Which two types of profiles are needed to create an authentication sequence? (Choose two.)
Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website
How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication Sequence SYS01," and the authentication sequence SYS01 has a profile list with four authentication profiles:
• Auth Profile LDAP
• Auth Profile Radius
• Auth Profile Local
• Auth Profile TACACS
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable but has lost the "SYS01 Admin" username and password.
What is the "SYS01 Admin" login capability after the outage?
Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.
What is the quickest way to reset the hit counter to zero in all the security policy rules?
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?
An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule, which is set to default configuration.
What should the administrator do?
An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.
What type of Security policy rule is created?
What is a recommended consideration when deploying content updates to the firewall from Panorama?
Which definition describes the guiding principle of the zero-trust architecture?
You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?
What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?
A website is unexpectedly allowed due to miscategorization.
What are two way-s to resolve this issue for a proper response? (Choose two.)
What must be considered with regards to content updates deployed from Panorama?
An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"
Which security policy action causes this?
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the laptop.
Which security profile feature could have been used to prevent the communication with the CnC server?
Why should a company have a File Blocking profile that is attached to a Security policy?
Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.
Complete the security policy to ensure only Telnet is allowed.
Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and action = Allow
Which three types of Source NAT are available to users inside a NGFW? (Choose three.)
Which attribute can a dynamic address group use as a filtering condition to determine its membership?
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
Which policy set should be used to ensure that a policy is applied just before the default security rules?
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic
Which statement accurately describes how the firewall will apply an action to matching traffic?
Arrange the correct order that the URL classifications are processed within the system.
Which license is required to use the Palo Alto Networks built-in IP address EDLs?
Review the Screenshot:
Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the
SERVER zone to the DMZ on SSH only.
Which rule group enables the required traffic?
A)
B)
C)
D)
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?
In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)
Which action results in the firewall blocking network traffic with out notifying the sender?
What action will inform end users when their access to Internet content is being restricted?
During the packet flow process, which two processes are performed in application identification? (Choose two.)
Which Security profile can you apply to protect against malware such as worms and Trojans?
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)
In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)
During the App-ID update process, what should you click on to confirm whether an existing policy rule is affected by an App-ID update?
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?
An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240 addresses and found that connections from addresses that needed new translations were being dropped.
Which type of NAT was configured?
Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?
How many zones can an interface be assigned with a Palo Alto Networks firewall?
An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall handle the traffic?
Which rule type is appropriate for matching traffic occurring within a specified zone?
What are the two default behaviors for the intrazone-default policy? (Choose two.)
Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)
An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones.
Which Security policy rule type should they use?
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.
Which configuration action should the administrator take when creating the address object?
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
An administrator is configuring a NAT rule
At a minimum, which three forms of information are required? (Choose three.)
Which setting is available to edit when a tag is created on the local firewall?
An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.
Which security policy action causes this?
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?
A)
B)
C)
D)
Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
Files are sent to the WildFire cloud service via the WildFire Analysis Profile. How are these files used?
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)
Which Security policy set should be used to ensure that a policy is applied first?
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
A)
B)
C)
D)
Which action would an administrator take to ensure that a service object will be available only to the selected device group?
You receive notification about new malware that infects hosts through malicious files transferred by FTP.
Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)
The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data.
Which Security profile feature could have been used to prevent the communications with the command-and-control server?
Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?
What are three Palo Alto Networks best practices when implementing the DNS Security Service? (Choose three.)
A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.
To which two types of traffic will the rule apply? (Choose two.)
Given the detailed log information above, what was the result of the firewall traffic inspection?
After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?
Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.
What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?
When HTTPS for management and GlobalProtect are enabled on the same interface, which TCP port is used for management access?
An internal host wants to connect to servers of the internet through using source NAT.
Which policy is required to enable source NAT on the firewall?
Based on the show security policy rule would match all FTP traffic from the inside zone to the outside zone?
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?
All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.
Complete the empty field in the Security policy using an application object to permit only this type of access.
Source Zone: Internal -
Destination Zone: DMZ Zone -
Application: __________
Service: application-default -
Action: allow
Which CLI command will help confirm if FQDN objects are resolved in the event there is a shadow rule?
Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?
Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?
Network Security Administrator | PCNSA Questions Answers | PCNSA Test Prep | Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Questions PDF | PCNSA Online Exam | PCNSA Practice Test | PCNSA PDF | PCNSA Test Questions | PCNSA Study Material | PCNSA Exam Preparation | PCNSA Valid Dumps | PCNSA Real Questions | Network Security Administrator PCNSA Exam Questions