ExamGecko

Palo Alto Networks PCNSA Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Given the scenario, which two statements are correct regarding multiple static default routes?

(Choose two.)

A.
Path monitoring does not determine if route is useable
A.
Path monitoring does not determine if route is useable
Answers
B.
Route with highest metric is actively used
B.
Route with highest metric is actively used
Answers
C.
Path monitoring determines if route is useable
C.
Path monitoring determines if route is useable
Answers
D.
Route with lowest metric is actively used
D.
Route with lowest metric is actively used
Answers
Suggested answer: C, D

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

A.
Exploitation
A.
Exploitation
Answers
B.
Installation
B.
Installation
Answers
C.
Reconnaissance
C.
Reconnaissance
Answers
D.
Act on Objective
D.
Act on Objective
Answers
Suggested answer: A

Which file is used to save the running configuration with a Palo Alto Networks firewall?

A.
running-config.xml
A.
running-config.xml
Answers
B.
run-config.xml
B.
run-config.xml
Answers
C.
running-configuration.xml
C.
running-configuration.xml
Answers
D.
run-configuratin.xml
D.
run-configuratin.xml
Answers
Suggested answer: A

In the example security policy shown, which two websites blocked? (Choose two.)

A.
LinkedIn
A.
LinkedIn
Answers
B.
Facebook
B.
Facebook
Answers
C.
YouTube
C.
YouTube
Answers
D.
Amazon
D.
Amazon
Answers
Suggested answer: A, B

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

A.
GlobalProtect
A.
GlobalProtect
Answers
B.
Panorama
B.
Panorama
Answers
C.
Aperture
C.
Aperture
Answers
D.
AutoFocus
D.
AutoFocus
Answers
Suggested answer: B, D

Which statement is true regarding a Prevention Posture Assessment?

A.
The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categories
A.
The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categories
Answers
B.
It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
B.
It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
Answers
C.
It provides a percentage of adoption for each assessment area
C.
It provides a percentage of adoption for each assessment area
Answers
D.
It performs over 200 security checks on Panorama/firewall for the assessment
D.
It performs over 200 security checks on Panorama/firewall for the assessment
Answers
Suggested answer: B

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

A.
User identification
A.
User identification
Answers
B.
Filtration protection
B.
Filtration protection
Answers
C.
Vulnerability protection
C.
Vulnerability protection
Answers
D.
Antivirus
D.
Antivirus
Answers
E.
Application identification
E.
Application identification
Answers
F.
Anti-spyware
F.
Anti-spyware
Answers
Suggested answer: A, C, D, E, F

The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn't want to unblock the gambling URL category.

Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)

A.
Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.
A.
Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.
Answers
B.
Manually remove powerball.com from the gambling URL category.
B.
Manually remove powerball.com from the gambling URL category.
Answers
C.
Add *.powerball.com to the allow list
C.
Add *.powerball.com to the allow list
Answers
D.
Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.
D.
Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.
Answers
Suggested answer: C, D

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

A.
Aperture
A.
Aperture
Answers
B.
AutoFocus
B.
AutoFocus
Answers
C.
Parisma SaaS
C.
Parisma SaaS
Answers
D.
GlobalProtect
D.
GlobalProtect
Answers
Suggested answer: C

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

A.
antivirus profile applied to outbound security policies
A.
antivirus profile applied to outbound security policies
Answers
B.
data filtering profile applied to inbound security policies
B.
data filtering profile applied to inbound security policies
Answers
C.
data filtering profile applied to outbound security policies
C.
data filtering profile applied to outbound security policies
Answers
D.
vulnerability profile applied to inbound security policies
D.
vulnerability profile applied to inbound security policies
Answers
Suggested answer: C
Total 362 questions
Go to page: of 37