ExamGecko
Ask Question

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 5

Question list
Search

List of questions

Search

Related questions











Question 41

Report
Export
Collapse

Given the scenario, which two statements are correct regarding multiple static default routes?

(Choose two.)

Palo Alto Networks PCNSA image Question 41 53856 09232024001155000000

Path monitoring does not determine if route is useable
Path monitoring does not determine if route is useable
Route with highest metric is actively used
Route with highest metric is actively used
Path monitoring determines if route is useable
Path monitoring determines if route is useable
Route with lowest metric is actively used
Route with lowest metric is actively used
Suggested answer: C, D
asked 23/09/2024
nir avron
38 questions

Question 42

Report
Export
Collapse

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

Palo Alto Networks PCNSA image Question 42 53857 09232024001155000000

Exploitation
Exploitation
Installation
Installation
Reconnaissance
Reconnaissance
Act on Objective
Act on Objective
Suggested answer: A
asked 23/09/2024
Franckline Dormeus
44 questions

Question 43

Report
Export
Collapse

Which file is used to save the running configuration with a Palo Alto Networks firewall?

running-config.xml
running-config.xml
run-config.xml
run-config.xml
running-configuration.xml
running-configuration.xml
run-configuratin.xml
run-configuratin.xml
Suggested answer: A
asked 23/09/2024
abdirashid ahmed
31 questions

Question 44

Report
Export
Collapse

In the example security policy shown, which two websites blocked? (Choose two.)

Palo Alto Networks PCNSA image Question 44 53859 09232024001155000000

LinkedIn
LinkedIn
Facebook
Facebook
YouTube
YouTube
Amazon
Amazon
Suggested answer: A, B
asked 23/09/2024
Filippo Bertuzzi
26 questions

Question 45

Report
Export
Collapse

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

GlobalProtect
GlobalProtect
Panorama
Panorama
Aperture
Aperture
AutoFocus
AutoFocus
Suggested answer: B, D
asked 23/09/2024
Praveen Achankunju
44 questions

Question 46

Report
Export
Collapse

Which statement is true regarding a Prevention Posture Assessment?

The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categories
The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categories
It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
It provides a percentage of adoption for each assessment area
It provides a percentage of adoption for each assessment area
It performs over 200 security checks on Panorama/firewall for the assessment
It performs over 200 security checks on Panorama/firewall for the assessment
Suggested answer: B
asked 23/09/2024
Bates, Michael
36 questions

Question 47

Report
Export
Collapse

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

User identification
User identification
Filtration protection
Filtration protection
Vulnerability protection
Vulnerability protection
Antivirus
Antivirus
Application identification
Application identification
Anti-spyware
Anti-spyware
Suggested answer: A, C, D, E, F
asked 23/09/2024
Shameez Mohammed
37 questions

Question 48

Report
Export
Collapse

The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn't want to unblock the gambling URL category.

Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)

Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.
Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.
Manually remove powerball.com from the gambling URL category.
Manually remove powerball.com from the gambling URL category.
Add *.powerball.com to the allow list
Add *.powerball.com to the allow list
Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.
Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.
Suggested answer: C, D
asked 23/09/2024
Clive Roberts
47 questions

Question 49

Report
Export
Collapse

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

Aperture
Aperture
AutoFocus
AutoFocus
Parisma SaaS
Parisma SaaS
GlobalProtect
GlobalProtect
Suggested answer: C
asked 23/09/2024
Andrey Baturov
39 questions

Question 50

Report
Export
Collapse

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

antivirus profile applied to outbound security policies
antivirus profile applied to outbound security policies
data filtering profile applied to inbound security policies
data filtering profile applied to inbound security policies
data filtering profile applied to outbound security policies
data filtering profile applied to outbound security policies
vulnerability profile applied to inbound security policies
vulnerability profile applied to inbound security policies
Suggested answer: C
asked 23/09/2024
Nicholas Roy
43 questions
Total 362 questions
Go to page: of 37