ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?

A.
Create a Security policy with a URL Filtering profile that references the site access setting of continue to NO-FILES
A.
Create a Security policy with a URL Filtering profile that references the site access setting of continue to NO-FILES
Answers
B.
Create a Security policy with a URL Filtering profile that references the site access setting of block to NO-FILES
B.
Create a Security policy with a URL Filtering profile that references the site access setting of block to NO-FILES
Answers
C.
Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate Data Filtering profile
C.
Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate Data Filtering profile
Answers
D.
Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate File Blocking profile
D.
Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate File Blocking profile
Answers
Suggested answer: B

Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )

A.
TACACS
A.
TACACS
Answers
B.
SAML2
B.
SAML2
Answers
C.
SAML10
C.
SAML10
Answers
D.
Kerberos
D.
Kerberos
Answers
E.
TACACS+
E.
TACACS+
Answers
Suggested answer: A, B, D

Given the screenshot what two types of route is the administrator configuring? (Choose two )

A.
default route
A.
default route
Answers
B.
OSPF
B.
OSPF
Answers
C.
BGP
C.
BGP
Answers
D.
static route
D.
static route
Answers
Suggested answer: A

Based on the screenshot what is the purpose of the group in User labelled "it"?

A.
Allows users to access IT applications on all ports
A.
Allows users to access IT applications on all ports
Answers
B.
Allows users in group "DMZ" lo access IT applications
B.
Allows users in group "DMZ" lo access IT applications
Answers
C.
Allows "any" users to access servers in the DMZ zone
C.
Allows "any" users to access servers in the DMZ zone
Answers
D.
Allows users in group "it" to access IT applications
D.
Allows users in group "it" to access IT applications
Answers
Suggested answer: D

Which dynamic update type includes updated anti-spyware signatures?

A.
Applications and Threats
A.
Applications and Threats
Answers
B.
GlobalProtect Data File
B.
GlobalProtect Data File
Answers
C.
Antivirus
C.
Antivirus
Answers
D.
PAN-DB
D.
PAN-DB
Answers
Suggested answer: A

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

A.
override
A.
override
Answers
B.
allow
B.
allow
Answers
C.
block
C.
block
Answers
D.
continue
D.
continue
Answers
Suggested answer: B

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications Which policy achieves the desired results?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: B

Which action results in the firewall blocking network traffic without notifying the sender?

A.
Deny
A.
Deny
Answers
B.
No notification
B.
No notification
Answers
C.
Drop
C.
Drop
Answers
D.
Reset Client
D.
Reset Client
Answers
Suggested answer: C

Which type of profile must be applied to the Security policy rule to protect against buffer overflows illegal code execution and other attempts to exploit system flaws''

A.
anti-spyware
A.
anti-spyware
Answers
B.
URL filtering
B.
URL filtering
Answers
C.
vulnerability protection
C.
vulnerability protection
Answers
D.
file blocking
D.
file blocking
Answers
Suggested answer: C

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interfacehelp/objects/objects-security-profiles-vulnerability-protection.html

An administrator is reviewing another administrator s Security policy log settings Which log setting configuration is consistent with best practices tor normal traffic?

A.
Log at Session Start and Log at Session End both enabled
A.
Log at Session Start and Log at Session End both enabled
Answers
B.
Log at Session Start disabled Log at Session End enabled
B.
Log at Session Start disabled Log at Session End enabled
Answers
C.
Log at Session Start enabled Log at Session End disabled
C.
Log at Session Start enabled Log at Session End disabled
Answers
D.
Log at Session Start and Log at Session End both disabled
D.
Log at Session Start and Log at Session End both disabled
Answers
Suggested answer: B
Total 362 questions
Go to page: of 37