Palo Alto Networks Network Security Generalist 온라인 연습
최종 업데이트 시간: 2025년02월13일
당신은 온라인 연습 문제를 통해 Paloalto Networks NetSec-Generalist 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 NetSec-Generalist 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 60개의 시험 문제와 답을 포함하십시오.
정답:
Explanation:
An ION device (used in Prisma SD-WAN) must be configured in Analytics mode at a newly acquired site to audit traffic without steering it. This mode allows administrators to monitor network behavior without actively modifying traffic paths.
Why Analytics Mode is the Correct Choice?
Passively Observes Traffic
The ION device monitors and logs site traffic for analysis.
No active control over routing or traffic flow is applied.
Useful for Network Auditing Before Full Deployment
Analytics mode provides visibility into site traffic before committing to SD-WAN policy changes.
Helps identify optimization opportunities and troubleshoot connectivity before enabling traffic
steering.
Other Answer Choices Analysis
(A) Access Mode C Enables active routing and steering of traffic, which is not desired for passive auditing.
(B) Control Mode C Actively controls traffic flows and enforces policies, not suitable for observation-only setups.
(C) Disabled Mode C The device would not function in this mode, making it useless for traffic monitoring.
Reference and Justification:
Firewall Deployment C Prisma SD-WAN ION devices must be placed in Analytics mode for initial audits.
Zero Trust Architectures C Helps assess security risks before enabling active controls.
Thus, Analytics Mode (D) is the correct answer, as it allows auditing of site traffic without traffic steering.
정답:
Explanation:
When setting up NAT for inbound traffic to a DMZ using private IP addressing, the correct approach is to configure NAT policies on:
Pre-NAT addresses C Refers to the public IP address that external users access.
Post-NAT zone C Refers to the internal (DMZ) zone where the private IP resides.
This ensures that inbound requests are translated correctly from public to private addresses and that firewall policies can enforce access control.
Why is Pre-NAT Address & Post-NAT Zone the Correct Choice?
NAT Rules Must Use Pre-NAT Addresses
The firewall processes NAT rules first, meaning firewall security policies reference pre-NAT IPs.
This ensures incoming traffic is properly matched before translation.
Post-NAT Zone Ensures Correct Forwarding
The destination zone must match the actual (post-NAT) zone to allow correct security policy enforcement.
Other Answer Choices Analysis
(A) Configure Static NAT for All Incoming Traffic C
Static NAT alone does not ensure correct security policy enforcement.
Pre-NAT and post-NAT rules are still required for proper traffic flow.
(B) Create NAT Policies on Post-NAT Addresses for All Traffic Destined for DMZ C Incorrect, as NAT policies are always based on pre-NAT addresses.
(D) Create Policies Only for Pre-NAT Addresses and Any Destination Zone C Firewall rules must match the correct post-NAT zone to ensure proper traffic handling. Reference and Justification:
Firewall Deployment C Ensures correct NAT configuration for public-to-private access.
Security Policies C Policies must match pre-NAT IPs and post-NAT zones for proper enforcement.
Thus, Configuring NAT policies on Pre-NAT addresses and Post-NAT zone (C) is the correct answer, as it ensures proper NAT and security policy enforcement.
정답:
Explanation:
When configuring High Availability (HA) settings in Panorama, administrators need to ensure that each firewall in the HA pair has a unique Peer HA1 IP address while using a shared template stack. This is achieved using Template Variables, which allow dynamic configurations per firewall.
Why Template Variable is the Correct Answer?
Ensures Unique HA1 IP Addresses
HA pairs require two separate HA1 IP addresses (one per firewall).
Using template variables, the administrator can assign different values to each firewall without creating separate templates.
Template Variables Provide Flexibility
Instead of hardcoding HA1 IP addresses in the template, variables allow different firewalls to dynamically inherit unique values.
This avoids duplication and ensures configuration scalability when managing multiple firewalls. Other Answer Choices Analysis
(A) Template Stack C Defines the overall configuration hierarchy but does not provide dynamic IP assignment.
(C) Address Object C Used for security policies and NAT rules, not for HA configurations.
(D) Dynamic Address Group C Primarily used for automated security policies, not HA settings. Reference and Justification:
Firewall Deployment C HA configurations require unique peer IPs, and template variables provide dynamic assignment.
Panorama C Template variables enhance scalability and simplify HA configurations across multiple devices.
Thus, Template Variable (B) is the correct answer, as it allows dynamic peer HA1 IP assignment while using a shared template stack in Panorama.
정답:
Explanation:
The Policy Optimizer tool helps refine security rules by analyzing historical traffic data and identifying the applications observed over past weeks.
It is designed to:
Improve Security Policies C Identifies overly permissive rules and suggests specific application-based security policies.
Enhance Rule Accuracy C Helps replace port-based rules with App-ID-based security rules, reducing the risk of unintended access.
Use Historical Traffic Data C Analyzes past network activity to determine which applications should be explicitly allowed or denied.
Simplify Rule Management C Reduces redundant or outdated policies, leading to more effective firewall rule enforcement.
Why Other Options Are Incorrect?
A. Security Lifecycle Review (SLR) ❌
Incorrect, because SLR provides a high-level security assessment, not a tool for refining specific security rules.
It focuses on identifying security gaps rather than optimizing security policies based on past traffic data.
B. Custom Reporting ❌
Incorrect, because Custom Reporting generates security insights and compliance reports, but does not analyze policy rules.
C. Autonomous Digital Experience Management (ADEM) ❌
Incorrect, because ADEM is designed for network performance monitoring, not firewall rule refinement.
It helps measure end-user digital experiences rather than security policy optimizations.
Reference to Firewall Deployment and Security Features:
Firewall Deployment C Policy Optimizer improves firewall efficiency and accuracy.
Security Policies C Refines rules based on actual observed application traffic.
VPN Configurations C Helps optimize security policies for VPN traffic.
Threat Prevention C Ensures that unused or unnecessary policies do not create security risks.
WildFire Integration C Works alongside WildFire threat detection to fine-tune application security rules.
Zero Trust Architectures C Supports least-privilege access control by defining specific App-ID-based rules.
Thus, the correct answer is:
✅ D. Policy Optimizer
정답:
Explanation:
Cloud NGFW for AWS is a managed next-generation firewall service provided by Palo Alto Networks, designed to secure AWS environments.
It can be configured using two primary tools:
Cloud Service Provider's Management Console (AWS Console) C
AWS users can deploy and manage Cloud NGFW for AWS directly from the AWS Marketplace or AWS Management Console.
The AWS console allows integration with AWS native services, such as VPCs, security groups, and IAM policies.
Panorama C
Panorama provides centralized policy and configuration management for Cloud NGFW instances deployed across AWS.
It enables consistent security policy enforcement, log aggregation, and seamless integration with on-premises and multi-cloud firewalls.
Why Other Options Are Incorrect?
A. Cortex XSIAM ❌
Incorrect, because Cortex XSIAM is an AI-driven security operations platform, not a tool for Cloud NGFW configuration.
It focuses on SOC automation, threat detection, and response rather than firewall policy
management.
C. Prisma Cloud Management Console ❌
Incorrect, because Prisma Cloud is designed for cloud security posture management (CSPM) and compliance.
While Prisma Cloud monitors security risks in AWS, it does not configure or manage Cloud NGFW policies.
Reference to Firewall Deployment and Security Features:
Firewall Deployment C Cloud NGFW integrates with AWS network architecture.
Security Policies C Panorama enforces security policies across AWS workloads.
VPN Configurations C Cloud NGFW supports AWS-based VPN traffic inspection.
Threat Prevention C Protects AWS workloads from malware, exploits, and network threats.
WildFire Integration C Detects unknown threats within AWS environments.
Zero Trust Architectures C Secures AWS cloud workloads using Zero Trust principles.
Thus, the correct answers are:
✅ B. Cloud service provider's management console
✅ D. Panorama
정답:
Explanation:
A Dynamic Address Group (DAG) is a firewall feature that automatically updates firewall rules based on changing attributes of devices, servers, or endpoints. This allows engineers to simplify rule creation and ensure policies remain up-to-date without manual intervention.
Why Dynamic Address Groups?
Automatically Adapts to Changes
DAGs use log events, tags, and attributes to dynamically update firewall rules.
If a server role changes (e.g., a web server becomes an application server), it is automatically placed in the correct security rule without requiring manual updates.
Simplifies Rule Creation
Instead of manually defining static IP addresses, engineers use logical groupings based on metadata, such as VM tags, cloud attributes, or user roles.
Ensures policies remain accurate even when IP addresses or security postures change.
Other Answer Choices Analysis
(B) Dynamic User Groups C Controls policies based on user identity, not server roles or log-based attributes.
(C) Predefined IP Addresses C Static and does not adapt to infrastructure changes.
(D) Address Objects C Manually defined and does not dynamically adjust based on log events or security posture.
Reference and Justification:
Firewall Deployment C DAGs help dynamically assign security policies based on real-time data.
Security Policies C Automatically applies correct rules based on changing attributes.
Threat Prevention & WildFire C Ensures that compromised systems are automatically placed under restrictive security policies.
Panorama C DAGs are managed centrally, ensuring uniform policy enforcement across multiple firewalls.
Zero Trust Architectures C Dynamic adaptation ensures least-privilege access enforcement as environments change.
Thus, Dynamic Address Groups (A) is the correct answer, as it simplifies rule creation and ensures automatic adaptation to changes in server roles or security posture.
정답:
Explanation:
In Strata Cloud Manager (SCM), policies need to balance privacy while ensuring secure decryption for mobile users in Prisma Access.
The correct approach involves:
SSL Forward Proxy (C) C Enables decryption of outbound SSL traffic, allowing security inspection while ensuring unauthorized data does not leave the network.
No Decryption (D) C Excludes personal data from being decrypted, ensuring compliance with privacy regulations (e.g., GDPR, HIPAA) and protecting sensitive employee information.
Why These Two Policies?
SSL Forward Proxy (C)
Decrypts outbound SSL traffic from mobile users.
Inspects traffic for malware, data exfiltration, and compliance violations.
Ensures corporate security policies are enforced on user traffic.
No Decryption (D)
Ensures privacy-sensitive traffic (e.g., online banking, healthcare portals) remains untouched.
Exclusions can be defined based on categories, user groups, or destinations.
Helps maintain regulatory compliance while still securing other traffic.
Other Answer Choices Analysis
(A) SSH Decryption C Not relevant in this context, as SSH traffic is typically used for administrative access rather than mobile user web browsing.
(B) SSL Inbound Inspection C Used for inbound traffic to company-hosted servers, not for securing outbound traffic from mobile users.
Reference and Justification:
Firewall Deployment C SSL Forward Proxy enables traffic visibility, No Decryption protects privacy.
Security Policies C Defines what traffic should or should not be decrypted.
Threat Prevention & WildFire C Decryption helps detect hidden threats while excluding sensitive personal data.
Zero Trust Architectures C Ensures least-privilege access while maintaining privacy compliance.
Thus, SSL Forward Proxy (C) and No Decryption (D) are the correct answers, as they balance security and privacy for mobile users in Prisma Access.
정답:
Explanation:
To allow third-party contractors access to internal applications outside business hours, the Security Policy must include:
User-ID C
Identifies specific users (e.g., third-party contractors) and applies access rules accordingly. Ensures that only authenticated users from the contractor group receive access. Schedule C
Specifies the allowed access time frame (e.g., outside business hours: 6 PM - 6 AM).
Ensures that contractors can only access applications during designated off-hours.
Why Other Options Are Incorrect?
C. Service ❌
Incorrect, because Service defines ports and protocols, not user identity or time-based access control.
D. App-ID ❌
Incorrect, because App-ID identifies and classifies applications, but does not restrict access based on user identity or time.
Reference to Firewall Deployment and Security Features:
Firewall Deployment C Ensures contractors access internal applications securely via User-ID and Schedule.
Security Policies C Implements granular time-based and identity-based access control.
VPN Configurations C Third-party contractors may access applications through GlobalProtect VPN.
Threat Prevention C Reduces attack risks by limiting access windows for third-party users.
WildFire Integration C Ensures downloaded contractor files are scanned for threats.
Zero Trust Architectures C Supports least-privilege access based on user identity and time restrictions.
Thus, the correct answers are:
✅ A. User-ID
✅ B. Schedule
정답:
Explanation:
In Panorama centralized management, Plugins enable native and third-party integrations to monitor VM-Series NGFW logs and objects.
How Plugins Enable Integrations in Panorama
Native Integrations C Panorama plugins provide built-in support for cloud environments like AWS, Azure, GCP, as well as VM-Series firewalls.
Third-Party Integrations C Plugins allow Panorama to send logs and security telemetry to third-party systems like SIEMs, SOARs, and IT automation tools.
Log Monitoring & Object Management C Plugins help export logs, monitor firewall events, and manage dynamic firewall configurations in cloud deployments.
Automation and API Support C Plugins extend Panorama’s capabilities by integrating with external systems via APIs.
Why Other Options Are Incorrect?
B. Template ❌
Incorrect, because Templates are used for configuring firewall settings like network interfaces, not for log monitoring or third-party integrations.
C. Device Group ❌
Incorrect, because Device Groups manage firewall policies and objects, but do not handle log forwarding or third-party integrations.
D. Log Forwarding Profile ❌
Incorrect, because Log Forwarding Profiles define how logs are sent, but do not provide integration
capabilities with third-party tools.
Reference to Firewall Deployment and Security Features:
Firewall Deployment C Panorama uses plugins to integrate VM-Series NGFWs with cloud platforms.
Security Policies C Plugins support policy-based log forwarding and integration with external security tools.
VPN Configurations C Cloud-based VPNs can be managed and monitored using plugins.
Threat Prevention C Plugins enable SIEM integration to monitor threat logs.
WildFire Integration C Some plugins support automated malware analysis and reporting.
Zero Trust Architectures C Supports log-based security analytics for Zero Trust enforcement.
Thus, the correct answer is:
✅ A. Plugin
정답:
Explanation:
A Best Practice Assessment (BPA) evaluates firewall configurations against Palo Alto Networks' recommended best practices. In this case, the Cloud-Delivered Security Services (CDSS) update settings do not align with best practices, as they are currently set to weekly updates, which delays threat prevention.
Best Practices for Dynamic Updates in the Precision AI Bundle Applications and Threats C Update Daily
Regular updates ensure the firewall detects and blocks the latest exploits, vulnerabilities, and malware.
Weekly updates are too slow and leave the network vulnerable to newly discovered attacks. WildFire C Update Every Five Minutes
WildFire is Palo Alto Networks' cloud-based malware analysis engine, which identifies and mitigates new threats in near real-time.
Updating every five minutes ensures that newly discovered malware signatures are applied quickly.
A weekly update would significantly delay threat response.
Other Answer Choices Analysis
(B) Antivirus should be updated daily.
While frequent updates are recommended, Antivirus in Palo Alto firewalls is updated hourly by default (not daily).
(D) URL Filtering should be updated hourly.
URL Filtering databases are updated dynamically in the cloud, and do not require fixed hourly updates.
URL filtering effectiveness depends on cloud integration rather than frequent updates.
Reference and Justification:
Firewall Deployment C Ensuring dynamic updates align with best practices enhances security.
Security Policies C Applications, Threats, and WildFire updates are critical for enforcing protection policies.
Threat Prevention & WildFire C Frequent updates reduce the window of exposure to new threats.
Panorama C Updates can be managed centrally for branch offices.
Zero Trust Architectures C Requires real-time threat intelligence updates.
Thus, Applications & Threats (A) should be updated daily, and WildFire (C) should be updated every five minutes to maintain optimal security posture in accordance with BPA recommendations.
정답:
Explanation:
When a user authenticates and connects to a GlobalProtect gateway, the firewall can collect and evaluate device information using Host Information Profile (HIP). This feature helps enforce security policies based on the device’s posture before granting or restricting network access.
Why is HIP the Correct Answer?
What is HIP?
Host Information Profile (HIP) is a feature in GlobalProtect that gathers security-related information from the endpoint device, such as:
OS version
Patch level
Antivirus status
Disk encryption status
Host-based firewall status
Running applications
How Does HIP Work?
When a user connects to a GlobalProtect gateway, their device submits its HIP report to the firewall.
The firewall evaluates this information against configured security policies.
If the device meets security compliance, access is granted; otherwise, remediation actions (e.g., blocking access) can be applied.
Other Answer Choices Analysis
(A) RADIUS Authentication C While RADIUS is used for user authentication, it does not collect device security posture.
(B) IP Address C The user's IP address is tracked but does not provide device security information.
(D) Session ID C A session ID identifies the user session but does not collect host-based security details.
Reference and Justification:
Firewall Deployment C HIP profiles help enforce security policies based on device posture.
Security Policies C Administrators use HIP checks to restrict non-compliant devices.
Threat Prevention & WildFire C HIP ensures that endpoints are properly patched and protected.
Panorama C HIP reports can be monitored centrally via Panorama.
Zero Trust Architectures C HIP enforces device trust in Zero Trust models.
Thus, Host Information Profile (HIP) is the correct answer, as it collects device security information when a user connects to a GlobalProtect gateway.
정답:
Explanation:
GlobalProtect is Palo Alto Networks' VPN and Zero Trust remote access solution. It dynamically determines whether a user should connect to an internal or external gateway based on external host detection.
How External Host Detection Works:
Preconfigured External Host Detection C
The GlobalProtect agent checks for a predefined trusted external IP address (e.g., the corporate office’s public IP).
Decision Making C
If the detected IP matches the trusted external host, the GlobalProtect client assumes the user is inside the corporate network and does not establish a VPN connection.
If the detected IP does not match, GlobalProtect initiates a VPN connection to an external gateway.
Improves Performance & Security C
Prevents unnecessary VPN connections when users are inside the corporate office.
Reduces bandwidth overhead by ensuring only external users connect via VPN.
Why Other Options Are Incorrect?
A. ICMP ping to Panorama management interface. ❌
Incorrect, because GlobalProtect does not use ICMP pings to determine location.
Panorama does not play a role in dynamic gateway selection for GlobalProtect.
B. User login credentials. ❌
Incorrect, because credentials are used for authentication, not for detecting location.
Users authenticate regardless of whether they are inside or outside the network.
D. Reverse DNS lookup of preconfigured host IP. ❌
Incorrect, because Reverse DNS lookups are not used for gateway selection.
DNS lookups can be inconsistent and are not a reliable method for internal/external detection.
Reference to Firewall Deployment and Security Features:
Firewall Deployment C GlobalProtect works with NGFWs to provide secure remote access.
Security Policies C Can enforce different security postures based on internal vs. external user location.
VPN Configurations C Uses dynamic gateway selection to optimize VPN performance.
Threat Prevention C Protects remote users from phishing, malware, and network-based threats.
WildFire Integration C Inspects files uploaded/downloaded via VPN for threats.
Zero Trust Architectures C Enforces Zero Trust Network Access (ZTNA) by verifying user identity and device security before granting access.
Thus, the correct answer is:
✅ C. External host detection.
정답:
Explanation:
Panorama is Palo Alto Networks’ centralized management platform for Next-Generation Firewalls (NGFWs). One of its key functions is to aggregate and analyze logs from multiple firewalls, which significantly enhances reporting and visibility across an organization's security infrastructure.
How Panorama Improves Reporting Capabilities:
Centralized Log Collection C Panorama collects logs from multiple firewalls, allowing administrators to analyze security events holistically.
Advanced Data Analytics C It provides rich visual reports, dashboards, and event correlation for security trends, network traffic, and threat intelligence.
Automated Log Forwarding C Logs can be forwarded to SIEM solutions or stored for long-term compliance auditing.
Enhanced Threat Intelligence C Integrated with Threat Prevention and WildFire, Panorama correlates logs to detect malware, intrusions, and suspicious activity across multiple locations.
Why Other Options Are Incorrect?
B. By automating all Security policy creations for multiple firewalls. ❌
Incorrect, because while Panorama enables centralized policy management, it does not fully automate policy creation―administrators must still define and configure policies.
C. By pushing out all firewall policies from a single physical appliance. ❌
Incorrect, because Panorama is available as a virtual appliance as well, not just a physical one.
While it pushes security policies, its primary enhancement to reporting is log aggregation and analysis.
D. By replacing the need for individual firewall deployment. ❌
Incorrect, because firewalls are still required for traffic enforcement and threat prevention. Panorama does not replace firewalls; it centralizes their management and reporting. Reference to Firewall Deployment and Security Features:
Firewall Deployment C Panorama provides centralized log analysis for distributed NGFWs.
Security Policies C Supports policy-based logging and compliance reporting.
VPN Configurations C Provides visibility into IPsec and GlobalProtect VPN logs.
Threat Prevention C Enhances reporting for malware, intrusion attempts, and exploit detection.
WildFire Integration C Stores WildFire malware detection logs for forensic analysis.
Zero Trust Architectures C Supports log-based risk assessment for Zero Trust implementations.
Thus, the correct answer is:
✅ A. By aggregating and analyzing logs from multiple firewalls.
정답:
Explanation:
In a Zero Trust Architecture (ZTA), network segmentation is critical to prevent unauthorized lateral movement within a flat network. Since the hospital system allows mobile medical imaging trailers to connect directly to its internal network, this poses a significant security risk, as these trailers may introduce malware, vulnerabilities, or unauthorized access to sensitive medical data.
The most cost-effective and practical solution in this scenario is:
Creating separate security zones for the imaging trailers.
Applying access control and inspection policies via the hospital’s existing core firewalls instead of deploying new hardware.
Implementing strict policy enforcement to ensure that only authorized communication occurs between the trailers and the hospital’s network.
Why Separate Zones with Enforcement is the Best Solution?
Network Segmentation for Zero Trust
By placing the medical imaging trailers in their own firewall-enforced zone, they are isolated from the main hospital network.
This reduces attack surface and prevents an infected trailer from spreading malware to critical hospital systems.
Granular security policies ensure only necessary communications occur between zones.
Cost-Effective Approach
Uses existing core firewalls instead of deploying costly additional edge firewalls at every campus.
Reduces complexity by leveraging the current security infrastructure.
Visibility & Security Enforcement
The firewall enforces security policies, such as allowing only medical imaging protocols while blocking unauthorized traffic.
Integration with Threat Prevention and WildFire ensures that malicious files or traffic anomalies are
detected.
Logging and monitoring via Panorama helps the security team track and respond to threats effectively.
Other Answer Choices Analysis
(A) Deploy edge firewalls at each campus entry point
This is an expensive approach, requiring multiple hardware firewalls at every hospital location.
While effective, it is not the most cost-efficient solution when existing core firewalls can enforce the necessary segmentation and policies.
(B) Manually inspect large images like holograms and MRIs This does not align with Zero Trust principles.
Manual inspection is impractical, as it slows down medical workflows.
Threats do not depend on image size; malware can be embedded in small and large files alike.
(D) Configure access control lists (ACLs) on core switches
ACLs are limited in security enforcement, as they operate at Layer 3/4 and do not provide deep inspection (e.g., malware scanning, user authentication, or Zero Trust enforcement).
Firewalls offer application-layer visibility, which ACLs on switches cannot provide.
Switches do not log and analyze threats like firewalls do.
Reference and Justification:
Firewall Deployment C Firewall-enforced network segmentation is a key practice in Zero Trust.
Security Policies C Granular policies ensure medical imaging traffic is controlled and monitored.
VPN Configurations C If remote trailers are involved, secure VPN access can be enforced within the zones.
Threat Prevention & WildFire C Firewalls can scan imaging files (e.g., DICOM images) for malware.
Panorama C Centralized visibility into all traffic between hospital zones and trailers.
Zero Trust Architectures C This solution follows Zero Trust principles by segmenting untrusted devices and enforcing least privilege access.
Thus, Configuring separate zones (C) is the correct answer, as it provides cost-effective segmentation, Zero Trust enforcement, and security visibility using existing firewall infrastructure.
정답:
Explanation:
VoIP (Voice over IP) traffic is highly sensitive to network conditions, including latency, jitter, and packet loss. In Prisma SD-WAN, maintaining optimal VoIP quality requires dynamic path selection and real-time monitoring of network conditions.
Recommended Initial Action: Monitoring Real-Time Path Performance Metrics
When VoIP traffic experiences high latency and packet loss during business hours, the first step is to analyze real-time path performance metrics in Prisma SD-WAN’s monitoring dashboard.
Why Real-Time Monitoring is Crucial?
Identifies the Affected Links C Prisma SD-WAN continuously monitors path quality metrics for each available WAN link (e.g., MPLS, broadband, LTE).
Provides Insights on Congestion C Real-time monitoring helps determine whether the issue is caused by congestion, ISP problems, or packet drops.
Aids in Dynamic Path Selection C Prisma SD-WAN can automatically switch to a better-performing path based on live telemetry data.
Avoids Unnecessary Configuration Changes C Without accurate diagnostics, changing VPN gateways or link tags may not address the root cause.
Why Other Options Are Incorrect?
A. Configure a new VPN gateway connection. ❌
Incorrect, because the issue is VoIP performance degradation due to latency and packet loss, not a VPN gateway failure.
A new VPN connection won’t resolve ongoing traffic congestion in the current SD-WAN path.
C. Add new link tags to existing interfaces. ❌
Incorrect, because adding new link tags does not immediately resolve latency and packet loss issues.
Link tags help classify WAN links for application-aware routing, but the immediate priority is to analyze performance metrics first.
D. Disable the most recently created path quality. ❌
Incorrect, because disabling a path quality profile without understanding the cause could negatively
impact failover and traffic steering policies.
Instead, monitoring real-time metrics first ensures the right corrective action is taken.
Reference to Firewall Deployment and Security Features:
Firewall Deployment C Prisma SD-WAN is deployed alongside Palo Alto firewalls for network security and traffic steering.
Security Policies C Ensures VoIP traffic is prioritized with QoS and traffic shaping policies.
VPN Configurations C Uses IPsec tunnels and Dynamic Path Selection (DPS) for optimal WAN performance.
Threat Prevention C Detects and mitigates network-based attacks impacting VoIP performance.
WildFire Integration C Not directly related but helps detect malicious traffic within VoIP signaling.
Panorama C Centralized logging and monitoring of SD-WAN path quality metrics across multiple locations.
Zero Trust Architectures C Enforces identity-based access controls for secure VoIP communications.
Thus, the correct answer is:
✅ B. Monitor real-time path performance metrics.