ExamGecko
Home / Palo Alto Networks / PCNSA / List of questions
Ask Question

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?

override
override
authorization
authorization
authentication
authentication
continue
continue
Suggested answer: B
Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/urlfilteringprofile-actions.html


asked 23/09/2024
Stefano Humphries
43 questions

Question 152

Report Export Collapse

Selecting the option to revert firewall changes will replace what settings?

the running configuration with settings from the candidate configuration
the running configuration with settings from the candidate configuration
the device state with settings from another configuration
the device state with settings from another configuration
the candidate configuration with settings from the running configuration
the candidate configuration with settings from the running configuration
dynamic update scheduler settings
dynamic update scheduler settings
Suggested answer: C
asked 23/09/2024
Robert Jebakumar Jayakumar
33 questions

Question 153

Report Export Collapse

What is considered best practice with regards to committing configuration changes?

Disable the automatic commit feature that prioritizes content database installations before committing
Disable the automatic commit feature that prioritizes content database installations before committing
Validate configuration changes prior to committing
Validate configuration changes prior to committing
Wait until all running and pending jobs are finished before committing
Wait until all running and pending jobs are finished before committing
Export configuration after each single configuration change performed
Export configuration after each single configuration change performed
Suggested answer: A
asked 23/09/2024
Asad yaseen
43 questions

Question 154

Report Export Collapse

An administrator wants to prevent users from submitting corporate credentials in a phishing attack.

Which Security profile should be applied?

antivirus
antivirus
anti-spyware
anti-spyware
URL filtering
URL filtering
vulnerability protection
vulnerability protection
Suggested answer: B
asked 23/09/2024
Alvin Thomas
56 questions

Question 155

Report Export Collapse

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?

URL traffic
URL traffic
vulnerability protection
vulnerability protection
anti-spyware
anti-spyware
antivirus
antivirus
Suggested answer: C
asked 23/09/2024
Muath Ahmed Saleh AlShuwaer
43 questions

Question 156

Report Export Collapse

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)

QoS profile
QoS profile
DoS Protection profile
DoS Protection profile
Zone Protection profile
Zone Protection profile
DoS Protection policy
DoS Protection policy
Suggested answer: B, C
Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles

Palo Alto Networks PCNSA image Question 156 explanation 53971 09232024001155000000

asked 23/09/2024
Lionel Fitzgerald Gweth
45 questions

Question 157

Report Export Collapse

What is the main function of Policy Optimizer?

reduce load on the management plane by highlighting combinable security rules
reduce load on the management plane by highlighting combinable security rules
migrate other firewall vendors' security rules to Palo Alto Networks configuration
migrate other firewall vendors' security rules to Palo Alto Networks configuration
eliminate "Log at Session Start" security rules
eliminate "Log at Session Start" security rules
convert port-based security rules to application-based security rules
convert port-based security rules to application-based security rules
Suggested answer: D
Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/policyoptimizer.html

asked 23/09/2024
Pablo Galilea
36 questions

Question 158

Report Export Collapse

How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?

Disable automatic updates during weekdays
Disable automatic updates during weekdays
Automatically "download and install" but with the "disable new applications" option used
Automatically "download and install" but with the "disable new applications" option used
Automatically "download only" and then install Applications and Threats later, after the administrator approves the update
Automatically "download only" and then install Applications and Threats later, after the administrator approves the update
Configure the option for "Threshold"
Configure the option for "Threshold"
Suggested answer: D
asked 23/09/2024
Keletso Rafedile
38 questions

Question 159

Report Export Collapse

You receive notification about new malware that infects hosts through malicious files transferred by FTP.

Which Security profile detects and protects your internal networks from this threat after you update your firewall's threat signature database?

URL Filtering profile applied to inbound Security policy rules.
URL Filtering profile applied to inbound Security policy rules.
Data Filtering profile applied to outbound Security policy rules.
Data Filtering profile applied to outbound Security policy rules.
Antivirus profile applied to inbound Security policy rules.
Antivirus profile applied to inbound Security policy rules.
Vulnerability Prote ction profile applied to outbound Security policy rules.
Vulnerability Prote ction profile applied to outbound Security policy rules.
Suggested answer: C
Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles

asked 23/09/2024
Pedro Faro
37 questions

Question 160

Report Export Collapse

Which rule type is appropriate for matching traffic both within and between the source and destination zones?

interzone
interzone
shadowed
shadowed
intrazone
intrazone
universal
universal
Suggested answer: A
asked 23/09/2024
Rita Marques
45 questions
Total 362 questions
Go to page: of 37

Related questions