Black Friday - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

PCNSA Sample Questions Answers

Questions 4

View the diagram.

What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 5

Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)

Options:

A.

Path monitoring does not determine if route is useable

B.

Route with highest metric is actively used

C.

Path monitoring determines if route is useable

D.

Route with lowest metric is actively used

Buy Now
Questions 6

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

Options:

A.

Override

B.

Allow

C.

Block

D.

Continue

Buy Now
Questions 7

By default, what is the maximum number of templates that can be added to a template stack?

Options:

A.

6

B.

8

C.

10

D.

12

Buy Now
Questions 8

Which Security profile can you apply to protect against malware such as worms and Trojans?

Options:

A.

data filtering

B.

antivirus

C.

vulnerability protection

D.

anti-spyware

Buy Now
Questions 9

Which type of administrator account cannot be used to authenticate user traffic flowing through the firewall’s

data plane?

Options:

A.

Kerberos user

B.

SAML user

C.

local database user

D.

local user

Buy Now
Questions 10

Which Palo Alto networks security operating platform service protects cloud-based application such as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive information?

Options:

A.

Prisma SaaS

B.

AutoFocus

C.

Panorama

D.

GlobalProtect

Buy Now
Questions 11

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

Options:

A.

antivirus profile applied to outbound security policies

B.

data filtering profile applied to inbound security policies

C.

data filtering profile applied to outbound security policies

D.

vulnerability profile applied to inbound security policies

Buy Now
Questions 12

Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP –to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.

Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.

Options:

A.

syslog

B.

RADIUS

C.

UID redistribution

D.

XFF headers

Buy Now
Questions 13

Place the steps in the correct packet-processing order of operations.

Options:

Buy Now
Questions 14

What are three ways application characteristics are used? (Choose three.)

Options:

A.

As an attribute to define an application group

B.

As a setting to define a new custom application

C.

As an Object to define Security policies

D.

As an attribute to define an application filter

E.

As a global filter in the Application Command Center (ACC)

Buy Now
Questions 15

Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )

Options:

A.

Network Processing Engine

B.

Single Stream-based Engine

C.

Policy Engine

D.

Parallel Processing Hardware

Buy Now
Questions 16

A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?

Options:

A.

Create a custom-service-object called SERVICE-SSH for destination-port-TCP-22. Create a security-rule between zone USERS and OUTSIDE to allow traffic from any source IP-address to any destination IP-address for SERVICE-SSH

B.

Create a security-rule that allows traffic from zone USERS to OUTSIDE to allow traffic from any source IP-address to any destination IP-address for application SSH

C.

In addition to option a, a custom-service-object called SERVICE-SSH-RETURN that contains source-port-TCP-22 should be created. A second security-rule is required that allows traffic from zone OUTSIDE to USERS for SERVICE-SSH-RETURN for any source-IP-address to any destination-Ip-address

D.

In addition to option c, an additional rule from zone OUTSIDE to USERS for application SSH from any source-IP-address to any destination-IP-address is required to allow the return-traffic from the SSH-servers to reach the server-admin

Buy Now
Questions 17

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

Options:

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Buy Now
Questions 18

What are two valid selections within an Antivirus profile? (Choose two.)

Options:

A.

deny

B.

drop

C.

default

D.

block-ip

Buy Now
Questions 19

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

Options:

A.

override

B.

allow

C.

block

D.

continue

Buy Now
Questions 20

An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall handle the traffic?

Options:

A.

It allows the traffic because the profile was not set to explicitly deny the traffic.

B.

It drops the traffic because the profile was not set to explicitly allow the traffic.

C.

It uses the default action assigned to the virus signature.

D.

It allows the traffic but generates an entry in the Threat logs.

Buy Now
Questions 21

How often does WildFire release dynamic updates?

Options:

A.

every 5 minutes

B.

every 15 minutes

C.

every 60 minutes

D.

every 30 minutes

Buy Now
Questions 22

Match the network device with the correct User-ID technology.

Options:

Buy Now
Questions 23

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

Options:

A.

Policies

B.

Network

C.

Objects

D.

Device

Buy Now
Questions 24

Which action would an administrator take to ensure that a service object will be available only to the selected device group?

Options:

A.

create the service object in the specific template

B.

uncheck the shared option

C.

ensure that disable override is selected

D.

ensure that disable override is cleared

Buy Now
Questions 25

Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)

Options:

A.

GlobalProtect agent

B.

XML API

C.

User-ID Windows-based agent

D.

log forwarding auto-tagging

Buy Now
Questions 26

Which rule type is appropriate for matching traffic occurring within a specified zone?

Options:

A.

Interzone

B.

Universal

C.

Intrazone

D.

Shadowed

Buy Now
Questions 27

What do you configure if you want to set up a group of objects based on their ports alone?

Options:

A.

Application groups

B.

Service groups

C.

Address groups

D.

Custom objects

Buy Now
Questions 28

Given the detailed log information above, what was the result of the firewall traffic inspection?

Options:

A.

It was blocked by the Vulnerability Protection profile action.

B.

It was blocked by the Anti-Virus Security profile action.

C.

It was blocked by the Anti-Spyware Profile action.

D.

It was blocked by the Security policy action.

Buy Now
Questions 29

View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 30

Which rule type is appropriate for matching traffic both within and between the source and destination zones?

Options:

A.

interzone

B.

shadowed

C.

intrazone

D.

universal

Buy Now
Questions 31

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.

Complete the security policy to ensure only Telnet is allowed.

Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and action = Allow

Options:

A.

Destination IP: 192.168.1.123/24

B.

Application = ‘Telnet’

C.

Log Forwarding

D.

USER-ID = ‘Allow users in Trusted’

Buy Now
Questions 32

Which dynamic update type includes updated anti-spyware signatures?

Options:

A.

Applications and Threats

B.

GlobalProtect Data File

C.

Antivirus

D.

PAN-DB

Buy Now
Questions 33

How are service routes used in PAN-OS?

Options:

A.

By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network

B.

To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services

C.

For routing, because they are the shortest path selected by the BGP routing protocol

D.

To route management plane services through data interfaces rather than the management interface

Buy Now
Questions 34

Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.

Which two Security policy rules will accomplish this configuration? (Choose two.)

A- Untrust (Any) to DMZ (1.1.1.100), ssh - Allow

B. Untrust (Any) to Untrust (10.1.1.1), web-browsing -Allow

C. Untrust (Any) to Untrust (10.1.1.1), ssh -Allow

D. Untrust (Any)to DMZ (10.1.1.100. 10.1.1.101), ssh, web-browsing-Allow

E. Untrust (Any) to DMZ (1.1.1.100), web-browsing - Allow

Options:

Buy Now
Questions 35

What is an advantage for using application tags?

Options:

A.

They are helpful during the creation of new zones

B.

They help with the design of IP address allocations in DHCP.

C.

They help content updates automate policy updates

D.

They help with the creation of interfaces

Buy Now
Questions 36

Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?

Options:

A.

Review Policies

B.

Review Apps

C.

Pre-analyze

D.

Review App Matches

Buy Now
Questions 37

Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.

Options:

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on the Objective

Buy Now
Questions 38

According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?

Options:

A.

by minute

B.

hourly

C.

daily

D.

weekly

Buy Now
Questions 39

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

Options:

A.

domain controller

B.

TACACS+

C.

LDAP

D.

RADIUS

Buy Now
Questions 40

How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?

Options:

A.

Disable automatic updates during weekdays

B.

Automatically “download and install” but with the “disable new applications” option used

C.

Automatically “download only” and then install Applications and Threats later, after the administrator approves the update

D.

Configure the option for “Threshold”

Buy Now
Questions 41

Which statement is true about Panorama managed devices?

Options:

A.

Panorama automatically removes local configuration locks after a commit from Panorama

B.

Local configuration locks prohibit Security policy changes for a Panorama managed device

C.

Security policy rules configured on local firewalls always take precedence

D.

Local configuration locks can be manually unlocked from Panorama

Buy Now
Questions 42

Which object would an administrator create to block access to all high-risk applications?

Options:

A.

HIP profile

B.

application filter

C.

application group

D.

Vulnerability Protection profile

Buy Now
Questions 43

Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?

Options:

A.

Layer 2

B.

Tap

C.

Layer 3

D.

Virtual Wire

Buy Now
Questions 44

Which three interface deployment methods can be used to block traffic flowing through the Palo Alto Networks firewall? (Choose three.)

Options:

A.

Layer 2

B.

Virtual Wire

C.

Tap

D.

Layer 3

E.

HA

Buy Now
Questions 45

Which firewall plane provides configuration, logging, and reporting functions on a separate processor?

Options:

A.

control

B.

network processing

C.

data

D.

security processing

Buy Now
Questions 46

Which operations are allowed when working with App-ID application tags?

Options:

A.

Predefined tags may be deleted.

B.

Predefined tags may be augmented by custom tags.

C.

Predefined tags may be modified.

D.

Predefined tags may be updated by WildFire dynamic updates.

Buy Now
Questions 47

Which statement is true regarding NAT rules?

Options:

A.

Static NAT rules have precedence over other forms of NAT.

B.

Translation of the IP address and port occurs before security processing.

C.

NAT rules are processed in order from top to bottom.

D.

Firewall supports NAT on Layer 3 interfaces only.

Questions 48

A website is unexpectedly allowed due to miscategorization.

What are two ways to resolve this issue for a proper response? (Choose two.)

Options:

A.

Identify the URL category being assigned to the website.

Edit the active URL Filtering profile and update that category's site access settings to block.

B.

Create a URL category and assign the affected URL.

Update the active URL Filtering profile site access setting for the custom URL category to block.

C.

Review the categorization of the website on https://urlfiltering.paloaltonetworks.com.

Submit for "request change*, identifying the appropriate categorization, and wait for confirmation before testing again.

D.

Create a URL category and assign the affected URL.

Add a Security policy with a URL category qualifier of the custom URL category below the original policy. Set the policy action to Deny.

Buy Now
Questions 49

When creating a Panorama administrator type of Device Group and Template Admin, which two things must you create first? (Choose two.)

Options:

A.

password profile

B.

access domain

C.

admin rote

D.

server profile

Buy Now
Questions 50

Which interface type requires no routing or switching but applies Security or NAT policy rules before passing allowed traffic?

Options:

A.

Layer 3

B.

Virtual Wire

C.

Tap

D.

Layer 2

Buy Now
Questions 51

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

Options:

A.

It uses techniques such as DGA.DNS tunneling detection and machine learning.

B.

It requires a valid Threat Prevention license.

C.

It enables users to access real-time protections using advanced predictive analytics.

D.

It requires a valid URL Filtering license.

E.

It requires an active subscription to a third-party DNS Security service.

Buy Now
Questions 52

What are three differences between security policies and security profiles? (Choose three.)

Options:

A.

Security policies are attached to security profiles

B.

Security profiles are attached to security policies

C.

Security profiles should only be used on allowed traffic

D.

Security profiles are used to block traffic by themselves

E.

Security policies can block or allow traffic

Buy Now
Questions 53

Given the topology, which zone type should zone A and zone B to be configured with?

Options:

A.

Layer3

B.

Tap

C.

Layer2

D.

Virtual Wire

Buy Now
Questions 54

Which interface type can use virtual routers and routing protocols?

Options:

A.

Tap

B.

Layer3

C.

Virtual Wire

D.

Layer2

Buy Now
Questions 55

Based on the screenshot what is the purpose of the group in User labelled ''it"?

Options:

A.

Allows users to access IT applications on all ports

B.

Allows users in group "DMZ" lo access IT applications

C.

Allows "any" users to access servers in the DMZ zone

D.

Allows users in group "it" to access IT applications

Buy Now
Questions 56

An administrator is reviewing the Security policy rules shown in the screenshot below.

Which statement is correct about the information displayed?

Options:

A.

Eleven rules use the "Infrastructure* tag.

B.

The view Rulebase as Groups is checked.

C.

There are seven Security policy rules on this firewall.

D.

Highlight Unused Rules is checked.

Buy Now
Questions 57

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

Options:

A.

Windows-based agent deployed on the internal network

B.

PAN-OS integrated agent deployed on the internal network

C.

Citrix terminal server deployed on the internal network

D.

Windows-based agent deployed on each of the WAN Links

Buy Now
Questions 58

You must configure which firewall feature to enable a data-plane interface to submit DNS queries on behalf of the control plane?

Options:

A.

Admin Role profile

B.

virtual router

C.

DNS proxy

D.

service route

Buy Now
Questions 59

In a File Blocking profile, which two actions should be taken to allow file types that support critical apps? (Choose two.)

Options:

A.

Clone and edit the Strict profile.

B.

Use URL filtering to limit categories in which users can transfer files.

C.

Set the action to Continue.

D.

Edit the Strict profile.

Buy Now
Questions 60

Based on the screenshot what is the purpose of the included groups?

Options:

A.

They are only groups visible based on the firewall's credentials.

B.

They are used to map usernames to group names.

C.

They contain only the users you allow to manage the firewall.

D.

They are groups that are imported from RADIUS authentication servers.

Buy Now
Questions 61

Which definition describes the guiding principle of the zero-trust architecture?

Options:

A.

never trust, never connect

B.

always connect and verify

C.

never trust, always verify

D.

trust, but verity

Buy Now
Questions 62

Why does a company need an Antivirus profile?

Options:

A.

To prevent command-and-control traffic

B.

To protect against viruses, worms, and trojans

C.

To prevent known exploits

D.

To prevent access to malicious web content

Buy Now
Questions 63

How many zones can an interface be assigned with a Palo Alto Networks firewall?

Options:

A.

two

B.

three

C.

four

D.

one

Buy Now
Questions 64

Which option lists the attributes that are selectable when setting up an Application filters?

Options:

A.

Category, Subcategory, Technology, and Characteristic

B.

Category, Subcategory, Technology, Risk, and Characteristic

C.

Name, Category, Technology, Risk, and Characteristic

D.

Category, Subcategory, Risk, Standard Ports, and Technology

Buy Now
Questions 65

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Options:

A.

Active Directory monitoring

B.

Windows session monitoring

C.

Windows client probing

D.

domain controller monitoring

Buy Now
Questions 66

Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)

Options:

A.

The web session was unsuccessfully decrypted.

B.

The traffic was denied by security profile.

C.

The traffic was denied by URL filtering.

D.

The web session was decrypted.

Buy Now
Questions 67

A network administrator is required to use a dynamic routing protocol for network connectivity.

Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

EIGRP

E.

BGP

Buy Now
Questions 68

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

Options:

A.

GlobalProtect

B.

Panorama

C.

Aperture

D.

AutoFocus

Buy Now
Questions 69

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications

Which policy achieves the desired results?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 70

How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?

Options:

A.

Select the unified log entry in the side menu.

B.

Modify the number of columns visible on the page

C.

Modify the number of logs visible on each page.

D.

Select the system logs entry in the side menu.

Buy Now
Questions 71

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

Options:

A.

Antivirus Profile

B.

Data Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Buy Now
Questions 72

Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP Addresses list?

Options:

A.

destination address

B.

source address

C.

destination zone

D.

source zone

Buy Now
Questions 73

What must be considered with regards to content updates deployed from Panorama?

Options:

A.

Content update schedulers need to be configured separately per device group.

B.

Panorama can only install up to five content versions of the same type for potential rollback scenarios.

C.

A PAN-OS upgrade resets all scheduler configurations for content updates.

D.

Panorama can only download one content update at a time for content updates of the same type.

Buy Now
Questions 74

An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?

Options:

A.

branch office traffic

B.

north-south traffic

C.

perimeter traffic

D.

east-west traffic

Buy Now
Questions 75

The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;

1. trust for internal networks

2. untrust to the internet

Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )

Options:

A.

Create a deny rule at the top of the policy from trust to untrust with service application-default and add an application filter with the evasive characteristic

B.

Create a deny rule at the top of the policy from trust to untrust over any service and select evasive as the application

C.

Create a deny rule at the top of the policy from trust to untrust with service application-default and select evasive as the application

D.

Create a deny rule at the top of the policy from trust to untrust over any service and add an application filter with the evasive characteristic

Buy Now
Questions 76

An address object of type IP Wildcard Mask can be referenced in which part of the configuration?

Options:

A.

Security policy rule

B.

ACC global filter

C.

external dynamic list

D.

NAT address pool

Buy Now
Questions 77

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

Options:

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

Buy Now
Questions 78

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.

Options:

A.

on either the data place or the management plane.

B.

after it is matched by a security policy rule that allows traffic.

C.

before it is matched to a Security policy rule.

D.

after it is matched by a security policy rule that allows or blocks traffic.

Buy Now
Questions 79

Which file is used to save the running configuration with a Palo Alto Networks firewall?

Options:

A.

running-config.xml

B.

run-config.xml

C.

running-configuration.xml

D.

run-configuratin.xml

Buy Now
Questions 80

Match the cyber-attack lifecycle stage to its correct description.

Options:

Buy Now
Questions 81

An administrator wishes to follow best practices for logging traffic that traverses the firewall

Which log setting is correct?

Options:

A.

Disable all logging

B.

Enable Log at Session End

C.

Enable Log at Session Start

D.

Enable Log at both Session Start and End

Buy Now
Questions 82

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application

Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

Options:

A.

Data Filtering Profile applied to outbound Security policy rules

B.

Antivirus Profile applied to outbound Security policy rules

C.

Data Filtering Profile applied to inbound Security policy rules

D.

Vulnerability Profile applied to inbound Security policy rules

Buy Now
Questions 83

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

Options:

A.

Anti-Spyware

B.

Antivirus

C.

Vulnerability Protection

D.

URL Filtering

Buy Now
Questions 84

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

Options:

A.

global

B.

intrazone

C.

interzone

D.

universal

Buy Now
Questions 85

Match each feature to the DoS Protection Policy or the DoS Protection Profile.

Options:

Buy Now
Questions 86

Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.

What is the quickest way to reset the hit counter to zero in all the security policy rules?

Options:

A.

At the CLI enter the command reset rules and press Enter

B.

Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule

C.

Reboot the firewall

D.

Use the Reset Rule Hit Counter > All Rules option

Buy Now
Questions 87

What is a recommended consideration when deploying content updates to the firewall from Panorama?

Options:

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

Buy Now
Questions 88

An administrator wants to prevent users from submitting corporate credentials in a phishing attack.

Which Security profile should be applied?

Options:

A.

antivirus

B.

anti-spyware

C.

URL filtering

D.

vulnerability protection

Buy Now
Exam Code: PCNSA
Exam Name: Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)
Last Update: Dec 2, 2023
Questions: 296
$56  $159.99
$42  $119.99
$35  $99.99
buy now PCNSA