUMA node
  • B. Assign vCPUs from multiple NUMA nodes to allow the VM to access more memory
  • C. Configure the number of vCPUs to be greater than the number of physical cores on the host in order to use the ESXi scheduler
  • D. Enable hyperthreading on the physical host and assign all logical cores from a single physical core to the VM-Series


Answer : A

An organization is in the process of building a network infrastructure that is cloud first. Part of the revised architecture includes Prisma Access as demonstrated in the diagram below. The organization has selected Strata Cloud Manager (SCM) as the management method for Prisma Access and NGFWs deployed at the data center and in public cloud environments. There are 150 NGFWs in place that are used to terminate service connections and segment networks as well as to secure the data center and public cloud resources.

One of the resilience requirements is to provide highly available directory services and authentication for the NGFW and Prisma Access deployment.
Which two configurations meet the design and customer requirements in this scenario? (Choose two.)

  • A. Firewalls connected to LDAP servers and Prisma Access connected to the Cloud Identity Engine with connections to the LDAP servers for directory services
  • B. Firewalls and Prisma Access for mobile users with RADIUS authentication
  • C. Firewalls and Prisma Access connected to the Cloud Identity Engine with connections to Entra ID for directory services
  • D. Firewalls and Prisma Access for mobile users configured with SAML authentication


Answer : CD

Page:    1 / 3   
Exam contains 45 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy | Amazon Exams | Cisco Exams | CompTIA Exams | Databricks Exams | Fortinet Exams | Google Exams | Microsoft Exams | VMware Exams