Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

PCNSA Sample Questions Answers

Questions 4

The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;

1. trust for internal networks

2. untrust to the internet

Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )

Options:

A.

Create a deny rule at the top of the policy from trust to untrust with service application-default and add an application filter with the evasive characteristic

B.

Create a deny rule at the top of the policy from trust to untrust over any service and select evasive as the application

C.

Create a deny rule at the top of the policy from trust to untrust with service application-default and select evasive as the application

D.

Create a deny rule at the top of the policy from trust to untrust over any service and add an application filter with the evasive characteristic

Buy Now
Questions 5

Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic

Which statement accurately describes how the firewall will apply an action to matching traffic?

Options:

A.

If it is an allowed rule, then the Security Profile action is applied last

B.

If it is a block rule then the Security policy rule action is applied last

C.

If it is an allow rule then the Security policy rule is applied last

D.

If it is a block rule then Security Profile action is applied last

Buy Now
Questions 6

What Policy Optimizer policy view differ from the Security policy do?

Options:

A.

It shows rules that are missing Security profile configurations.

B.

It indicates rules with App-ID that are not configured as port-based.

C.

It shows rules with the same Source Zones and Destination Zones.

D.

It indicates that a broader rule matching the criteria is configured above a more specific rule.

Buy Now
Questions 7

Place the following steps in the packet processing order of operations from first to last.

Options:

Buy Now
Questions 8

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

Options:

A.

Antivirus Profile

B.

Data Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Buy Now
Questions 9

Which three types of entries can be excluded from an external dynamic list (EDL)? (Choose three.)

Options:

A.

IP addresses

B.

Domains

C.

User-ID

D.

URLs

E.

Applications

Buy Now
Questions 10

What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)

Options:

A.

Service

B.

User

C.

Application

D.

Address

E.

Zone ab

Buy Now
Questions 11

In which two types of NAT can oversubscription be used? (Choose two.)

Options:

A.

Static IP

B.

Destination NAT

C.

Dynamic IP and Port (DIPP)

D.

Dynamic IP

Buy Now
Questions 12

What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?

Options:

A.

any supported Palo Alto Networks firewall or Prisma Access firewall

B.

an additional subscription free of charge

C.

a firewall device running with a minimum version of PAN-OS 10.1

D.

an additional paid subscription

Buy Now
Questions 13

Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.

What is the quickest way to reset the hit counter to zero in all the security policy rules?

Options:

A.

At the CLI enter the command reset rules and press Enter

B.

Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule

C.

Reboot the firewall

D.

Use the Reset Rule Hit Counter > All Rules option

Buy Now
Questions 14

Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?

Options:

A.

Review Apps

B.

Review App Matches

C.

Pre-analyze

D.

Review Policies

Buy Now
Questions 15

Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized.

Which user-ID agent sufficient in your network?

Options:

A.

PAN-OS integrated agent deployed on the firewall

B.

Windows-based agent deployed on the internal network a domain member

C.

Citrix terminal server agent deployed on the network

D.

Windows-based agent deployed on each domain controller

Buy Now
Questions 16

Which type of address object is www.paloaltonetworks.com?

Options:

A.

IP range

B.

IP netmask

C.

named address

D.

FQDN

Buy Now
Questions 17

A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.

To which two types of traffic will the rule apply? (Choose two.)

Options:

A.

Within zone HR

B.

Within zone IT

C.

Between zone IT and zone HR

D.

Between zone IT and zone Finance

Questions 18

When HTTPS for management and GlobalProtect are enabled on the same interface, which TCP port is used for management access?

Options:

A.

80

B.

8443

C.

4443

D.

443

Buy Now
Questions 19

Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?

Options:

A.

Inline Cloud Analysis

B.

Signature Exceptions

C.

Machine Learning Policies

D.

Signature Policies

Buy Now
Questions 20

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

Options:

A.

GlobalProtect

B.

Panorama

C.

Aperture

D.

AutoFocus

Buy Now
Questions 21

An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule, which is set to default configuration.

What should the administrator do?

Options:

A.

change the logging action on the rule

B.

review the System Log

C.

refresh the Traffic Log

D.

tune your Traffic Log filter to include the dates

Buy Now
Questions 22

Access to which feature requires PAN-OS Filtering licens?

Options:

A.

PAN-DB database

B.

URL external dynamic lists

C.

Custom URL categories

D.

DNS Security

Buy Now
Questions 23

An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs.

What is the correct process to enable this logging1?

Options:

A.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OK

B.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session End and click OK

C.

This rule has traffic logging enabled by default no further action is required

D.

Select the interzone-default rule and click Override on the Actions tab select Log at Session End and click OK

Buy Now
Questions 24

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

Options:

A.

block

B.

sinkhole

C.

alert

D.

allow

Buy Now
Questions 25

In which profile should you configure the DNS Security feature?

Options:

A.

URL Filtering Profile

B.

Anti-Spyware Profile

C.

Zone Protection Profile

D.

Antivirus Profile

Buy Now
Questions 26

Which action results in the firewall blocking network traffic with out notifying the sender?

Options:

A.

Drop

B.

Deny

C.

Reset Server

D.

Reset Client

Buy Now
Questions 27

In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)

Options:

A.

Objects tab > Application Filters

B.

Policies tab > Security

C.

ACC tab > Global Filters

D.

Objects tab > Application Groups

E.

Objects tab > Applications

Buy Now
Questions 28

What must first be created on the firewall for SAML authentication to be configured?

Options:

A.

Server Policy

B.

Server Profile

C.

Server Location

D.

Server Group

Buy Now
Questions 29

An administrator wants to prevent users from submitting corporate credentials in a phishing attack.

Which Security profile should be applied?

Options:

A.

antivirus

B.

anti-spyware

C.

URL filtering

D.

vulnerability protection

Buy Now
Questions 30

Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)

Options:

A.

Deny

B.

Sinkhole

C.

Override

D.

Block

Buy Now
Questions 31

What are two valid selections within an Antivirus profile? (Choose two.)

Options:

A.

deny

B.

drop

C.

default

D.

block-ip

Buy Now
Questions 32

Which three configuration settings are required on a Palo Alto networks firewall management interface?

Options:

A.

default gateway

B.

netmask

C.

IP address

D.

hostname

E.

auto-negotiation

Buy Now
Questions 33

An internal host wants to connect to servers of the internet through using source NAT.

Which policy is required to enable source NAT on the firewall?

Options:

A.

NAT policy with source zone and destination zone specified

B.

post-NAT policy with external source and any destination address

C.

NAT policy with no source of destination zone selected

D.

pre-NAT policy with external source and any destination address

Buy Now
Questions 34

Which firewall plane provides configuration, logging, and reporting functions on a separate processor?

Options:

A.

control

B.

network processing

C.

data

D.

security processing

Buy Now
Questions 35

The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication Sequence SYS01," and the authentication sequence SYS01 has a profile list with four authentication profiles:

• Auth Profile LDAP

• Auth Profile Radius

• Auth Profile Local

• Auth Profile TACACS

After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable but has lost the "SYS01 Admin" username and password.

What is the "SYS01 Admin" login capability after the outage?

Options:

A.

Auth KO because RADIUS server lost user and password for SYS01 Admin

B.

Auth KO because LDAP server is not reachable

C.

Auth OK because of the Auth Profile Local

D.

Auth OK because of the Auth Profile TACACS -

Questions 36

An administrator is configuring a NAT rule

At a minimum, which three forms of information are required? (Choose three.)

Options:

A.

name

B.

source zone

C.

destination interface

D.

destination address

E.

destination zone

Buy Now
Questions 37

In the example security policy shown, which two websites fcked? (Choose two.)

Options:

A.

LinkedIn

B.

Facebook

C.

YouTube

D.

Amazon

Buy Now
Questions 38

A network administrator is required to use a dynamic routing protocol for network connectivity.

Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

EIGRP

E.

BGP

Buy Now
Questions 39

Given the detailed log information above, what was the result of the firewall traffic inspection?

Options:

A.

It was blocked by the Vulnerability Protection profile action.

B.

It was blocked by the Anti-Virus Security profile action.

C.

It was blocked by the Anti-Spyware Profile action.

D.

It was blocked by the Security policy action.

Buy Now
Questions 40

What is the main function of the Test Policy Match function?

Options:

A.

verify that policy rules from Expedition are valid

B.

confirm that rules meet or exceed the Best Practice Assessment recommendations

C.

confirm that policy rules in the configuration are allowing/denying the correct traffic

D.

ensure that policy rules are not shadowing other policy rules

Buy Now
Questions 41

Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?

Options:

A.

Palo Alto Networks C&C IP Addresses

B.

Palo Alto Networks Bulletproof IP Addresses

C.

Palo Alto Networks High-Risk IP Addresses

D.

Palo Alto Networks Known Malicious IP Addresses

Buy Now
Questions 42

Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?

Options:

A.

global

B.

intrazone

C.

interzone

D.

universal

Buy Now
Questions 43

A Security Profile can block or allow traffic at which point?

Options:

A.

after it is matched to a Security policy rule that allows traffic

B.

on either the data plane or the management plane

C.

after it is matched to a Security policy rule that allows or blocks traffic

D.

before it is matched to a Security policy rule

Buy Now
Questions 44

Match the cyber-attack lifecycle stage to its correct description.

Options:

Buy Now
Questions 45

Which statement is true regarding NAT rules?

Options:

A.

Static NAT rules have precedence over other forms of NAT.

B.

Translation of the IP address and port occurs before security processing.

C.

NAT rules are processed in order from top to bottom.

D.

Firewall supports NAT on Layer 3 interfaces only.

Questions 46

An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?

Options:

A.

Dynamic IP and Port

B.

Dynamic IP

C.

Static IP

D.

Destination

Buy Now
Questions 47

Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.

What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?

Options:

A.

save named configuration snapshot

B.

export device state

C.

export named configuration snapshot

D.

save candidate config

Buy Now
Questions 48

What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)

Options:

A.

SAML

B.

TACACS+

C.

LDAP

D.

Kerberos

Buy Now
Questions 49

Which object would an administrator create to block access to all high-risk applications?

Options:

A.

HIP profile

B.

application filter

C.

application group

D.

Vulnerability Protection profile

Buy Now
Questions 50

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

Options:

A.

Weaponization

B.

Reconnaissance

C.

Installation

D.

Command and Control

E.

Exploitation

Buy Now
Questions 51

Which statement is true regarding a Best Practice Assessment?

Options:

A.

The BPA tool can be run only on firewalls

B.

It provides a percentage of adoption for each assessment data

C.

The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities

D.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture

Buy Now
Questions 52

How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?

Options:

A.

Select the unified log entry in the side menu.

B.

Modify the number of columns visible on the page

C.

Modify the number of logs visible on each page.

D.

Select the system logs entry in the side menu.

Buy Now
Questions 53

Which two rule types allow the administrator to modify the destination zone? (Choose two )

Options:

A.

interzone

B.

intrazone

C.

universal

D.

shadowed

Buy Now
Questions 54

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Options:

A.

Active Directory monitoring

B.

Windows session monitoring

C.

Windows client probing

D.

domain controller monitoring

Buy Now
Questions 55

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.

Options:

A.

on either the data place or the management plane.

B.

after it is matched by a security policy rule that allows traffic.

C.

before it is matched to a Security policy rule.

D.

after it is matched by a security policy rule that allows or blocks traffic.

Buy Now
Questions 56

Which information is included in device state other than the local configuration?

Options:

A.

uncommitted changes

B.

audit logs to provide information of administrative account changes

C.

system logs to provide information of PAN-OS changes

D.

device group and template settings pushed from Panorama

Buy Now
Questions 57

What is a function of application tags?

Options:

A.

creation of new zones

B.

application prioritization

C.

automated referenced applications in a policy

D.

IP address allocations in DHCP

Buy Now
Questions 58

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

Options:

A.

Windows-based agent deployed on the internal network

B.

PAN-OS integrated agent deployed on the internal network

C.

Citrix terminal server deployed on the internal network

D.

Windows-based agent deployed on each of the WAN Links

Buy Now
Questions 59

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

Options:

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Buy Now
Questions 60

What are three valid ways to map an IP address to a username? (Choose three.)

Options:

A.

using the XML API

B.

DHCP Relay logs

C.

a user connecting into a GlobalProtect gateway using a GlobalProtect Agent

D.

usernames inserted inside HTTP Headers

E.

WildFire verdict reports

Buy Now
Questions 61

Based on the graphic which statement accurately describes the output shown in the server monitoring panel?

Options:

A.

The User-ID agent is connected to a domain controller labeled lab-client.

B.

The host lab-client has been found by the User-ID agent.

C.

The host lab-client has been found by a domain controller.

D.

The User-ID agent is connected to the firewall labeled lab-client.

Buy Now
Questions 62

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

Options:

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

Buy Now
Questions 63

According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?

Options:

A.

by minute

B.

hourly

C.

daily

D.

weekly

Buy Now
Questions 64

An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones.

Which Security policy rule type should they use?

Options:

A.

default

B.

universal

C.

intrazone

D.

interzone

Buy Now
Questions 65

Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided password?

Options:

A.

exclude

B.

continue

C.

hold

D.

override

Buy Now
Questions 66

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

Options:

A.

Data redistribution

B.

Dynamic updates

C.

SNMP setup

D.

Service route

Buy Now
Questions 67

Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?

Options:

A.

Objects > Dynamic Updates > Review App-IDs

B.

Device > Dynamic Updates > Review Policies

C.

Device > Dynamic Updates > Review App-IDs

D.

Objects > Dynamic Updates > Review Policies

Buy Now
Questions 68

What is considered best practice with regards to committing configuration changes?

Options:

A.

Disable the automatic commit feature that prioritizes content database installations before committing

B.

Validate configuration changes prior to committing

C.

Wait until all running and pending jobs are finished before committing

D.

Export configuration after each single configuration change performed

Buy Now
Questions 69

What is the default action for the SYN Flood option within the DoS Protection profile?

Options:

A.

Alert

B.

Random Early Drop

C.

Reset-client

D.

Sinkhole

Buy Now
Questions 70

Place the steps in the correct packet-processing order of operations.

Options:

Buy Now
Questions 71

Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)

Options:

A.

XML API

B.

log forwarding auto-tagging

C.

GlobalProtect agent

D.

User-ID Windows-based agent

Buy Now
Questions 72

What are the two default behaviors for the intrazone-default policy? (Choose two.)

Options:

A.

Allow

B.

Logging disabled

C.

Log at Session End

D.

Deny

Buy Now
Questions 73

Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )

Options:

A.

TACACS

B.

SAML2

C.

SAML10

D.

Kerberos

E.

TACACS+

Buy Now
Questions 74

Which type of DNS signatures are used by the firewall to identify malicious and command-and-control domains?

Options:

A.

DNS Malicious signatures

B.

DNS Malware signatures

C.

DNS Block signatures

D.

DNS Security signatures

Questions 75

Match the network device with the correct User-ID technology.

Options:

Buy Now
Questions 76

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

Options:

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on Objective

Buy Now
Questions 77

Which object would an administrator create to enable access to all applications in the office-programs subcategory?

Options:

A.

HIP profile

B.

Application group

C.

URL category

D.

Application filter

Buy Now
Questions 78

What are three factors that can be used in domain generation algorithms? (Choose three.)

Options:

A.

cryptographic keys

B.

time of day

C.

other unique values

D.

URL custom categories

E.

IP address

Buy Now
Questions 79

Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?

Options:

A.

Panorama > Device Deployment > Dynamic Updates > Schedules > Add

B.

Panorama > Device Deployment > Content Updates > Schedules > Add

C.

Panorama > Dynamic Updates > Device Deployment > Schedules > Add

D.

Panorama > Content Updates > Device Deployment > Schedules > Add

Questions 80

In a security policy what is the quickest way to rest all policy rule hit counters to zero?

Options:

A.

Use the CLI enter the command reset rules all

B.

Highlight each rule and use the Reset Rule Hit Counter > Selected Rules.

C.

use the Reset Rule Hit Counter > All Rules option.

D.

Reboot the firewall.

Buy Now
Questions 81

What does an administrator use to validate whether a session is matching an expected NAT policy?

Options:

A.

system log

B.

test command

C.

threat log

D.

config audit

Buy Now
Questions 82

Which option lists the attributes that are selectable when setting up an Application filters?

Options:

A.

Category, Subcategory, Technology, and Characteristic

B.

Category, Subcategory, Technology, Risk, and Characteristic

C.

Name, Category, Technology, Risk, and Characteristic

D.

Category, Subcategory, Risk, Standard Ports, and Technology

Buy Now
Questions 83

Which the app-ID application will you need to allow in your security policy to use facebook-chat?

Options:

A.

facebook-email

B.

facebook-base

C.

facebook

D.

facebook-chat

Buy Now
Questions 84

An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.

Which configuration action should the administrator take when creating the address object?

Options:

A.

Ensure that the Shared option is checked.

B.

Ensure that the Shared option is cleared.

C.

Ensure that Disable Override is cleared.

D.

Tag the address object with the Global tag.

Buy Now
Questions 85

In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)

Options:

A.

URL Filtering

B.

Vulnerability Protection

C.

Antivirus b

D.

Anti-spyware

Buy Now
Questions 86

If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?

Options:

A.

Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL

B.

Configure a frequency schedule to clear group mapping cache

C.

Configure a Primary Employee ID number for user-based Security policies

D.

Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or 389

Buy Now
Questions 87

All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.

Complete the empty field in the Security policy using an application object to permit only this type of access.

Source Zone: Internal -

Destination Zone: DMZ Zone -

Application: __________

Service: application-default -

Action: allow

Options:

A.

Application = "any"

B.

Application = "web-browsing"

C.

Application = "ssl"

D.

Application = "http"

Buy Now
Questions 88

By default, what is the maximum number of templates that can be added to a template stack?

Options:

A.

6

B.

8

C.

10

D.

12

Buy Now
Questions 89

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?

Options:

A.

Management

B.

High Availability

C.

Aggregate

D.

Aggregation

Buy Now
Questions 90

You need to allow users to access the office–suite application of their choice. How should you configure the firewall to allow access to any office-suite application?

Options:

A.

Create an Application Group and add Office 365, Evernote Google Docs and Libre Office

B.

Create an Application Group and add business-systems to it.

C.

Create an Application Filter and name it Office Programs, then filter it on the office programs subcategory.

D.

Create an Application Filter and name it Office Programs then filter on the business-systems category.

Buy Now
Questions 91

An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall handle the traffic?

Options:

A.

It allows the traffic because the profile was not set to explicitly deny the traffic.

B.

It drops the traffic because the profile was not set to explicitly allow the traffic.

C.

It uses the default action assigned to the virus signature.

D.

It allows the traffic but generates an entry in the Threat logs.

Buy Now
Questions 92

Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?

Options:

A.

Review Policies

B.

Review Apps

C.

Pre-analyze

D.

Review App Matches

Buy Now
Questions 93

Access to which feature requires the PAN-OS Filtering license?

Options:

A.

PAN-DB database

B.

DNS Security

C.

Custom URL categories

D.

URL external dynamic lists

Buy Now
Questions 94

Which three types of Source NAT are available to users inside a NGFW? (Choose three.)

Options:

A.

Dynamic IP and Port (DIPP)

B.

Static IP

C.

Static Port

D.

Dynamic IP

E.

Static IP and Port (SIPP)

Buy Now
Questions 95

An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?

Options:

A.

branch office traffic

B.

north-south traffic

C.

perimeter traffic

D.

east-west traffic

Buy Now
Questions 96

Given the screenshot what two types of route is the administrator configuring? (Choose two )

Options:

A.

default route

B.

OSPF

C.

BGP

D.

static route

Buy Now
Questions 97

Which administrator type utilizes predefined roles for a local administrator account?

Options:

A.

Superuser

B.

Role-based

C.

Dynamic

D.

Device administrator

Buy Now
Questions 98

In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)

Options:

A.

Antivirus

B.

URL Filtering

C.

Vulnerability Protection

D.

Anti-spyware

Questions 99

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?

Options:

A.

Rule Usage Filter > No App Specified

B.

Rule Usage Filter >Hit Count > Unused in 30 days

C.

Rule Usage Filter > Unused Apps

D.

Rule Usage Filter > Hit Count > Unused in 90 days

Buy Now
Questions 100

Which component is a building block in a Security policy rule?

Options:

A.

decryption profile

B.

destination interface

C.

timeout (min)

D.

application

Buy Now
Questions 101

View the diagram.

What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 102

A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.

Which two types of traffic will the rule apply to? (Choose two)

Options:

A.

traffic between zone IT and zone Finance

B.

traffic between zone Finance and zone HR

C.

traffic within zone IT

D.

traffic within zone HR

Buy Now
Questions 103

An administrator wants to enable access to www.paloaltonetworks.com while denying access to all other sites in the same category.

Which object should the administrator create to use as a match condition for the security policy rule that allows access to www.paloaltonetworks.com?

Options:

A.

Application group

B.

Address ab

C.

URL category

D.

Service

Buy Now
Questions 104

Which administrative management services can be configured to access a management interface?

Options:

A.

HTTP, CLI, SNMP, HTTPS

B.

HTTPS, SSH telnet SNMP

C.

SSH: telnet HTTP, HTTPS

D.

HTTPS, HTTP. CLI, API

Buy Now
Questions 105

Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.

Which Security policy rule will allow traffic to flow to the web server?

Options:

A.

Untrust (any) to DMZ (10.1.1.100), web browsing -Allow

B.

Untrust (any) to Untrust (1.1.1.100), web browsing - Allow

C.

Untrust (any) to Untrust (10.1.1.100), web browsing -Allow

D.

Untrust (any) to DMZ (1.1.1.100), web browsing - Allow

Buy Now
Questions 106

Where in Panorama Would Zone Protection profiles be configured?

Options:

A.

Shared

B.

Templates

C.

Device Groups

D.

Panorama tab

Questions 107

Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?

Options:

A.

Root

B.

Dynamic

C.

Role-based

D.

Superuser

Buy Now
Questions 108

Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website

How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?

Options:

A.

Create a Security policy with a URL Filtering profile that references the site access setting of continue to NO-FILES

B.

Create a Security policy with a URL Filtering profile that references the site access setting of block to NO-FILES

C.

Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate Data Filtering profile

D.

Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate File Blocking profile

Buy Now
Exam Code: PCNSA
Exam Name: Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)
Last Update: May 16, 2024
Questions: 362
$64  $159.99
$48  $119.99
$40  $99.99
buy now PCNSA