Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PCNSA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PCNSA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 364
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PCNSA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PCNSA Practice Exam Questions with Answers Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Certification

Question # 6

What is a recommended consideration when deploying content updates to the firewall from Panorama?

A.

Before deploying content updates, always check content release version compatibility.

B.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

C.

Content updates for firewall A/A HA pairs need a defined master device.

D.

After deploying content updates, perform a commit and push to Panorama.

Full Access
Question # 7

Access to which feature requires the PAN-OS Filtering license?

A.

PAN-DB database

B.

DNS Security

C.

Custom URL categories

D.

URL external dynamic lists

Full Access
Question # 8

Match the cyber-attack lifecycle stage to its correct description.

PCNSA question answer

Full Access
Question # 9

What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?

A.

Doing so limits the templates that receive the policy rules

B.

Doing so provides audit information prior to making changes for selected policy rules

C.

You can specify the firewalls m a device group to which to push policy rules

D.

You specify the location as pre can - or post-rules to push policy rules

Full Access
Question # 10

Match the Cyber-Attack Lifecycle stage to its correct description.

PCNSA question answer

Full Access
Question # 11

Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.

What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?

A.

save named configuration snapshot

B.

export device state

C.

export named configuration snapshot

D.

save candidate config

Full Access
Question # 12

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

PCNSA question answer

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

Full Access
Question # 13

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?

A.

Management

B.

High Availability

C.

Aggregate

D.

Aggregation

Full Access
Question # 14

Which policy set should be used to ensure that a policy is applied just before the default security rules?

A.

Parent device-group post-rulebase

B.

Child device-group post-rulebase

C.

Local Firewall policy

D.

Shared post-rulebase

Full Access
Question # 15

Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?

A.

SAML

B.

Multi-Factor Authentication

C.

Role-based

D.

Dynamic

Full Access
Question # 16

Which type of address object is "10 5 1 1/0 127 248 2"?

A.

IP subnet

B.

IP wildcard mask

C.

IP netmask

D.

IP range

Full Access
Question # 17

Which prevention technique will prevent attacks based on packet count?

A.

zone protection profile

B.

URL filtering profile

C.

antivirus profile

D.

vulnerability profile

Full Access
Question # 18

Which object would an administrator create to enable access to all applications in the office-programs subcategory?

A.

application filter

B.

URL category

C.

HIP profile

D.

application group

Full Access
Question # 19

How frequently can wildfire updates be made available to firewalls?

A.

every 15 minutes

B.

every 30 minutes

C.

every 60 minutes

D.

every 5 minutes

Full Access
Question # 20

What is an advantage for using application tags?

A.

They are helpful during the creation of new zones

B.

They help with the design of IP address allocations in DHCP.

C.

They help content updates automate policy updates

D.

They help with the creation of interfaces

Full Access
Question # 21

PCNSA question answer

View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

PCNSA question answer

B)

PCNSA question answer

C)

PCNSA question answer

D)

PCNSA question answer

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 22

Which option lists the attributes that are selectable when setting up an Application filters?

A.

Category, Subcategory, Technology, and Characteristic

B.

Category, Subcategory, Technology, Risk, and Characteristic

C.

Name, Category, Technology, Risk, and Characteristic

D.

Category, Subcategory, Risk, Standard Ports, and Technology

Full Access
Question # 23

Why does a company need an Antivirus profile?

A.

To prevent command-and-control traffic

B.

To protect against viruses, worms, and trojans

C.

To prevent known exploits

D.

To prevent access to malicious web content

Full Access
Question # 24

What does an administrator use to validate whether a session is matching an expected NAT policy?

A.

system log

B.

test command

C.

threat log

D.

config audit

Full Access
Question # 25

What allows a security administrator to preview the Security policy rules that match new application signatures?

A.

Review Release Notes

B.

Dynamic Updates-Review Policies

C.

Dynamic Updates-Review App

D.

Policy Optimizer-New App Viewer

Full Access
Question # 26

Which three filter columns are available when setting up an Application Filter? (Choose three.)

A.

Parent App

B.

Category

C.

Risk

D.

Standard Ports

E.

Subcategory

Full Access
Question # 27

To what must an interface be assigned before it can process traffic?

A.

Security Zone

B.

Security policy

C.

Security Protection

D.

Security profile

Full Access
Question # 28

PCNSA question answer

Given the topology, which zone type should interface E1/1 be configured with?

A.

Tap

B.

Tunnel

C.

Virtual Wire

D.

Layer3

Full Access
Question # 29

Which three types of entries can be excluded from an external dynamic list (EDL)? (Choose three.)

A.

IP addresses

B.

Domains

C.

User-ID

D.

URLs

E.

Applications

Full Access
Question # 30

Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP Addresses list?

A.

destination address

B.

source address

C.

destination zone

D.

source zone

Full Access
Question # 31

Which Security profile would you apply to identify infected hosts on the protected network uwall user database?

A.

Anti-spyware

B.

Vulnerability protection

C.

URL filtering

D.

Antivirus

Full Access
Question # 32

Based on the screenshot what is the purpose of the group in User labelled ''it"?

PCNSA question answer

A.

Allows users to access IT applications on all ports

B.

Allows users in group "DMZ" lo access IT applications

C.

Allows "any" users to access servers in the DMZ zone

D.

Allows users in group "it" to access IT applications

Full Access
Question # 33

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

A.

GlobalProtect

B.

Panorama

C.

Aperture

D.

AutoFocus

Full Access
Question # 34

Which path is used to save and load a configuration with a Palo Alto Networks firewall?

A.

Device>Setup>Services

B.

Device>Setup>Management

C.

Device>Setup>Operations

D.

Device>Setup>Interfaces

Full Access
Question # 35

An administrator is reviewing the Security policy rules shown in the screenshot below.

Which statement is correct about the information displayed?

PCNSA question answer

A.

Eleven rules use the "Infrastructure* tag.

B.

The view Rulebase as Groups is checked.

C.

There are seven Security policy rules on this firewall.

D.

Highlight Unused Rules is checked.

Full Access
Question # 36

Which firewall plane provides configuration, logging, and reporting functions on a separate processor?

A.

control

B.

network processing

C.

data

D.

security processing

Full Access
Question # 37

Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)

A.

Static IP

B.

Dynamic IP / Port Fallback

C.

Dynamic IP

D.

Dynamic IP and Port (DIPP)

Full Access
Question # 38

Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?

A.

URL filtering

B.

Antivirus

C.

WildFire

D.

Threat Prevention

Full Access
Question # 39

PCNSA question answer

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications

Which policy achieves the desired results?

A)

PCNSA question answer

B)

PCNSA question answer

C)

PCNSA question answer

D)

PCNSA question answer

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 40

Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)

A.

Post-NAT address

B.

Post-NAT zone

C.

Pre-NAT zone

D.

Pre-NAT address

Full Access
Question # 41

Which statements is true regarding a Heatmap report?

A.

When guided by authorized sales engineer, it helps determine te areas of greatest security risk.

B.

It provides a percentage of adoption for each assessment area.

C.

It runs only on firewall.

D.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.

Full Access
Question # 42

Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)

PCNSA question answer

A.

The web session was unsuccessfully decrypted.

B.

The traffic was denied by security profile.

C.

The traffic was denied by URL filtering.

D.

The web session was decrypted.

Full Access
Question # 43

The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.

Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)

A.

Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.

B.

Manually remove powerball.com from the gambling URL category.

C.

Add *.powerball.com to the allow list

D.

Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.

Full Access
Question # 44

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)

A.

Security policy rules inspect but do not block traffic.

B.

Security Profile should be used only on allowed traffic.

C.

Security Profile are attached to security policy rules.

D.

Security Policy rules are attached to Security Profiles.

E.

Security Policy rules can block or allow traffic.

Full Access
Question # 45

A network administrator is required to use a dynamic routing protocol for network connectivity.

Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)

A.

RIP

B.

OSPF

C.

IS-IS

D.

EIGRP

E.

BGP

Full Access
Question # 46

An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?

A.

50

B.

100

C.

200

D.

1,000

Full Access
Question # 47

What action will inform end users when their access to Internet content is being restricted?

A.

Create a custom 'URL Category' object with notifications enabled.

B.

Publish monitoring data for Security policy deny logs.

C.

Ensure that the 'site access" setting for all URL sites is set to 'alert'.

D.

Enable 'Response Pages' on the interface providing Internet access.

Full Access
Question # 48

Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided password?

A.

exclude

B.

continue

C.

hold

D.

override

Full Access
Question # 49

Which statement best describes the use of Policy Optimizer?

A.

Policy Optimizer can display which Security policies have not been used in the last 90 days

B.

Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications

C.

Policy Optimizer can add or change a Log Forwarding profile for each Secunty policy selected

D.

Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID Security policy for every Layer 4 policy that exists Admins can then manually enable policies they want to keep and delete ones they want to remove

Full Access
Question # 50

An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range.

Which steps should the administrator take?

A.

Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.

B.

Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.

C.

Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.

D.

Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.

Full Access
Question # 51

Why should a company have a File Blocking profile that is attached to a Security policy?

A.

To block uploading and downloading of specific types of files

B.

To detonate files in a sandbox environment

C.

To analyze file types

D.

To block uploading and downloading of any type of files

Full Access
Question # 52

What is the purpose of the automated commit recovery feature?

A.

It reverts the Panorama configuration.

B.

It causes HA synchronization to occur automatically between the HA peers after a push from Panorama.

C.

It reverts the firewall configuration if the firewall recognizes a loss of connectivity to Panorama after the change.

D.

It generates a config log after the Panorama configuration successfully reverts to the last running configuration.

Full Access
Question # 53

Match each rule type with its example

PCNSA question answer

Full Access
Question # 54

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

A.

antivirus profile applied to outbound security policies

B.

data filtering profile applied to inbound security policies

C.

data filtering profile applied to outbound security policies

D.

vulnerability profile applied to inbound security policies

Full Access
Question # 55

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?

A.

every 30 minutes

B.

every 5 minutes

C.

once every 24 hours

D.

every 1 minute

Full Access
Question # 56

An administrator should filter NGFW traffic logs by which attribute column to determine if the entry is for the start or end of the session?

A.

Receive Time

B.

Type

C.

Destination

D.

Source

Full Access
Question # 57

Which file is used to save the running configuration with a Palo Alto Networks firewall?

A.

running-config.xml

B.

run-config.xml

C.

running-configuration.xml

D.

run-configuratin.xml

Full Access
Question # 58

The firewall sends employees an application block page when they try to access Youtube.

Which Security policy rule is blocking the youtube application?

PCNSA question answer

A.

intrazone-default

B.

Deny Google

C.

allowed-security services

D.

interzone-default

Full Access
Question # 59

What is the best-practice approach to logging traffic that traverses the firewall?

A.

Enable both log at session start and log at session end.

B.

Enable log at session start only.

C.

Enable log at session end only.

D.

Disable all logging options.

Full Access
Question # 60

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

A.

global

B.

intrazone

C.

interzone

D.

universal

Full Access
Question # 61

Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)

A.

XML API

B.

log forwarding auto-tagging

C.

GlobalProtect agent

D.

User-ID Windows-based agent

Full Access
Question # 62

How many zones can an interface be assigned with a Palo Alto Networks firewall?

A.

two

B.

three

C.

four

D.

one

Full Access
Question # 63

Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )

A.

TACACS

B.

SAML2

C.

SAML10

D.

Kerberos

E.

TACACS+

Full Access
Question # 64

What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)

A.

Service

B.

User

C.

Application

D.

Address

E.

Zone ab

Full Access
Question # 65

An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240 addresses and found that connections from addresses that needed new translations were being dropped.

Which type of NAT was configured?

A.

Static IP

B.

Dynamic IP

C.

Destination NAT

D.

Dynamic IP and Port

Full Access
Question # 66

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?

A.

DoS protection

B.

URL filtering

C.

packet buffering

D.

anti-spyware

Full Access
Question # 67

What are the two main reasons a custom application is created? (Choose two.)

A.

To correctly identify an internal application in the traffic log

B.

To change the default categorization of an application

C.

To visually group similar applications

D.

To reduce unidentified traffic on a network

Full Access
Question # 68

PCNSA question answer

Based on the network diagram provided, which two statements apply to traffic between the User and Server networks? (Choose two.)

A.

Traffic is permitted through the default intrazone "allow" rule.

B.

Traffic restrictions are possible by modifying intrazone rules.

C.

Traffic restrictions are not possible, because the networks are in the same zone.

D.

Traffic is permitted through the default interzone "allow" rule.

Full Access
Question # 69

Which rule type is appropriate for matching traffic occurring within a specified zone?

A.

Interzone

B.

Universal

C.

Intrazone

D.

Shadowed

Full Access
Question # 70

A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to

making the changes.

Which action will allow the administrator to undo the changes?

A.

Load configuration version, and choose the first item on the list.

B.

Load named configuration snapshot, and choose the first item on the list.

C.

Revert to last saved configuration.

D.

Revert to running configuration.

Full Access
Question # 71

An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs.

What is the correct process to enable this logging1?

A.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OK

B.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session End and click OK

C.

This rule has traffic logging enabled by default no further action is required

D.

Select the interzone-default rule and click Override on the Actions tab select Log at Session End and click OK

Full Access
Question # 72

What is considered best practice with regards to committing configuration changes?

A.

Disable the automatic commit feature that prioritizes content database installations before committing

B.

Validate configuration changes prior to committing

C.

Wait until all running and pending jobs are finished before committing

D.

Export configuration after each single configuration change performed

Full Access
Question # 73

How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?

A.

Select the unified log entry in the side menu.

B.

Modify the number of columns visible on the page

C.

Modify the number of logs visible on each page.

D.

Select the system logs entry in the side menu.

Full Access
Question # 74

A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.

To which two types of traffic will the rule apply? (Choose two.)

A.

Within zone HR

B.

Within zone IT

C.

Between zone IT and zone HR

D.

Between zone IT and zone Finance

Full Access
Question # 75

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

A.

An implicit dependency does not require the dependent application to be added in the security policy

B.

An implicit dependency requires the dependent application to be added in the security policy

C.

An explicit dependency does not require the dependent application to be added in the security policy

D.

An explicit dependency requires the dependent application to be added in the security policy

Full Access
Question # 76

Where in Panorama Would Zone Protection profiles be configured?

A.

Shared

B.

Templates

C.

Device Groups

D.

Panorama tab

Full Access
Question # 77

View the diagram.

PCNSA question answer

What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

PCNSA question answer

B)

PCNSA question answer

C)

PCNSA question answer

D)

PCNSA question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

Which System log severity level would be displayed as a result of a user password change?

A.

High

B.

Critical

C.

Medium

D.

Low

Full Access
Question # 79

Which protocol used to map username to user groups when user-ID is configured?

A.

SAML

B.

RADIUS

C.

TACACS+

D.

LDAP

Full Access
Question # 80

The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication Sequence SYS01," and the authentication sequence SYS01 has a profile list with four authentication profiles:

• Auth Profile LDAP

• Auth Profile Radius

• Auth Profile Local

• Auth Profile TACACS

After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable but has lost the "SYS01 Admin" username and password.

What is the "SYS01 Admin" login capability after the outage?

A.

Auth KO because RADIUS server lost user and password for SYS01 Admin

B.

Auth KO because LDAP server is not reachable

C.

Auth OK because of the Auth Profile Local

D.

Auth OK because of the Auth Profile TACACS -

Full Access
Question # 81

Which Security profile can you apply to protect against malware such as worms and Trojans?

A.

data filtering

B.

antivirus

C.

vulnerability protection

D.

anti-spyware

Full Access
Question # 82

Which dynamic update type includes updated anti-spyware signatures?

A.

Applications and Threats

B.

GlobalProtect Data File

C.

Antivirus

D.

PAN-DB

Full Access
Question # 83

Which three Ethernet interface types are configurable on the Palo Alto Networks firewall? (Choose three.)

A.

Virtual Wire

B.

Tap

C.

Dynamic

D.

Layer 3

E.

Static

Full Access
Question # 84

Place the following steps in the packet processing order of operations from first to last.

PCNSA question answer

Full Access
Question # 85

Which two statements are correct about App-ID content updates? (Choose two.)

A.

Updated application content may change how security policy rules are enforced

B.

After an application content update, new applications must be manually classified prior to use

C.

Existing security policy rules are not affected by application content updates

D.

After an application content update, new applications are automatically identified and classified

Full Access
Question # 86

Which statement best describes a common use of Policy Optimizer?

A.

Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications.

B.

Policy Optimizer can add or change a Log Forwarding profile for each Security policy selected.

C.

Policy Optimizer can display which Security policies have not been used in the last 90 days.

D.

Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID Security policy for every Layer 4 policy that exists. Admins can then manually enable policies they want to keep and delete ones they want to remove.

Full Access
Question # 87

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

A.

block

B.

sinkhole

C.

alert

D.

allow

Full Access
Question # 88

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Full Access
Question # 89

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.

Complete the security policy to ensure only Telnet is allowed.

Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and action = Allow

A.

Destination IP: 192.168.1.123/24

B.

Application = ‘Telnet’

C.

Log Forwarding

D.

USER-ID = ‘Allow users in Trusted’

Full Access
Question # 90

What is a default setting for NAT Translated Packets when the destination NAT translation is selected as Dynamic IP (with session distribution)?

A.

IP Hash

B.

Source IP Hash

C.

Round Robin

D.

Least Sessions

Full Access
Question # 91

Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose two.)

A.

Obtain a Threat Prevention subscription.

B.

Enable Dynamic Updates.

C.

Move within the WildFire public cloud region.

D.

Obtain a WildFire subscription.

Full Access
Question # 92

Which feature enables an administrator to review the Security policy rule base for unused rules?

A.

Security policy tags

B.

Test Policy Match

C.

View Rulebase as Groups

D.

Policy Optimizer

Full Access
Question # 93

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

A.

Override

B.

Allow

C.

Block

D.

Continue

Full Access
Question # 94

An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"

Which security policy action causes this?

A.

Drop

B.

Drop, send ICMP Unreachable

C.

Reset both

D.

Reset server

Full Access
Question # 95

Which Security policy set should be used to ensure that a policy is applied first?

A.

Child device-group pre-rulebase

B.

Shared pre-rulebase

C.

Parent device-group pre-rulebase

D.

Local firewall policy

Full Access
Question # 96

A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

A.

Windows-based agent on a domain controller

B.

Captive Portal

C.

Citrix terminal server with adequate data-plane resources

D.

PAN-OS integrated agent

Full Access
Question # 97

What do dynamic user groups you to do?

A.

create a QoS policy that provides auto-remediation for anomalous user behavior and malicious activity

B.

create a policy that provides auto-sizing for anomalous user behavior and malicious activity

C.

create a policy that provides auto-remediation for anomalous user behavior and malicious activity

D.

create a dynamic list of firewall administrators

Full Access
Question # 98

When creating a custom URL category object, which is a valid type?

A.

domain match

B.

host names

C.

wildcard

D.

category match

Full Access
Question # 99

PCNSA question answer

Given the detailed log information above, what was the result of the firewall traffic inspection?

A.

It was blocked by the Vulnerability Protection profile action.

B.

It was blocked by the Anti-Virus Security profile action.

C.

It was blocked by the Anti-Spyware Profile action.

D.

It was blocked by the Security policy action.

Full Access
Question # 100

Which type security policy rule would match traffic flowing between the inside zone and outside zone within the inside zone and within the outside zone?

A.

global

B.

universal

C.

intrazone

D.

interzone

Full Access
Question # 101

If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?

A.

Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL

B.

Configure a frequency schedule to clear group mapping cache

C.

Configure a Primary Employee ID number for user-based Security policies

D.

Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or 389

Full Access
Question # 102

An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.

What object is best suited for this configuration?

A.

Application Group

B.

Tag

C.

External Dynamic List

D.

Application Filter

Full Access
Question # 103

Which the app-ID application will you need to allow in your security policy to use facebook-chat?

A.

facebook-email

B.

facebook-base

C.

facebook

D.

facebook-chat

Full Access
Question # 104

Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?

A.

Threat Prevention License

B.

Threat Implementation License

C.

Threat Environment License

D.

Threat Protection License

Full Access
Question # 105

Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?

PCNSA question answer

A.

Apps Allowed

B.

Name

C.

Apps Seen

D.

Service

Full Access
Question # 106

The NetSec Manager asked to create a new firewall Local Administrator profile with customized privileges named NewAdmin. This new administrator has to authenticate without inserting any username or password to access the WebUI.

What steps should the administrator follow to create the New_Admin Administrator profile?

A.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Role Based.

3. Issue to the Client a Certificate with Common Name = NewAdmin

B.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Certificate Name = NewAdmin

C.

1. Set the Authentication profile to Local.

2. Select the "Use only client certificate authentication" check box.

3. Set Role to Role Based.

D.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Common Name = New Admin

Full Access
Question # 107

An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.

Which security policy action causes this?

A.

Reset server

B.

Reset both

C.

Deny

D.

Drop

Full Access
Question # 108

Which two rule types allow the administrator to modify the destination zone? (Choose two )

A.

interzone

B.

intrazone

C.

universal

D.

shadowed

Full Access