Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks PCNSC - Palo Alto Networks Certified Network Security Consultant

Page: 2 / 2
Total 60 questions

Which of the following must be enabled to use Threat Prevention features such as Anti-Virus and Anti-Spyware on a firewall?

A.

Security Profiles

B.

WildFire Subscription

C.

URL Filtering

D.

GlobalProtect Subscription

Which license is required to use the Cortex XDR Managed Threat Hunting service?

A.

Cortex Data Lake license

B.

WildFire license

C.

Cortex XDR Pro per TB license

D.

Threat Prevention license

How can you enforce a security policy based on the device type?

A.

Use User-ID

B.

Use Device-ID

C.

Use App-ID

D.

Use Content-ID

Which CLI command is used to verify the high availability state of a Palo Alto Networks firewall?

A.

show high-availability state

B.

show ha state

C.

show ha status

D.

show high-availability status

Which GlobalProtect feature ensures that only trusted endpoints can connect to the network?

A.

Host Information Profile (HIP)

B.

App-ID

C.

User-ID

D.

SSL Decryption

Which of the following WildFire action settings will ensure that a malicious file is quarantined and prevented from spreading?

A.

Alert

B.

Allow

C.

Block

D.

Reset-Both

When creating a custom application signature, which field allows you to specify the layer 7 protocol details to match?

A.

Application ID

B.

Signature ID

C.

Pattern Match

D.

Protocol Decoder

How can you verify that a new security policy is correctly blocking traffic without disrupting the network?

A.

Enable logging on the rule and monitor the logs

B.

Disable all other rules temporarily

C.

Use the test security-policy-match CLI command

D.

Implement the policy in a lab environment first