Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCNSA - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Page: 10 / 11
Total 364 questions

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

A.

GlobalProtect

B.

Panorama

C.

Aperture

D.

AutoFocus

What must be configured before setting up Credential Phishing Prevention?

A.

Anti Phishing Block Page

B.

Threat Prevention

C.

Anti Phishing profiles

D.

User-ID

Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on the Objective

Which information is included in device state other than the local configuration?

A.

uncommitted changes

B.

audit logs to provide information of administrative account changes

C.

system logs to provide information of PAN-OS changes

D.

device group and template settings pushed from Panorama

Which type of address object is "10 5 1 1/0 127 248 2"?

A.

IP subnet

B.

IP wildcard mask

C.

IP netmask

D.

IP range

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

A.

block

B.

sinkhole

C.

alert

D.

allow

Which component is a building block in a Security policy rule?

A.

decryption profile

B.

destination interface

C.

timeout (min)

D.

application

Review the Screenshot:

Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the

SERVER zone to the DMZ on SSH only.

Which rule group enables the required traffic?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What are two valid selections within an Antivirus profile? (Choose two.)

A.

deny

B.

drop

C.

default

D.

block-ip

Access to which feature requires PAN-OS Filtering licens?

A.

PAN-DB database

B.

URL external dynamic lists

C.

Custom URL categories

D.

DNS Security