Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 19
List of questions
Related questions
Question 181

What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewalladministration/manage-firewall-administrators/administrative-authentication.html
Question 182

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
Explanation:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy.html
Question 183

Given the topology, which zone type should you configure for firewall interface E1/1?
Question 184

Which two features can be used to tag a username so that it is included in a dynamic user group?
(Choose two.)
Question 185

For the firewall to use Active Directory to authenticate users, which Server Profile is required in the Authentication Profile?
Explanation:
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/configure-anauthenticationprofile-and-sequence
Question 186

Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?
Explanation:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/software-and-contentupdates/dynamiccontentupdates.html#:~:text=WildFire%20signature%20updates%20are%20made,within%20a%20minute%20of%20availability
Question 187

Which license is required to use the Palo Alto Networks built-in IP address EDLs?
Explanation:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/use-an-external-dynamic-listin-policy/builtin-edls.html#:~:text=With%20an%
Question 188

Which component is a building block in a Security policy rule?
Explanation:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/policies/policiessecurity/buildingblocks-in-a-security-policy-rule.html
Question 189

An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.
Which security policy action causes this?
Explanation:
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manageconfigurationbackups/revert-firewall-configuration- changes.html
Question 190

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?
Explanation:
To enable DNS sinkholing for domain queries using DNS security, you must activate your DNS Security subscription, create (or modify) an Anti-Spyware policy to reference the DNS Security service, configure the log severity and policy settings for each DNS signature category, and then attach the profile to a security policy rule.
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/threat-prevention/dnssecurity/enable-dns-security
Question