ExamGecko
Ask Question

PCNSC: Palo Alto Networks Certified Network Security Consultant

Exam Questions:
60
 Learners
  2.370
Last Updated
April - 2025
Language
English
2 Quizzes
PDF | VPLUS
This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.
Palo Alto Networks PCNSC Practice Tests

Related questions

An existing customer who has deployed several Palo Alto Networks Next-Generation Firewalls would like to start using Device-ID to obtain policy rule recommendations They have also purchased a Support license, a Threat license a URL Filtering license, and a WildFire license for each firewall

What additional license do they need to purchase'?

Become a Premium Member for full access
  Unlock Premium Member

A customer is adding a new site-to-site tunnel from a Palo Alto Networks NGFW to a third party with a policy based VPN peer After the initial configuration is completed and the changes are committed, phase 2 fails to establish

Which two changes may be required to fix the issue? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Which of the following WildFire action settings will ensure that a malicious file is quarantined and prevented from spreading?

Become a Premium Member for full access
  Unlock Premium Member

How can you verify that a new security policy is correctly blocking traffic without disrupting the network?

Become a Premium Member for full access
  Unlock Premium Member

A customer's Palo Alto Networks NGFW currently has only one security policy allowing all traffic They have identified that this is a substantial security risk and have heard that the Expedition tool can help them extract security policies from an 'allow any' rule

What should the consultant say about Expedition?

Expedition cannot parse log files and therefore cannot be used for this purpose
Expedition cannot parse log files and therefore cannot be used for this purpose
By using the Machine Learning feature Expedition can parse the traffic log files related to the polcy and extract security rules for matching traffic
By using the Machine Learning feature Expedition can parse the traffic log files related to the polcy and extract security rules for matching traffic
Live firewall traffic can be viewed on Expedition when connected to a firewall, and Expedition can automatically create and push policies to the firewall
Live firewall traffic can be viewed on Expedition when connected to a firewall, and Expedition can automatically create and push policies to the firewall
The log files can be viewed on Expedition, and right-clicking a log entry gives the option to create security policy from the log entry.
The log files can be viewed on Expedition, and right-clicking a log entry gives the option to create security policy from the log entry.
Suggested answer: B
Explanation:

The Expedition tool can help the customer extract security policies from an 'allow any' rule by using its Machine Learning feature:

B . By using the Machine Learning feature, Expedition can parse the traffic log files related to the policy and extract security rules for matching traffic

Expedition can analyze traffic log files and apply machine learning algorithms to suggest security policies that match the observed traffic patterns. This helps in creating a more secure and granular policy set from a broad 'allow any' rule.

Palo Alto Networks - Expedition Documentation: https://live.paloaltonetworks.com/t5/expedition-migration-tool/ct-p/migration_tool

Palo Alto Networks - Using Machine Learning in Expedition: https://live.paloaltonetworks.com/t5/expedition-articles/expedition-machine-learning-overview/ta-p/260401

asked 23/09/2024
Petros Kapouleas
51 questions

What is the maximum number of virtual systems supported by a Palo Alto Networks VM-300 firewall?

Become a Premium Member for full access
  Unlock Premium Member

Which firewall interface type allows you to non-disruptively monitor traffic coming from a port operating in promiscuous mode?

Become a Premium Member for full access
  Unlock Premium Member

Which touting configuration should you recommend lo a customer who wishes lo actively use multiple pathways to the same destination?

Become a Premium Member for full access
  Unlock Premium Member

In an HA (High Availability) setup, what is the purpose of the HA3 link?

Become a Premium Member for full access
  Unlock Premium Member

Which of the following is NOT a benefit of using App-ID?

Become a Premium Member for full access
  Unlock Premium Member