Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks PCNSA - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Page: 8 / 11
Total 364 questions

Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?

A.

Panorama > Device Deployment > Dynamic Updates > Schedules > Add

B.

Panorama > Device Deployment > Content Updates > Schedules > Add

C.

Panorama > Dynamic Updates > Device Deployment > Schedules > Add

D.

Panorama > Content Updates > Device Deployment > Schedules > Add

What are the two main reasons a custom application is created? (Choose two.)

A.

To correctly identify an internal application in the traffic log

B.

To change the default categorization of an application

C.

To visually group similar applications

D.

To reduce unidentified traffic on a network

Which User Credential Detection method should be applied within a URL Filtering Security profile to check for the submission of a valid corporate username and the associated password?

A.

Domain Credential

B.

IP User

C.

Group Mapping

D.

Valid Username Detected Log Severity

An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range.

Which steps should the administrator take?

A.

Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.

B.

Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.

C.

Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.

D.

Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.

An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.

Which Security profile should be used?

A.

Antivirus

B.

URL filtering

C.

Anti-spyware

D.

Vulnerability protection

An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.

What type of Security policy rule is created?

A.

Tagged

B.

Intrazone

C.

Universal

D.

Interzone

What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?

A.

Increase the backup capacity for configuration backups per firewall

B.

Increase the per-firewall capacity for address and service objects

C.

Reduce the configuration and session synchronization time between HA pairs

D.

Reduce the number of objects pushed to a firewall

Match the Palo Alto Networks Security Operating Platform architecture to its description.

What are three factors that can be used in domain generation algorithms? (Choose three.)

A.

cryptographic keys

B.

time of day

C.

other unique values

D.

URL custom categories

E.

IP address

Which prevention technique will prevent attacks based on packet count?

A.

zone protection profile

B.

URL filtering profile

C.

antivirus profile

D.

vulnerability profile