ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 31

Question list
Search
Search

Which two addresses should be reserved to enable DNS sinkholing? (Choose two.)

A.
IPv6
A.
IPv6
Answers
B.
Email
B.
Email
Answers
C.
IPv4
C.
IPv4
Answers
D.
MAC
D.
MAC
Answers
Suggested answer: A, C

Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0

Which action can be performed when grouping rules by group tags?

A.
Delete Tagged Rule(s)
A.
Delete Tagged Rule(s)
Answers
B.
Edit Selected Rule(s)
B.
Edit Selected Rule(s)
Answers
C.
Apply Tag to the Selected Rule(s)
C.
Apply Tag to the Selected Rule(s)
Answers
D.
Tag Selected Rule(s)
D.
Tag Selected Rule(s)
Answers
Suggested answer: D

Explanation:

When grouping rules by group tags, the action that can be performed is to tag selected rule(s). This action allows you to assign one or more tags to the selected rules, which will group them together and display them under the corresponding tag group.You can use tags to organize and visually distinguish your rules based on different criteria, such as function, location, or priority1.Reference:View Rules by Tag Group,Use Tags to Group and Visually Distinguish Objects,Certifications - Palo Alto Networks,Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].

Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?

A.
Objects > Dynamic Updates > Review App-IDs
A.
Objects > Dynamic Updates > Review App-IDs
Answers
B.
Device > Dynamic Updates > Review Policies
B.
Device > Dynamic Updates > Review Policies
Answers
C.
Device > Dynamic Updates > Review App-IDs
C.
Device > Dynamic Updates > Review App-IDs
Answers
D.
Objects > Dynamic Updates > Review Policies
D.
Objects > Dynamic Updates > Review Policies
Answers
Suggested answer: C

Explanation:

To see how new and modified App-IDs impact your Security policy, you need to follow the path Device > Dynamic Updates > Review App-IDs on PAN-OS 11.x. This option allows you to perform a content update policy review for both downloaded and installed content. You can view the list of new and modified App-IDs and their descriptions, and see which Security policy rules are affected by them.You can also modify the rules or create new ones to adjust your Security policy as needed1.Reference:See How New and Modified App-IDs Impact Your Security Policy,Updated Certifications for PAN-OS 10.1,Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].

An administrator wants to enable access to www.paloaltonetworks.com while denying access to all other sites in the same category.

Which object should the administrator create to use as a match condition for the security policy rule that allows access to www.paloaltonetworks.com?

A.
Application group
A.
Application group
Answers
B.
Address ab
B.
Address ab
Answers
C.
URL category
C.
URL category
Answers
D.
Service
D.
Service
Answers
Suggested answer: C

Explanation:

A URL category object is the object that the administrator should create to use as a match condition for the security policy rule that allows access to www.paloaltonetworks.com while denying access to all other sites in the same category. A URL category object allows the administrator to define a custom list of URLs that belong to a specific category, such as Business and Economy.The administrator can then use this object in a security policy rule to allow or deny access to the URLs based on the category1. For example, the administrator can create a URL category object that contains www.paloaltonetworks.com and assign it to the Business and Economy category.Then, the administrator can create a security policy rule that allows access to this URL category object and denies access to the predefined Business and Economy category2.Reference:Create a Custom URL Category,Create a Security Policy Rule to Allow or Deny Access to a Custom URL Category,Certifications - Palo Alto Networks,Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].

Where does a user assign a tag group to a policy rule in the policy creation window?

A.
Application tab
A.
Application tab
Answers
B.
General tab
B.
General tab
Answers
C.
Actions tab
C.
Actions tab
Answers
D.
Usage tab
D.
Usage tab
Answers
Suggested answer: B

Explanation:

A user can assign a tag group to a policy rule in the policy creation window by selecting the General tab. A tag group is a collection of tags that can be used to identify and filter policy rules based on different criteria, such as function, location, or priority.A user can create a tag group on Panorama and assign it to a policy rule to apply the same set of tags to multiple firewalls or device groups1. To assign a tag group to a policy rule, the user needs to:

Select the General tab in the policy creation window.

Click the Tag Group drop-down menu and select the tag group that the user wants to assign to the policy rule.

Click OK to save the changes. The policy rule will inherit the tags from the tag group and display them in the Tag column.

Which policy set should be used to ensure that a policy is applied just before the default security rules?

A.
Parent device-group post-rulebase
A.
Parent device-group post-rulebase
Answers
B.
Child device-group post-rulebase
B.
Child device-group post-rulebase
Answers
C.
Local Firewall policy
C.
Local Firewall policy
Answers
D.
Shared post-rulebase
D.
Shared post-rulebase
Answers
Suggested answer: D

Explanation:

The policy set that should be used to ensure that a policy is applied just before the default security rules is the shared post-rulebase. The shared post-rulebase is a set of Security policy rules that are defined on Panorama and apply to all firewalls or device groups. The shared post-rulebase is evaluated after the local firewall policy and the child device-group post-rulebase, but before the default security rules.The shared post-rulebase can be used to enforce common security policies across multiple firewalls or device groups, such as blocking high-risk applications or traffic1.Reference:Security Policy Rule Hierarchy,Security Policy Rulebase,Certifications - Palo Alto Networks,Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].

In which two types of NAT can oversubscription be used? (Choose two.)

A.
Static IP
A.
Static IP
Answers
B.
Destination NAT
B.
Destination NAT
Answers
C.
Dynamic IP and Port (DIPP)
C.
Dynamic IP and Port (DIPP)
Answers
D.
Dynamic IP
D.
Dynamic IP
Answers
Suggested answer: C, D

Explanation:

Oversubscription is a feature that allows you to use more private IP addresses than public IP addresses for NAT. This means that multiple private IP addresses can share the same public IP address, as long as they use different ports. Oversubscription can be used in two types of NAT: Dynamic IP and Port (DIPP) and Dynamic IP. DIPP NAT translates both the source IP address and the source port number of the outgoing packets, and can have an oversubscription rate greater than 1. Dynamic IP NAT translates only the source IP address of the outgoing packets, and can have an oversubscription rate of 1 or less. Static IP and Destination NAT do not support oversubscription, as they require a one-to-one mapping between the private and public IP addresses.Reference:Source NAT,Configure NAT,NAT

Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?

A.
Objects > Schedules
A.
Objects > Schedules
Answers
B.
Policies > Policy Optimizer
B.
Policies > Policy Optimizer
Answers
C.
Monitor > Packet Capture
C.
Monitor > Packet Capture
Answers
D.
Monitor > Reports
D.
Monitor > Reports
Answers
Suggested answer: B

Explanation:

The Policy Optimizer is a feature in the PAN-OS GUI that allows an administrator to monitor the rule usage for a specified period of time, as well as optimize the security policies based on the traffic logs and recommendations. The Policy Optimizer can help the administrator to improve the security posture, reduce the attack surface, and simplify the policy management. The Policy Optimizer can be accessed from Policies > Policy Optimizer in the PAN-OS GUI.Reference:Policy Optimizer,View Policy Rule Usage,Updated Certifications for PAN-OS 10.1

Which security profile should be used to classify malicious web content?

A.
URL Filtering
A.
URL Filtering
Answers
B.
Antivirus
B.
Antivirus
Answers
C.
Web Content
C.
Web Content
Answers
D.
Vulnerability Protection
D.
Vulnerability Protection
Answers
Suggested answer: A

Explanation:

URL Filtering is a security profile that allows you to classify web content based on the URL category and reputation of the website. URL Filtering can help you block access to malicious web content, such as phishing, malware, or command and control sites, as well as enforce acceptable use policies for web browsing. URL Filtering uses the PAN-DB cloud service to provide up-to-date information on the URL categories and reputations of millions of websites. You can configure URL Filtering policies to allow, block, alert, continue, or override web requests based on the URL category and reputation, as well as customize the response pages and exceptions for different user groups.Reference:URL Filtering,Set Up a Basic Security Policy,Updated Certifications for PAN-OS 10.1

In order to attach an Antivirus, Anti-Spyware and Vulnerability Protection security profile to your Security Policy rules, which setting must be selected?

A.
Policies > Security > Actions Tab > Select Group-Profiles as Profile Type
A.
Policies > Security > Actions Tab > Select Group-Profiles as Profile Type
Answers
B.
Policies > Security > Actions Tab > Select Default-Profiles as Profile Type
B.
Policies > Security > Actions Tab > Select Default-Profiles as Profile Type
Answers
C.
Policies > Security > Actions Tab > Select Profiles as Profile Type
C.
Policies > Security > Actions Tab > Select Profiles as Profile Type
Answers
D.
Policies > Security > Actions Tab > Select Tagged-Profiles as Profile Type
D.
Policies > Security > Actions Tab > Select Tagged-Profiles as Profile Type
Answers
Suggested answer: C

Explanation:

To enable the firewall to scan the traffic that it allows based on a Security policy rule, you must also attach Security Profiles ---including URL Filtering, Antivirus, Anti-Spyware, File Blocking, and WildFire Analysis---to each rule. To attach a Security Profile to a Security policy rule, you must select Profiles as the Profile Type in the Actions tab of the rule. This allows you to choose from the predefined or custom Security Profiles that you have configured. Group-Profiles, Default-Profiles, and Tagged-Profiles are not valid options for attaching Security Profiles to Security policy rules.Reference:Set Up a Basic Security Policy,Security Profiles,Updated Certifications for PAN-OS 10.1

Total 362 questions
Go to page: of 37