Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks PCNSA - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Page: 3 / 11
Total 364 questions

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

A.

Policies

B.

Network

C.

Objects

D.

Device

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application

Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

A.

Data Filtering Profile applied to outbound Security policy rules

B.

Antivirus Profile applied to outbound Security policy rules

C.

Data Filtering Profile applied to inbound Security policy rules

D.

Vulnerability Profile applied to inbound Security policy rules

What is the main function of Policy Optimizer?

A.

reduce load on the management plane by highlighting combinable security rules

B.

migrate other firewall vendors’ security rules to Palo Alto Networks configuration

C.

eliminate “Log at Session Start” security rules

D.

convert port-based security rules to application-based security rules

You need to allow users to access the office–suite application of their choice. How should you configure the firewall to allow access to any office-suite application?

A.

Create an Application Group and add Office 365, Evernote Google Docs and Libre Office

B.

Create an Application Group and add business-systems to it.

C.

Create an Application Filter and name it Office Programs, then filter it on the office programs subcategory.

D.

Create an Application Filter and name it Office Programs then filter on the business-systems category.

An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.

Which configuration action should the administrator take when creating the address object?

A.

Ensure that the Shared option is checked.

B.

Ensure that the Shared option is cleared.

C.

Ensure that Disable Override is cleared.

D.

Tag the address object with the Global tag.

What is used to monitor Security policy applications and usage?

A.

Policy Optimizer

B.

App-ID

C.

Security profile

D.

Policy-based forwarding

What is an advantage for using application tags?

A.

They are helpful during the creation of new zones

B.

They help with the design of IP address allocations in DHCP.

C.

They help content updates automate policy updates

D.

They help with the creation of interfaces

Where does a user assign a tag group to a policy rule in the policy creation window?

A.

Application tab

B.

General tab

C.

Actions tab

D.

Usage tab

Which Security profile should be applied in order to protect against illegal code execution?

A.

Vulnerability Protection profile on allowed traffic

B.

Antivirus profile on allowed traffic

C.

Antivirus profile on denied traffic

D.

Vulnerability Protection profile on denied traffic

What is the main function of the Test Policy Match function?

A.

verify that policy rules from Expedition are valid

B.

confirm that rules meet or exceed the Best Practice Assessment recommendations

C.

confirm that policy rules in the configuration are allowing/denying the correct traffic

D.

ensure that policy rules are not shadowing other policy rules