ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 10

Question list
Search
Search

Which statements is true regarding a Heatmap report?

A.
When guided by authorized sales engineer, it helps determine te areas of greatest security risk.
A.
When guided by authorized sales engineer, it helps determine te areas of greatest security risk.
Answers
B.
It provides a percentage of adoption for each assessment area.
B.
It provides a percentage of adoption for each assessment area.
Answers
C.
It runs only on firewall.
C.
It runs only on firewall.
Answers
D.
It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.
D.
It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.
Answers
Suggested answer: B

Explanation:

Reference: https://live.paloaltonetworks.com/t5/best-practice-assessment-blogs/the-best-practiceassessment-bpa-tool-for-ngfw-and-panorama/ba-p/248343

Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?

A.
local username
A.
local username
Answers
B.
dynamic user group
B.
dynamic user group
Answers
C.
remote username
C.
remote username
Answers
D.
static user group
D.
static user group
Answers
Suggested answer: B

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

A.
It functions like PAN-DB and requires activation through the app portal.
A.
It functions like PAN-DB and requires activation through the app portal.
Answers
B.
It removes the 100K limit for DNS entries for the downloaded DNS updates.
B.
It removes the 100K limit for DNS entries for the downloaded DNS updates.
Answers
C.
IT eliminates the need for dynamic DNS updates.
C.
IT eliminates the need for dynamic DNS updates.
Answers
D.
IT is automatically enabled and configured.
D.
IT is automatically enabled and configured.
Answers
Suggested answer: A, B

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)

A.
Security policy rules inspect but do not block traffic.
A.
Security policy rules inspect but do not block traffic.
Answers
B.
Security Profile should be used only on allowed traffic.
B.
Security Profile should be used only on allowed traffic.
Answers
C.
Security Profile are attached to security policy rules.
C.
Security Profile are attached to security policy rules.
Answers
D.
Security Policy rules are attached to Security Profiles.
D.
Security Policy rules are attached to Security Profiles.
Answers
E.
Security Policy rules can block or allow traffic.
E.
Security Policy rules can block or allow traffic.
Answers
Suggested answer: B, C, E

Based on the screenshot what is the purpose of the included groups?

A.
They are only groups visible based on the firewall's credentials.
A.
They are only groups visible based on the firewall's credentials.
Answers
B.
They are used to map usernames to group names.
B.
They are used to map usernames to group names.
Answers
C.
They contain only the users you allow to manage the firewall.
C.
They contain only the users you allow to manage the firewall.
Answers
D.
They are groups that are imported from RADIUS authentication servers.
D.
They are groups that are imported from RADIUS authentication servers.
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-users-to-groups.html

What is an advantage for using application tags?

A.
They are helpful during the creation of new zones
A.
They are helpful during the creation of new zones
Answers
B.
They help with the design of IP address allocations in DHCP.
B.
They help with the design of IP address allocations in DHCP.
Answers
C.
They help content updates automate policy updates
C.
They help content updates automate policy updates
Answers
D.
They help with the creation of interfaces
D.
They help with the creation of interfaces
Answers
Suggested answer: C

Which operations are allowed when working with App-ID application tags?

A.
Predefined tags may be deleted.
A.
Predefined tags may be deleted.
Answers
B.
Predefined tags may be augmented by custom tags.
B.
Predefined tags may be augmented by custom tags.
Answers
C.
Predefined tags may be modified.
C.
Predefined tags may be modified.
Answers
D.
Predefined tags may be updated by WildFire dynamic updates.
D.
Predefined tags may be updated by WildFire dynamic updates.
Answers
Suggested answer: B

You need to allow users to access the officeñsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?

A.
Create an Application Group and add Office 365, Evernote Google Docs and Libre Office
A.
Create an Application Group and add Office 365, Evernote Google Docs and Libre Office
Answers
B.
Create an Application Group and add business-systems to it.
B.
Create an Application Group and add business-systems to it.
Answers
C.
Create an Application Filter and name it Office Programs, then filter it on the office programs subcategory.
C.
Create an Application Filter and name it Office Programs, then filter it on the office programs subcategory.
Answers
D.
Create an Application Filter and name it Office Programs then filter on the business-systems category.
D.
Create an Application Filter and name it Office Programs then filter on the business-systems category.
Answers
Suggested answer: C

In which profile should you configure the DNS Security feature?

A.
URL Filtering Profile
A.
URL Filtering Profile
Answers
B.
Anti-Spyware Profile
B.
Anti-Spyware Profile
Answers
C.
Zone Protection Profile
C.
Zone Protection Profile
Answers
D.
Antivirus Profile
D.
Antivirus Profile
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/dnssecurity/enable- dnssecurity.html

Access to which feature requires PAN-OS Filtering licens?

A.
PAN-DB database
A.
PAN-DB database
Answers
B.
URL external dynamic lists
B.
URL external dynamic lists
Answers
C.
Custom URL categories
C.
Custom URL categories
Answers
D.
DNS Security
D.
DNS Security
Answers
Suggested answer: A

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activatelicenses-and-subscriptions.html

Total 362 questions
Go to page: of 37