Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 20

List of questions
Question 191

Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and risky websites?
Question 192

What are three factors that can be used in domain generation algorithms? (Choose three.)
Question 193

Which action would an administrator take to ensure that a service object will be available only to the selected device group?
Question 194

If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
Question 195

Which administrative management services can be configured to access a management interface?
Question 196

Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?
Question 197

Which attribute can a dynamic address group use as a filtering condition to determine its membership?
Question 198

View the diagram.
What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?
Question 199

An administrator needs to add capability to perform real-time signature lookups to block or sinkhole all known malware domains.
Which type of single unified engine will get this result?
Question 200

Which solution is a viable option to capture user identification when Active Directory is not in use?
Question