ExamGecko
Ask QuestionAsk Question

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











Question 151

Report
Export
Collapse

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?

A.
override
A.
override
Answers
B.
authorization
B.
authorization
Answers
C.
authentication
C.
authentication
Answers
D.
continue
D.
continue
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/urlfilteringprofile-actions.html


asked 23/09/2024
Stefano Humphries
40 questions

Question 152

Report
Export
Collapse

Selecting the option to revert firewall changes will replace what settings?

A.
the running configuration with settings from the candidate configuration
A.
the running configuration with settings from the candidate configuration
Answers
B.
the device state with settings from another configuration
B.
the device state with settings from another configuration
Answers
C.
the candidate configuration with settings from the running configuration
C.
the candidate configuration with settings from the running configuration
Answers
D.
dynamic update scheduler settings
D.
dynamic update scheduler settings
Answers
Suggested answer: C
asked 23/09/2024
Robert Jebakumar Jayakumar
25 questions

Question 153

Report
Export
Collapse

What is considered best practice with regards to committing configuration changes?

A.
Disable the automatic commit feature that prioritizes content database installations before committing
A.
Disable the automatic commit feature that prioritizes content database installations before committing
Answers
B.
Validate configuration changes prior to committing
B.
Validate configuration changes prior to committing
Answers
C.
Wait until all running and pending jobs are finished before committing
C.
Wait until all running and pending jobs are finished before committing
Answers
D.
Export configuration after each single configuration change performed
D.
Export configuration after each single configuration change performed
Answers
Suggested answer: A
asked 23/09/2024
Asad yaseen
40 questions

Question 154

Report
Export
Collapse

An administrator wants to prevent users from submitting corporate credentials in a phishing attack.

Which Security profile should be applied?

A.
antivirus
A.
antivirus
Answers
B.
anti-spyware
B.
anti-spyware
Answers
C.
URL filtering
C.
URL filtering
Answers
D.
vulnerability protection
D.
vulnerability protection
Answers
Suggested answer: B
asked 23/09/2024
Alvin Thomas
46 questions

Question 155

Report
Export
Collapse

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?

A.
URL traffic
A.
URL traffic
Answers
B.
vulnerability protection
B.
vulnerability protection
Answers
C.
anti-spyware
C.
anti-spyware
Answers
D.
antivirus
D.
antivirus
Answers
Suggested answer: C
asked 23/09/2024
Muath Ahmed Saleh AlShuwaer
39 questions

Question 156

Report
Export
Collapse

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)

A.
QoS profile
A.
QoS profile
Answers
B.
DoS Protection profile
B.
DoS Protection profile
Answers
C.
Zone Protection profile
C.
Zone Protection profile
Answers
D.
DoS Protection policy
D.
DoS Protection policy
Answers
Suggested answer: B, C

Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles

asked 23/09/2024
Lionel Fitzgerald Gweth
44 questions

Question 157

Report
Export
Collapse

What is the main function of Policy Optimizer?

A.
reduce load on the management plane by highlighting combinable security rules
A.
reduce load on the management plane by highlighting combinable security rules
Answers
B.
migrate other firewall vendors' security rules to Palo Alto Networks configuration
B.
migrate other firewall vendors' security rules to Palo Alto Networks configuration
Answers
C.
eliminate "Log at Session Start" security rules
C.
eliminate "Log at Session Start" security rules
Answers
D.
convert port-based security rules to application-based security rules
D.
convert port-based security rules to application-based security rules
Answers
Suggested answer: D

Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/policyoptimizer.html

asked 23/09/2024
Pablo Galilea
26 questions

Question 158

Report
Export
Collapse

How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?

A.
Disable automatic updates during weekdays
A.
Disable automatic updates during weekdays
Answers
B.
Automatically "download and install" but with the "disable new applications" option used
B.
Automatically "download and install" but with the "disable new applications" option used
Answers
C.
Automatically "download only" and then install Applications and Threats later, after the administrator approves the update
C.
Automatically "download only" and then install Applications and Threats later, after the administrator approves the update
Answers
D.
Configure the option for "Threshold"
D.
Configure the option for "Threshold"
Answers
Suggested answer: D
asked 23/09/2024
Keletso Rafedile
34 questions

Question 159

Report
Export
Collapse

You receive notification about new malware that infects hosts through malicious files transferred by FTP.

Which Security profile detects and protects your internal networks from this threat after you update your firewall's threat signature database?

A.
URL Filtering profile applied to inbound Security policy rules.
A.
URL Filtering profile applied to inbound Security policy rules.
Answers
B.
Data Filtering profile applied to outbound Security policy rules.
B.
Data Filtering profile applied to outbound Security policy rules.
Answers
C.
Antivirus profile applied to inbound Security policy rules.
C.
Antivirus profile applied to inbound Security policy rules.
Answers
D.
Vulnerability Prote ction profile applied to outbound Security policy rules.
D.
Vulnerability Prote ction profile applied to outbound Security policy rules.
Answers
Suggested answer: C

Explanation:

Reference:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles

asked 23/09/2024
Pedro Faro
29 questions

Question 160

Report
Export
Collapse

Which rule type is appropriate for matching traffic both within and between the source and destination zones?

A.
interzone
A.
interzone
Answers
B.
shadowed
B.
shadowed
Answers
C.
intrazone
C.
intrazone
Answers
D.
universal
D.
universal
Answers
Suggested answer: A
asked 23/09/2024
Rita Marques
39 questions
Total 362 questions
Go to page: of 37