ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 27

Question list
Search
Search

Selecting the option to revert firewall changes will replace what settings?

A.
The running configuration with settings from the candidate configuration
A.
The running configuration with settings from the candidate configuration
Answers
B.
The candidate configuration with settings from the running configuration
B.
The candidate configuration with settings from the running configuration
Answers
C.
The device state with settings from another configuration
C.
The device state with settings from another configuration
Answers
D.
Dynamic update scheduler settings
D.
Dynamic update scheduler settings
Answers
Suggested answer: A

What can be used as match criteria for creating a dynamic address group?

A.
Usernames
A.
Usernames
Answers
B.
IP addresses
B.
IP addresses
Answers
C.
Tags
C.
Tags
Answers
D.
MAC addresses
D.
MAC addresses
Answers
Suggested answer: C

An administrator needs to allow users to use only certain email applications.

How should the administrator configure the firewall to restrict users to specific email applications?

A.
Create an application filter and filter it on the collaboration category, email subcategory.
A.
Create an application filter and filter it on the collaboration category, email subcategory.
Answers
B.
Create an application group and add the email applications to it.
B.
Create an application group and add the email applications to it.
Answers
C.
Create an application filter and filter it on the collaboration category.
C.
Create an application filter and filter it on the collaboration category.
Answers
D.
Create an application group and add the email category to it.
D.
Create an application group and add the email category to it.
Answers
Suggested answer: B

An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range.

Which steps should the administrator take?

A.
Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.
A.
Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.
Answers
B.
Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.
B.
Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.
Answers
C.
Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.
C.
Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.
Answers
D.
Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.
D.
Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.
Answers
Suggested answer: D

An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save the changes, but the OK button is grayed out.

What are two possible reasons the OK button is grayed out? (Choose two.)

A.
The entry contains wildcards.
A.
The entry contains wildcards.
Answers
B.
The entry is duplicated.
B.
The entry is duplicated.
Answers
C.
The entry doesn't match a list entry.
C.
The entry doesn't match a list entry.
Answers
D.
The entry matches a list entry.
D.
The entry matches a list entry.
Answers
Suggested answer: B, C

An administrator is updating Security policy to align with best practices.

Which Policy Optimizer feature is shown in the screenshot below?

A.
Rules without App Controls
A.
Rules without App Controls
Answers
B.
New App Viewer
B.
New App Viewer
Answers
C.
Rule Usage
C.
Rule Usage
Answers
D.
Unused Unused Apps
D.
Unused Unused Apps
Answers
Suggested answer: C

By default, which action is assigned to the interzone-default rule?

A.
Reset-client
A.
Reset-client
Answers
B.
Reset-server
B.
Reset-server
Answers
C.
Deny
C.
Deny
Answers
D.
Allow
D.
Allow
Answers
Suggested answer: C

Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)

A.
Post-NAT address
A.
Post-NAT address
Answers
B.
Post-NAT zone
B.
Post-NAT zone
Answers
C.
Pre-NAT zone
C.
Pre-NAT zone
Answers
D.
Pre-NAT address
D.
Pre-NAT address
Answers
Suggested answer: B, D

What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)

A.
Blometric scanning results from iOS devices
A.
Blometric scanning results from iOS devices
Answers
B.
Firewall logs
B.
Firewall logs
Answers
C.
Custom API scripts
C.
Custom API scripts
Answers
D.
Security Information and Event Management Systems (SIEMS), such as Splun
D.
Security Information and Event Management Systems (SIEMS), such as Splun
Answers
E.
DNS Security service
E.
DNS Security service
Answers
Suggested answer: B, C, E

What is the maximum volume of concurrent administrative account sessions?

A.
Unlimited
A.
Unlimited
Answers
B.
2
B.
2
Answers
C.
10
C.
10
Answers
D.
1
D.
1
Answers
Suggested answer: C
Total 362 questions
Go to page: of 37