Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PCNSA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PCNSA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)
  • Last Update: Apr 26, 2024
  • Questions and Answers: 362
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PCNSA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PCNSA Practice Exam Questions with Answers Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Certification

Question # 6

When creating a Panorama administrator type of Device Group and Template Admin, which two things must you create first? (Choose two.)

A.

password profile

B.

access domain

C.

admin rote

D.

server profile

Full Access
Question # 7

A network administrator is required to use a dynamic routing protocol for network connectivity.

Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)

A.

RIP

B.

OSPF

C.

IS-IS

D.

EIGRP

E.

BGP

Full Access
Question # 8

Selecting the option to revert firewall changes will replace what settings?

A.

The running configuration with settings from the candidate configuration

B.

The candidate configuration with settings from the running configuration

C.

The device state with settings from another configuration

D.

Dynamic update scheduler settings

Full Access
Question # 9

Which rule type is appropriate for matching traffic occurring within a specified zone?

A.

Interzone

B.

Universal

C.

Intrazone

D.

Shadowed

Full Access
Question # 10

Which Security profile would you apply to identify infected hosts on the protected network uwall user database?

A.

Anti-spyware

B.

Vulnerability protection

C.

URL filtering

D.

Antivirus

Full Access
Question # 11

In which two types of NAT can oversubscription be used? (Choose two.)

A.

Static IP

B.

Destination NAT

C.

Dynamic IP and Port (DIPP)

D.

Dynamic IP

Full Access
Question # 12

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application

Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

A.

Data Filtering Profile applied to outbound Security policy rules

B.

Antivirus Profile applied to outbound Security policy rules

C.

Data Filtering Profile applied to inbound Security policy rules

D.

Vulnerability Profile applied to inbound Security policy rules

Full Access
Question # 13

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?

PCNSA question answer

A.

Signature Matching

B.

Network Processing

C.

Security Processing

D.

Security Matching

Full Access
Question # 14

What is a recommended consideration when deploying content updates to the firewall from Panorama?

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

Full Access
Question # 15

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

A.

Antivirus Profile

B.

Data Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Full Access
Question # 16

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

A.

override

B.

allow

C.

block

D.

continue

Full Access
Question # 17

Which three configuration settings are required on a Palo Alto networks firewall management interface?

A.

default gateway

B.

netmask

C.

IP address

D.

hostname

E.

auto-negotiation

Full Access
Question # 18

PCNSA question answer

Given the detailed log information above, what was the result of the firewall traffic inspection?

A.

It was blocked by the Anti-Virus Security profile action.

B.

It was blocked by the Anti-Spyware Profile action.

C.

It was blocked by the Vulnerability Protection profile action.

D.

It was blocked by the Security policy action.

Full Access
Question # 19

Which firewall plane provides configuration, logging, and reporting functions on a separate processor?

A.

control

B.

network processing

C.

data

D.

security processing

Full Access
Question # 20

What can be used as match criteria for creating a dynamic address group?

A.

Usernames

B.

IP addresses

C.

Tags

D.

MAC addresses

Full Access
Question # 21

Which solution is a viable option to capture user identification when Active Directory is not in use?

A.

Cloud Identity Engine

B.

group mapping

C.

Directory Sync Service

D.

Authentication Portal

Full Access
Question # 22

What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)

A.

Blometric scanning results from iOS devices

B.

Firewall logs

C.

Custom API scripts

D.

Security Information and Event Management Systems (SIEMS), such as Splun

E.

DNS Security service

Full Access
Question # 23

Which protocol used to map username to user groups when user-ID is configured?

A.

SAML

B.

RADIUS

C.

TACACS+

D.

LDAP

Full Access
Question # 24

Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?

A.

Panorama > Device Deployment > Dynamic Updates > Schedules > Add

B.

Panorama > Device Deployment > Content Updates > Schedules > Add

C.

Panorama > Dynamic Updates > Device Deployment > Schedules > Add

D.

Panorama > Content Updates > Device Deployment > Schedules > Add

Full Access
Question # 25

All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.

Complete the empty field in the Security policy using an application object to permit only this type of access.

Source Zone: Internal -

Destination Zone: DMZ Zone -

Application: __________

Service: application-default -

Action: allow

A.

Application = "any"

B.

Application = "web-browsing"

C.

Application = "ssl"

D.

Application = "http"

Full Access
Question # 26

Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)

PCNSA question answer

A.

The web session was unsuccessfully decrypted.

B.

The traffic was denied by security profile.

C.

The traffic was denied by URL filtering.

D.

The web session was decrypted.

Full Access
Question # 27

An administrator needs to add capability to perform real-time signature lookups to block or sinkhole all known malware domains.

Which type of single unified engine will get this result?

A.

User-ID

B.

App-ID

C.

Security Processing Engine

D.

Content-ID

Full Access
Question # 28

Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?

A.

Inline Cloud Analysis

B.

Signature Exceptions

C.

Machine Learning Policies

D.

Signature Policies

Full Access
Question # 29

Which file is used to save the running configuration with a Palo Alto Networks firewall?

A.

running-config.xml

B.

run-config.xml

C.

running-configuration.xml

D.

run-configuratin.xml

Full Access
Question # 30

Which feature enables an administrator to review the Security policy rule base for unused rules?

A.

Test Policy Match

B.

Policy Optimizer

C.

View Rulebase as Groups

D.

Security policy tags eb

Full Access
Question # 31

An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?

A.

50

B.

100

C.

200

D.

1,000

Full Access
Question # 32

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

A.

Anti-Spyware

B.

Antivirus

C.

Vulnerability Protection

D.

URL Filtering

Full Access
Question # 33

The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;

1. trust for internal networks

2. untrust to the internet

Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )

A.

Create a deny rule at the top of the policy from trust to untrust with service application-default and add an application filter with the evasive characteristic

B.

Create a deny rule at the top of the policy from trust to untrust over any service and select evasive as the application

C.

Create a deny rule at the top of the policy from trust to untrust with service application-default and select evasive as the application

D.

Create a deny rule at the top of the policy from trust to untrust over any service and add an application filter with the evasive characteristic

Full Access
Question # 34

What must be considered with regards to content updates deployed from Panorama?

A.

Content update schedulers need to be configured separately per device group.

B.

Panorama can only install up to five content versions of the same type for potential rollback scenarios.

C.

A PAN-OS upgrade resets all scheduler configurations for content updates.

D.

Panorama can only download one content update at a time for content updates of the same type.

Full Access
Question # 35

Which statement best describes the use of Policy Optimizer?

A.

Policy Optimizer can display which Security policies have not been used in the last 90 days

B.

Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications

C.

Policy Optimizer can add or change a Log Forwarding profile for each Secunty policy selected

D.

Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID Security policy for every Layer 4 policy that exists Admins can then manually enable policies they want to keep and delete ones they want to remove

Full Access
Question # 36

Which type firewall configuration contains in-progress configuration changes?

A.

backup

B.

running

C.

candidate

D.

committed

Full Access
Question # 37

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

A.

GlobalProtect

B.

Panorama

C.

Aperture

D.

AutoFocus

Full Access
Question # 38

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

A.

It uses techniques such as DGA.DNS tunneling detection and machine learning.

B.

It requires a valid Threat Prevention license.

C.

It enables users to access real-time protections using advanced predictive analytics.

D.

It requires a valid URL Filtering license.

E.

It requires an active subscription to a third-party DNS Security service.

Full Access
Question # 39

Where within the firewall GUI can all existing tags be viewed?

A.

Network > Tags

B.

Monitor > Tags

C.

Objects > Tags

D.

Policies > Tags

Full Access
Question # 40

An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save the changes, but the OK button is grayed out.

What are two possible reasons the OK button is grayed out? (Choose two.)

A.

The entry contains wildcards.

B.

The entry is duplicated.

C.

The entry doesn't match a list entry.

D.

The entry matches a list entry.

Full Access
Question # 41

An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.

Which Security profile should be used?

A.

Antivirus

B.

URL filtering

C.

Anti-spyware

D.

Vulnerability protection

Full Access
Question # 42

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?

A.

override

B.

authorization

C.

authentication

D.

continue

Full Access
Question # 43

In a File Blocking profile, which two actions should be taken to allow file types that support critical apps? (Choose two.)

A.

Clone and edit the Strict profile.

B.

Use URL filtering to limit categories in which users can transfer files.

C.

Set the action to Continue.

D.

Edit the Strict profile.

Full Access
Question # 44

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

A.

Active Directory monitoring

B.

Windows session monitoring

C.

Windows client probing

D.

domain controller monitoring

Full Access
Question # 45

Which component is a building block in a Security policy rule?

A.

decryption profile

B.

destination interface

C.

timeout (min)

D.

application

Full Access
Question # 46

What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?

A.

every 5 minutes

B.

every 1 minute

C.

every 24 hours

D.

every 30 minutes

Full Access
Question # 47

Why does a company need an Antivirus profile?

A.

To prevent command-and-control traffic

B.

To protect against viruses, worms, and trojans

C.

To prevent known exploits

D.

To prevent access to malicious web content

Full Access
Question # 48

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data.

Which Security profile feature could have been used to prevent the communications with the command-and-control server?

A.

Create a Data Filtering Profile and enable its DNS sinkhole feature.

B.

Create an Antivirus Profile and enable its DNS sinkhole feature.

C.

Create an Anti-Spyware Profile and enable its DNS sinkhole feature.

D.

Create a URL Filtering Profile and block the DNS sinkhole URL category.

Full Access
Question # 49

What are three valid ways to map an IP address to a username? (Choose three.)

A.

using the XML API

B.

DHCP Relay logs

C.

a user connecting into a GlobalProtect gateway using a GlobalProtect Agent

D.

usernames inserted inside HTTP Headers

E.

WildFire verdict reports

Full Access
Question # 50

An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones.

Which Security policy rule type should they use?

A.

default

B.

universal

C.

intrazone

D.

interzone

Full Access
Question # 51

An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.

Which security policy action causes this?

A.

Reset server

B.

Reset both

C.

Deny

D.

Drop

Full Access
Question # 52

What is the default action for the SYN Flood option within the DoS Protection profile?

A.

Alert

B.

Random Early Drop

C.

Reset-client

D.

Sinkhole

Full Access
Question # 53

How does the Policy Optimizer policy view differ from the Security policy view?

A.

It provides sorting options that do not affect rule order.

B.

It displays rule utilization.

C.

It details associated zones.

D.

It specifies applications seen by rules.

Full Access
Question # 54

An administrator needs to allow users to use only certain email applications.

How should the administrator configure the firewall to restrict users to specific email applications?

A.

Create an application filter and filter it on the collaboration category, email subcategory.

B.

Create an application group and add the email applications to it.

C.

Create an application filter and filter it on the collaboration category.

D.

Create an application group and add the email category to it.

Full Access
Question # 55

An administrator wishes to follow best practices for logging traffic that traverses the firewall

Which log setting is correct?

A.

Disable all logging

B.

Enable Log at Session End

C.

Enable Log at Session Start

D.

Enable Log at both Session Start and End

Full Access
Question # 56

Which option is part of the content inspection process?

A.

IPsec tunnel encryption

B.

Packet egress process

C.

SSL Proxy re-encrypt

D.

Packet forwarding process

Full Access
Question # 57

According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?

A.

by minute

B.

hourly

C.

daily

D.

weekly

Full Access
Question # 58

Which statement is true regarding a Prevention Posture Assessment?

A.

The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categories

B.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture

C.

It provides a percentage of adoption for each assessment area

D.

It performs over 200 security checks on Panorama/firewall for the assessment

Full Access
Question # 59

Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)

A.

Static IP

B.

Dynamic IP / Port Fallback

C.

Dynamic IP

D.

Dynamic IP and Port (DIPP)

Full Access
Question # 60

Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?

A.

SAML

B.

Multi-Factor Authentication

C.

Role-based

D.

Dynamic

Full Access
Question # 61

Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)

A.

Post-NAT address

B.

Post-NAT zone

C.

Pre-NAT zone

D.

Pre-NAT address

Full Access
Question # 62

Which statement is true regarding a Best Practice Assessment?

A.

The BPA tool can be run only on firewalls

B.

It provides a percentage of adoption for each assessment data

C.

The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities

D.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture

Full Access
Question # 63

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

PCNSA question answer

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on Objective

Full Access
Question # 64

How many zones can an interface be assigned with a Palo Alto Networks firewall?

A.

two

B.

three

C.

four

D.

one

Full Access
Question # 65

Which attribute can a dynamic address group use as a filtering condition to determine its membership?

A.

tag

B.

wildcard mask

C.

IP address

D.

subnet mask

Full Access
Question # 66

What is the purpose of the automated commit recovery feature?

A.

It reverts the Panorama configuration.

B.

It causes HA synchronization to occur automatically between the HA peers after a push from Panorama.

C.

It reverts the firewall configuration if the firewall recognizes a loss of connectivity to Panorama after the change.

D.

It generates a config log after the Panorama configuration successfully reverts to the last running configuration.

Full Access
Question # 67

Your company is highly concerned with their Intellectual property being accessed by unauthorized resources. There is a mature process to store and include metadata tags for all confidential documents.

Which Security profile can further ensure that these documents do not exit the corporate network?

A.

File Blocking

B.

Data Filtering

C.

Anti-Spyware

D.

URL Filtering

Full Access
Question # 68

All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone. Complete the two empty fields in the Security Policy rules that permits only this type of access.

PCNSA question answer

Choose two.

A.

Service = "any"

B.

Application = "Telnet"

C.

Service - "application-default"

D.

Application = "any"

Full Access
Question # 69

Which Security policy set should be used to ensure that a policy is applied first?

A.

Child device-group pre-rulebase

B.

Shared pre-rulebase

C.

Parent device-group pre-rulebase

D.

Local firewall policy

Full Access
Question # 70

An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.

What type of Security policy rule is created?

A.

Tagged

B.

Intrazone

C.

Universal

D.

Interzone

Full Access
Question # 71

The firewall sends employees an application block page when they try to access Youtube.

Which Security policy rule is blocking the youtube application?

PCNSA question answer

A.

intrazone-default

B.

Deny Google

C.

allowed-security services

D.

interzone-default

Full Access
Question # 72

Which dynamic update type includes updated anti-spyware signatures?

A.

Applications and Threats

B.

GlobalProtect Data File

C.

Antivirus

D.

PAN-DB

Full Access
Question # 73

Based on the security policy rules shown, ssh will be allowed on which port?

PCNSA question answer

A.

80

B.

53

C.

22

D.

23

Full Access
Question # 74

A website is unexpectedly allowed due to miscategorization.

What are two way-s to resolve this issue for a proper response? (Choose two.)

A.

Identify the URL category being assigned to the website.

Edit the active URL Filtering profile and update that category's site access settings to block.

B.

Create a URL category and assign the affected URL.

Update the active URL Filtering profile site access setting for the custom URL category to block.

C.

Review the categorization of the website on https://urlfiltering.paloaltonetworks.com.

Submit for "request change*, identifying the appropriate categorization, and wait for confirmation before testing again.

D.

Create a URL category and assign the affected URL.

Add a Security policy with a URL category qualifier of the custom URL category below the original policy. Set the policy action to Deny.

Full Access
Question # 75

Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?

A.

Objects > Dynamic Updates > Review App-IDs

B.

Device > Dynamic Updates > Review Policies

C.

Device > Dynamic Updates > Review App-IDs

D.

Objects > Dynamic Updates > Review Policies

Full Access
Question # 76

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

PCNSA question answer

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

Full Access
Question # 77

An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range.

Which steps should the administrator take?

A.

Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.

B.

Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.

C.

Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.

D.

Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.

Full Access
Question # 78

An administrator has configured a Security policy where the matching condition includes a single application and the action is deny

If the application s default deny action is reset-both what action does the firewall take*?

A.

It sends a TCP reset to the client-side and server-side devices

B.

It silently drops the traffic and sends an ICMP unreachable code

C.

It silently drops the traffic

D.

It sends a TCP reset to the server-side device

Full Access
Question # 79

Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic

Which statement accurately describes how the firewall will apply an action to matching traffic?

A.

If it is an allowed rule, then the Security Profile action is applied last

B.

If it is a block rule then the Security policy rule action is applied last

C.

If it is an allow rule then the Security policy rule is applied last

D.

If it is a block rule then Security Profile action is applied last

Full Access
Question # 80

An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact a command-and-control (C2) server. Which two security profile components will detect and prevent this threat after the firewall’s signature database has been updated? (Choose two.)

A.

vulnerability protection profile applied to outbound security policies

B.

anti-spyware profile applied to outbound security policies

C.

antivirus profile applied to outbound security policies

D.

URL filtering profile applied to outbound security policies

Full Access
Question # 81

Which three types of entries can be excluded from an external dynamic list (EDL)? (Choose three.)

A.

IP addresses

B.

Domains

C.

User-ID

D.

URLs

E.

Applications

Full Access
Question # 82

A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

A.

Windows-based agent on a domain controller

B.

Captive Portal

C.

Citrix terminal server with adequate data-plane resources

D.

PAN-OS integrated agent

Full Access
Question # 83

Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.

PCNSA question answer

Which Security policy rule will allow traffic to flow to the web server?

A.

Untrust (any) to DMZ (10.1.1.100), web browsing -Allow

B.

Untrust (any) to Untrust (1.1.1.100), web browsing - Allow

C.

Untrust (any) to Untrust (10.1.1.100), web browsing -Allow

D.

Untrust (any) to DMZ (1.1.1.100), web browsing - Allow

Full Access
Question # 84

What is used to monitor Security policy applications and usage?

A.

Policy Optimizer

B.

App-ID

C.

Security profile

D.

Policy-based forwarding

Full Access
Question # 85

Which feature must be configured to enable a data plane interface to submit DNS queries originated from the firewall on behalf of the control plane?

A.

Service route

B.

Admin role profile

C.

DNS proxy

D.

Virtual router

Full Access
Question # 86

What is a default setting for NAT Translated Packets when the destination NAT translation is selected as Dynamic IP (with session distribution)?

A.

IP Hash

B.

Source IP Hash

C.

Round Robin

D.

Least Sessions

Full Access
Question # 87

What are two valid selections within an Anti-Spyware profile? (Choose two.)

A.

Default

B.

Deny

C.

Random early drop

D.

Drop

Full Access
Question # 88

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.

A.

on either the data place or the management plane.

B.

after it is matched by a security policy rule that allows traffic.

C.

before it is matched to a Security policy rule.

D.

after it is matched by a security policy rule that allows or blocks traffic.

Full Access
Question # 89

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

A.

Weaponization

B.

Reconnaissance

C.

Installation

D.

Command and Control

E.

Exploitation

Full Access
Question # 90

Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)

PCNSA question answer

A.

Path monitoring does not determine if route is useable

B.

Route with highest metric is actively used

C.

Path monitoring determines if route is useable

D.

Route with lowest metric is actively used

Full Access
Question # 91

In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)

A.

URL Filtering

B.

Vulnerability Protection

C.

Antivirus b

D.

Anti-spyware

Full Access
Question # 92

Which update option is not available to administrators?

A.

New Spyware Notifications

B.

New URLs

C.

New Application Signatures

D.

New Malicious Domains

E.

New Antivirus Signatures

Full Access
Question # 93

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?

A.

URL traffic

B.

vulnerability protection

C.

anti-spyware

D.

antivirus

Full Access
Question # 94

What Policy Optimizer policy view differ from the Security policy do?

A.

It shows rules that are missing Security profile configurations.

B.

It indicates rules with App-ID that are not configured as port-based.

C.

It shows rules with the same Source Zones and Destination Zones.

D.

It indicates that a broader rule matching the criteria is configured above a more specific rule.

Full Access
Question # 95

Which System log severity level would be displayed as a result of a user password change?

A.

High

B.

Critical

C.

Medium

D.

Low

Full Access
Question # 96

What must be configured before setting up Credential Phishing Prevention?

A.

Anti Phishing Block Page

B.

Threat Prevention

C.

Anti Phishing profiles

D.

User-ID

Full Access
Question # 97

What are the two default behaviors for the intrazone-default policy? (Choose two.)

A.

Allow

B.

Logging disabled

C.

Log at Session End

D.

Deny

Full Access
Question # 98

Selecting the option to revert firewall changes will replace what settings?

A.

the running configuration with settings from the candidate configuration

B.

the device state with settings from another configuration

C.

the candidate configuration with settings from the running configuration

D.

dynamic update scheduler settings

Full Access
Question # 99

A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?

A.

Create a custom-service-object called SERVICE-SSH for destination-port-TCP-22. Create a security-rule between zone USERS and OUTSIDE to allow traffic from any source IP-address to any destination IP-address for SERVICE-SSH

B.

Create a security-rule that allows traffic from zone USERS to OUTSIDE to allow traffic from any source IP-address to any destination IP-address for application SSH

C.

In addition to option a, a custom-service-object called SERVICE-SSH-RETURN that contains source-port-TCP-22 should be created. A second security-rule is required that allows traffic from zone OUTSIDE to USERS for SERVICE-SSH-RETURN for any source-IP-address to any destination-Ip-address

D.

In addition to option c, an additional rule from zone OUTSIDE to USERS for application SSH from any source-IP-address to any destination-IP-address is required to allow the return-traffic from the SSH-servers to reach the server-admin

Full Access
Question # 100

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?

A.

Rule Usage Filter > No App Specified

B.

Rule Usage Filter >Hit Count > Unused in 30 days

C.

Rule Usage Filter > Unused Apps

D.

Rule Usage Filter > Hit Count > Unused in 90 days

Full Access
Question # 101

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

A.

User identification

B.

Filtration protection

C.

Vulnerability protection

D.

Antivirus

E.

Application identification

F.

Anti-spyware

Full Access
Question # 102

When creating a custom URL category object, which is a valid type?

A.

domain match

B.

host names

C.

wildcard

D.

category match

Full Access
Question # 103

At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?

A.

after clicking Check New in the Dynamic Update window

B.

after connecting the firewall configuration

C.

after downloading the update

D.

after installing the update

Full Access
Question # 104

By default, what is the maximum number of templates that can be added to a template stack?

A.

6

B.

8

C.

10

D.

12

Full Access
Question # 105

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

A.

block

B.

sinkhole

C.

alert

D.

allow

Full Access
Question # 106

How frequently can wildfire updates be made available to firewalls?

A.

every 15 minutes

B.

every 30 minutes

C.

every 60 minutes

D.

every 5 minutes

Full Access
Question # 107

PCNSA question answer

View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

PCNSA question answer

B)

PCNSA question answer

C)

PCNSA question answer

D)

PCNSA question answer

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 108

An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.

What object is best suited for this configuration?

A.

Application Group

B.

Tag

C.

External Dynamic List

D.

Application Filter

Full Access