ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 28

Question list
Search
Search

In a File Blocking profile, which two actions should be taken to allow file types that support critical apps? (Choose two.)

A.
Clone and edit the Strict profile.
A.
Clone and edit the Strict profile.
Answers
B.
Use URL filtering to limit categories in which users can transfer files.
B.
Use URL filtering to limit categories in which users can transfer files.
Answers
C.
Set the action to Continue.
C.
Set the action to Continue.
Answers
D.
Edit the Strict profile.
D.
Edit the Strict profile.
Answers
Suggested answer: A, D

Where within the firewall GUI can all existing tags be viewed?

A.
Network > Tags
A.
Network > Tags
Answers
B.
Monitor > Tags
B.
Monitor > Tags
Answers
C.
Objects > Tags
C.
Objects > Tags
Answers
D.
Policies > Tags
D.
Policies > Tags
Answers
Suggested answer: C

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

A.
Anti-Spyware
A.
Anti-Spyware
Answers
B.
Antivirus
B.
Antivirus
Answers
C.
Vulnerability Protection
C.
Vulnerability Protection
Answers
D.
URL Filtering
D.
URL Filtering
Answers
Suggested answer: D

Which Security profile would you apply to identify infected hosts on the protected network uwall user database?

A.
Anti-spyware
A.
Anti-spyware
Answers
B.
Vulnerability protection
B.
Vulnerability protection
Answers
C.
URL filtering
C.
URL filtering
Answers
D.
Antivirus
D.
Antivirus
Answers
Suggested answer: A

What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?

A.
Increase the backup capacity for configuration backups per firewall
A.
Increase the backup capacity for configuration backups per firewall
Answers
B.
Increase the per-firewall capacity for address and service objects
B.
Increase the per-firewall capacity for address and service objects
Answers
C.
Reduce the configuration and session synchronization time between HA pairs
C.
Reduce the configuration and session synchronization time between HA pairs
Answers
D.
Reduce the number of objects pushed to a firewall
D.
Reduce the number of objects pushed to a firewall
Answers
Suggested answer: D

The NetSec Manager asked to create a new firewall Local Administrator profile with customized privileges named NewAdmin. This new administrator has to authenticate without inserting any username or password to access the WebUI.

What steps should the administrator follow to create the New_Admin Administrator profile?

A.
1. Select the "Use only client certificate authentication" check box.
A.
1. Select the "Use only client certificate authentication" check box.
Answers
B.
Set Role to Role Based.
B.
Set Role to Role Based.
Answers
C.
Issue to the Client a Certificate with Common Name = NewAdmin
C.
Issue to the Client a Certificate with Common Name = NewAdmin
Answers
D.
1. Select the "Use only client certificate authentication" check box.
D.
1. Select the "Use only client certificate authentication" check box.
Answers
E.
Set Role to Dynamic.
E.
Set Role to Dynamic.
Answers
F.
Issue to the Client a Certificate with Certificate Name = NewAdmin
F.
Issue to the Client a Certificate with Certificate Name = NewAdmin
Answers
G.
1. Set the Authentication profile to Local.
G.
1. Set the Authentication profile to Local.
Answers
H.
Select the "Use only client certificate authentication" check box.
H.
Select the "Use only client certificate authentication" check box.
Answers
I.
Set Role to Role Based.
I.
Set Role to Role Based.
Answers
J.
1. Select the "Use only client certificate authentication" check box.
J.
1. Select the "Use only client certificate authentication" check box.
Answers
K.
Set Role to Dynamic.
K.
Set Role to Dynamic.
Answers
L.
Issue to the Client a Certificate with Common Name = New Admin
L.
Issue to the Client a Certificate with Common Name = New Admin
Answers
Suggested answer: B

Why does a company need an Antivirus profile?

A.
To prevent command-and-control traffic
A.
To prevent command-and-control traffic
Answers
B.
To protect against viruses, worms, and trojans
B.
To protect against viruses, worms, and trojans
Answers
C.
To prevent known exploits
C.
To prevent known exploits
Answers
D.
To prevent access to malicious web content
D.
To prevent access to malicious web content
Answers
Suggested answer: B

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

A.
Data redistribution
A.
Data redistribution
Answers
B.
Dynamic updates
B.
Dynamic updates
Answers
C.
SNMP setup
C.
SNMP setup
Answers
D.
Service route
D.
Service route
Answers
Suggested answer: D

An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list. What is the maximum number of entries that they can be exclude?

A.
50
A.
50
Answers
B.
100
B.
100
Answers
C.
200
C.
200
Answers
D.
1,000
D.
1,000
Answers
Suggested answer: B

To what must an interface be assigned before it can process traffic?

A.
Security Zone
A.
Security Zone
Answers
B.
Security policy
B.
Security policy
Answers
C.
Security Protection
C.
Security Protection
Answers
D.
Security profile
D.
Security profile
Answers
Suggested answer: A
Total 362 questions
Go to page: of 37