ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 33

Question list
Search
Search

Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?

A.
Application Category
A.
Application Category
Answers
B.
Source
B.
Source
Answers
C.
File Size
C.
File Size
Answers
D.
Direction
D.
Direction
Answers
Suggested answer: D

Explanation:

A WildFire Analysis Profile allows you to specify which files or email links to forward for WildFire analysis based on the application, file type, and transmission direction (upload or download) of the traffic. The direction match criteria determines whether the file or email link was sent from the source zone to the destination zone (upload) or from the destination zone to the source zone (download). You can also select both directions to forward files or email links regardless of the direction of the traffic.Reference:Security Profile: Wildfire Analysis,Objects > Security Profiles > WildFire Analysis

What must first be created on the firewall for SAML authentication to be configured?

A.
Server Policy
A.
Server Policy
Answers
B.
Server Profile
B.
Server Profile
Answers
C.
Server Location
C.
Server Location
Answers
D.
Server Group
D.
Server Group
Answers
Suggested answer: B

Explanation:

A server profile identifies the external authentication service and instructs the firewall on how to connect to that authentication service and access the authentication credentials for your users. To configure SAML authentication, you must create a server profile and register the firewall and the identity provider (IdP) with each other. You can import a SAML metadata file from the IdP to automatically create a server profile and populate the connection, registration, and IdP certificate information.Reference:Configure SAML Authentication,Set Up SAML Authentication,Introduction to SAML

Which two options does the firewall use to dynamically populate address group members? (Choose two.)

A.
IP Addresses
A.
IP Addresses
Answers
B.
Tags
B.
Tags
Answers
C.
MAC Addresses
C.
MAC Addresses
Answers
D.
Tag-based filters
D.
Tag-based filters
Answers
Suggested answer: B, D

Explanation:

A dynamic address group populates its members dynamically using look ups for tags and tag-based filters. Tags are metadata elements or attribute-value pairs that are registered for each IP address. Tag-based filters use logical and and or operators to match the tags and determine the membership of the dynamic address group. For example, you can create a dynamic address group that includes all IP addresses that have the tags ''web-server'' and ''linux''. You can also use static tags as part of the filter criteria.Reference:Policy Object: Address Groups,Use Dynamic Address Groups in Policy,Statics vs. Dynamic Address Objects Groups

What two actions can be taken when implementing an exception to an External Dynamic List? (Choose two.)

A.
Exclude an IP address by making use of wildcards.
A.
Exclude an IP address by making use of wildcards.
Answers
B.
Exclude a URL entry by making use of regular expressions.
B.
Exclude a URL entry by making use of regular expressions.
Answers
C.
Exclude an IP address by making use of regular expressions.
C.
Exclude an IP address by making use of regular expressions.
Answers
D.
Exclude a URL entry by making use of wildcards.
D.
Exclude a URL entry by making use of wildcards.
Answers
Suggested answer: A, B

Which feature enables an administrator to review the Security policy rule base for unused rules?

A.
Security policy tags
A.
Security policy tags
Answers
B.
Test Policy Match
B.
Test Policy Match
Answers
C.
View Rulebase as Groups
C.
View Rulebase as Groups
Answers
D.
Policy Optimizer
D.
Policy Optimizer
Answers
Suggested answer: D

Explanation:

The Policy Optimizer feature enables an administrator to review the Security policy rule base for unused rules, unused applications, and shadowed rules. The Policy Optimizer provides information and recommendations to help optimize the Security policy rules and reduce the attack surface.The Policy Optimizer can also identify rules that can be converted to use App-ID instead of port-based criteria12.Reference:Policy Optimizer,Tips & Tricks: How to Identify Unused Policies on a Palo Alto Networks Device

An administrator should filter NGFW traffic logs by which attribute column to determine if the entry is for the start or end of the session?

A.
Receive Time
A.
Receive Time
Answers
B.
Type
B.
Type
Answers
C.
Destination
C.
Destination
Answers
D.
Source
D.
Source
Answers
Suggested answer: B

Explanation:

The Type attribute column in the NGFW traffic logs indicates whether the log entry is for the start or end of the session. The possible values are START, END, DROP, DENY, and INVALID. The START value means that the log entry is for the start of the session, and the END value means that the log entry is for the end of the session.The other values indicate that the session was terminated by the firewall for various reasons12.Reference:Traffic Log Fields,Session Log Best Practices


What is the default action for the SYN Flood option within the DoS Protection profile?

A.
Alert
A.
Alert
Answers
B.
Random Early Drop
B.
Random Early Drop
Answers
C.
Reset-client
C.
Reset-client
Answers
D.
Sinkhole
D.
Sinkhole
Answers
Suggested answer: B

Explanation:

Random Early Drop ---The firewall uses an algorithm to progressively start dropping that type of packet. If the attack continues, the higher the incoming cps rate (above the Activate Rate) gets, the more packets the firewall drops. .. (https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/zone-protection-and-dos-protection/dos-protection-against-flooding-of-new-sessions/configure-dos-protection-against-flooding-of-new-sessions)

Which Security policy set should be used to ensure that a policy is applied first?

A.
Child device-group pre-rulebase
A.
Child device-group pre-rulebase
Answers
B.
Shared pre-rulebase
B.
Shared pre-rulebase
Answers
C.
Parent device-group pre-rulebase
C.
Parent device-group pre-rulebase
Answers
D.
Local firewall policy
D.
Local firewall policy
Answers
Suggested answer: B

Explanation:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/panorama-web-interface/defining-policies-on-panorama

Which type of DNS signatures are used by the firewall to identify malicious and command-and-control domains?

A.
DNS Malicious signatures
A.
DNS Malicious signatures
Answers
B.
DNS Malware signatures
B.
DNS Malware signatures
Answers
C.
DNS Block signatures
C.
DNS Block signatures
Answers
D.
DNS Security signatures
D.
DNS Security signatures
Answers
Suggested answer: D

Explanation:

https://docs.paloaltonetworks.com/dns-security/administration/configure-dns-security/enable-dns-security#tabs-id066476b2-c4dd-4fc0-b7e4-f4ba32e19f60

Which three types of entries can be excluded from an external dynamic list (EDL)? (Choose three.)

A.
IP addresses
A.
IP addresses
Answers
B.
Domains
B.
Domains
Answers
C.
User-ID
C.
User-ID
Answers
D.
URLs
D.
URLs
Answers
E.
Applications
E.
Applications
Answers
Suggested answer: A, B, D

Explanation:

Three types of entries that can be excluded from an external dynamic list (EDL) are IP addresses, domains, and URLs. An EDL is a text file that is hosted on an external web server and contains a list of objects, such as IP addresses, URLs, domains, International Mobile Equipment Identities (IMEIs), or International Mobile Subscriber Identities (IMSIs) that the firewall can import and use in policy rules. You can exclude entries from an EDL to prevent the firewall from enforcing policy on those entries.For example, you can exclude benign domains that applications use for background traffic from Authentication policy1. To exclude entries from an EDL, you need to:

Select the EDL on the firewall and clickManual Exceptions.

Add the entries that you want to exclude in theManual Exceptionslist. The entries must match the type and format of the EDL. For example, if the EDL contains IP addresses, you can only exclude IP addresses.

ClickOKto save the changes. The firewall will not enforce policy on the excluded entries.

Total 362 questions
Go to page: of 37