Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks PCNSA - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Page: 4 / 11
Total 364 questions

An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)

A.

Packets sent/received

B.

IP Protocol

C.

Action

D.

Decrypted

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?

A.

Prisma SaaS

B.

Panorama

C.

AutoFocus

D.

GlobalProtect

Which three configuration settings are required on a Palo Alto networks firewall management interface?

A.

default gateway

B.

netmask

C.

IP address

D.

hostname

E.

auto-negotiation

After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.

Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

A.

Import named config snapshot

B.

Load named configuration snapshot

C.

Revert to running configuration

D.

Revert to last saved configuration

A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.

To which two types of traffic will the rule apply? (Choose two.)

A.

Within zone HR

B.

Within zone IT

C.

Between zone IT and zone HR

D.

Between zone IT and zone Finance

Which type security policy rule would match traffic flowing between the inside zone and outside zone within the inside zone and within the outside zone?

A.

global

B.

universal

C.

intrazone

D.

interzone

Which feature must be configured to enable a data plane interface to submit DNS queries originated from the firewall on behalf of the control plane?

A.

Service route

B.

Admin role profile

C.

DNS proxy

D.

Virtual router

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

A.

antivirus profile applied to outbound security policies

B.

data filtering profile applied to inbound security policies

C.

data filtering profile applied to outbound security policies

D.

vulnerability profile applied to inbound security policies

What is the default action for the SYN Flood option within the DoS Protection profile?

A.

Alert

B.

Random Early Drop

C.

Reset-client

D.

Sinkhole

An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny. What deny action will the firewall perform?

A.

Drop the traffic silently

B.

Perform the default deny action as defined in the App-ID database for the application

C.

Send a TCP reset packet to the client- and server-side devices

D.

Discard the session's packets and send a TCP reset packet to let the client know the session has been terminated