Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Paloalto Networks PCNSA Dumps

Page: 1 / 36
Total 362 questions

Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Questions and Answers

Question 1

Actions can be set for which two items in a URL filtering security profile? (Choose two.)

Options:

A.

Block List

B.

Custom URL Categories

C.

PAN-DB URL Categories

D.

Allow List

Question 2

URL categories can be used as match criteria on which two policy types? (Choose two.)

Options:

A.

authentication

B.

decryption

C application override

C.

NAT

Question 3

Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?

Options:

A.

Root

B.

Dynamic

C.

Role-based

D.

Superuser

Question 4

What are two valid selections within an Antivirus profile? (Choose two.)

Options:

A.

deny

B.

drop

C.

default

D.

block-ip

Question 5

Which System log severity level would be displayed as a result of a user password change?

Options:

A.

High

B.

Critical

C.

Medium

D.

Low

Question 6

Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?

Options:

A.

intrazone

B.

interzone

C.

universal

D.

global

Question 7

What are three Palo Alto Networks best practices when implementing the DNS Security Service? (Choose three.)

Options:

A.

Implement a threat intel program.

B.

Configure a URL Filtering profile.

C.

Train your staff to be security aware.

D.

Rely on a DNS resolver.

E.

Plan for mobile-employee risk

Question 8

as

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications

Which policy achieves the desired results?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 9

The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access the PowerBall Lottery website for just this week. However, the company does not want employees to access any other websites also listed in the URL filtering “gambling” category.

Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the “gambling” URL category?

Options:

A.

Add just the URL www.powerball.com to a Security policy allow rule.

B.

Manually remove powerball.com from the gambling URL category.

C.

Add *.powerball.com to the URL Filtering allow list.

D.

Create a custom URL category, add *.powerball.com to it and allow it in the Security Profile.

Question 10

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

Options:

A.

Aperture

B.

AutoFocus

C.

Parisma SaaS

D.

GlobalProtect

Question 11

An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones.

Which Security policy rule type should they use?

Options:

A.

default

B.

universal

C.

intrazone

D.

interzone

Question 12

How many zones can an interface be assigned with a Palo Alto Networks firewall?

Options:

A.

two

B.

three

C.

four

D.

one

Question 13

Which action results in the firewall blocking network traffic without notifying the sender?

Options:

A.

Deny

B.

No notification

C.

Drop

D.

Reset Client

Question 14

A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

Options:

A.

Windows-based agent on a domain controller

B.

Captive Portal

C.

Citrix terminal server with adequate data-plane resources

D.

PAN-OS integrated agent

Question 15

In the example security policy shown, which two websites fcked? (Choose two.)

as

Options:

A.

LinkedIn

B.

Facebook

C.

YouTube

D.

Amazon

Question 16

Which two configuration settings shown are not the default? (Choose two.)

as

Options:

A.

Enable Security Log

B.

Server Log Monitor Frequency (sec)

C.

Enable Session

D.

Enable Probing

Question 17

Which security profile should be used to classify malicious web content?

Options:

A.

URL Filtering

B.

Antivirus

C.

Web Content

D.

Vulnerability Protection

Question 18

Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?

Options:

A.

Panorama > Device Deployment > Dynamic Updates > Schedules > Add

B.

Panorama > Device Deployment > Content Updates > Schedules > Add

C.

Panorama > Dynamic Updates > Device Deployment > Schedules > Add

D.

Panorama > Content Updates > Device Deployment > Schedules > Add

Question 19

What is a prerequisite before enabling an administrative account which relies on a local firewall user database?

Options:

A.

Configure an authentication policy

B.

Configure an authentication sequence

C.

Configure an authentication profile

D.

Isolate the management interface on a dedicated management VLAN

Question 20

Which two security profile types can be attached to a security policy? (Choose two.)

Options:

A.

antivirus

B.

DDoS protection

C.

threat

D.

vulnerability

Question 21

An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)

Options:

A.

Reset server

B.

Reset both

C.

Drop

D.

Deny

Question 22

In which two types of NAT can oversubscription be used? (Choose two.)

Options:

A.

Static IP

B.

Destination NAT

C.

Dynamic IP and Port (DIPP)

D.

Dynamic IP

Question 23

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

as

Options:

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on Objective

Question 24

Which attribute can a dynamic address group use as a filtering condition to determine its membership?

Options:

A.

tag

B.

wildcard mask

C.

IP address

D.

subnet mask

Question 25

Which object would an administrator create to enable access to all applications in the office-programs subcategory?

Options:

A.

application filter

B.

URL category

C.

HIP profile

D.

application group

Question 26

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

Options:

A.

It uses techniques such as DGA.DNS tunneling detection and machine learning.

B.

It requires a valid Threat Prevention license.

C.

It enables users to access real-time protections using advanced predictive analytics.

D.

It requires a valid URL Filtering license.

E.

It requires an active subscription to a third-party DNS Security service.

Question 27

Which administrative management services can be configured to access a management interface?

Options:

A.

HTTP, CLI, SNMP, HTTPS

B.

HTTPS, SSH telnet SNMP

C.

SSH: telnet HTTP, HTTPS

D.

HTTPS, HTTP. CLI, API

Question 28

Access to which feature requires the PAN-OS Filtering license?

Options:

A.

PAN-DB database

B.

DNS Security

C.

Custom URL categories

D.

URL external dynamic lists

Question 29

Which two addresses should be reserved to enable DNS sinkholing? (Choose two.)

Options:

A.

IPv6

B.

Email

C.

IPv4

D.

MAC

Question 30

A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.

To which two types of traffic will the rule apply? (Choose two.)

Options:

A.

Within zone HR

B.

Within zone IT

C.

Between zone IT and zone HR

D.

Between zone IT and zone Finance

Question 31

Match each feature to the DoS Protection Policy or the DoS Protection Profile.

as

Options:

Question 32

Where does a user assign a tag group to a policy rule in the policy creation window?

Options:

A.

Application tab

B.

General tab

C.

Actions tab

D.

Usage tab

Question 33

Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)

Options:

A.

GlobalProtect agent

B.

XML API

C.

User-ID Windows-based agent

D.

log forwarding auto-tagging

Question 34

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

Options:

A.

Policies

B.

Network

C.

Objects

D.

Device

Question 35

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Options:

A.

Active Directory monitoring

B.

Windows session monitoring

C.

Windows client probing

D.

domain controller monitoring

Question 36

Which object would an administrator create to block access to all high-risk applications?

Options:

A.

HIP profile

B.

application filter

C.

application group

D.

Vulnerability Protection profile

Question 37

When a security rule is configured as Intrazone, which field cannot be changed?

Options:

A.

Actions

B.

Source Zone

C.

Application

D.

Destination Zone

Question 38

Which CLI command will help confirm if FQDN objects are resolved in the event there is a shadow rule?

Options:

A.

>show system fqdn

B.

>request fqdn show system

C.

>request show system fqdn

D.

>request system fqdn show

Question 39

Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided password?

Options:

A.

exclude

B.

continue

C.

hold

D.

override

Question 40

Access to which feature requires PAN-OS Filtering licens?

Options:

A.

PAN-DB database

B.

URL external dynamic lists

C.

Custom URL categories

D.

DNS Security

Question 41

Match the Palo Alto Networks Security Operating Platform architecture to its description.

as

Options:

Question 42

An address object of type IP Wildcard Mask can be referenced in which part of the configuration?

Options:

A.

Security policy rule

B.

ACC global filter

C.

external dynamic list

D.

NAT address pool

Question 43

An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"

Which security policy action causes this?

Options:

A.

Drop

B.

Drop, send ICMP Unreachable

C.

Reset both

D.

Reset server

Question 44

When creating a custom URL category object, which is a valid type?

Options:

A.

domain match

B.

host names

C.

wildcard

D.

category match

Question 45

An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save the changes, but the OK button is grayed out.

What are two possible reasons the OK button is grayed out? (Choose two.)

Options:

A.

The entry contains wildcards.

B.

The entry is duplicated.

C.

The entry doesn't match a list entry.

D.

The entry matches a list entry.

Question 46

Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?

Options:

A.

Palo Alto Networks C&C IP Addresses

B.

Palo Alto Networks Bulletproof IP Addresses

C.

Palo Alto Networks High-Risk IP Addresses

D.

Palo Alto Networks Known Malicious IP Addresses

Question 47

Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?

Options:

A.

local username

B.

dynamic user group

C.

remote username

D.

static user group

Question 48

What is the main function of the Test Policy Match function?

Options:

A.

verify that policy rules from Expedition are valid

B.

confirm that rules meet or exceed the Best Practice Assessment recommendations

C.

confirm that policy rules in the configuration are allowing/denying the correct traffic

D.

ensure that policy rules are not shadowing other policy rules

Question 49

Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?

Options:

A.

Objects > Dynamic Updates > Review App-IDs

B.

Device > Dynamic Updates > Review Policies

C.

Device > Dynamic Updates > Review App-IDs

D.

Objects > Dynamic Updates > Review Policies

Question 50

Based on the screenshot what is the purpose of the group in User labelled ''it"?

as

Options:

A.

Allows users to access IT applications on all ports

B.

Allows users in group "DMZ" lo access IT applications

C.

Allows "any" users to access servers in the DMZ zone

D.

Allows users in group "it" to access IT applications

Question 51

Which definition describes the guiding principle of the zero-trust architecture?

Options:

A.

never trust, never connect

B.

always connect and verify

C.

never trust, always verify

D.

trust, but verity

Question 52

What is the default action for the SYN Flood option within the DoS Protection profile?

Options:

A.

Alert

B.

Random Early Drop

C.

Reset-client

D.

Sinkhole

Question 53

For the firewall to use Active Directory to authenticate users, which Server Profile is required in the Authentication Profile?

Options:

A.

TACACS+

B.

RADIUS

C.

LDAP

D.

SAML

Question 54

Which tab would an administrator click to create an address object?

Options:

A.

Device

B.

Policies

C.

Monitor

D.

Objects

Question 55

The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;

1. trust for internal networks

2. untrust to the internet

Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )

Options:

A.

Create a deny rule at the top of the policy from trust to untrust with service application-default and add an application filter with the evasive characteristic

B.

Create a deny rule at the top of the policy from trust to untrust over any service and select evasive as the application

C.

Create a deny rule at the top of the policy from trust to untrust with service application-default and select evasive as the application

D.

Create a deny rule at the top of the policy from trust to untrust over any service and add an application filter with the evasive characteristic

Question 56

Where within the firewall GUI can all existing tags be viewed?

Options:

A.

Network > Tags

B.

Monitor > Tags

C.

Objects > Tags

D.

Policies > Tags

Question 57

Which type firewall configuration contains in-progress configuration changes?

Options:

A.

backup

B.

running

C.

candidate

D.

committed

Question 58

Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose two.)

Options:

A.

Obtain a Threat Prevention subscription.

B.

Enable Dynamic Updates.

C.

Move within the WildFire public cloud region.

D.

Obtain a WildFire subscription.

Question 59

What allows a security administrator to preview the Security policy rules that match new application signatures?

Options:

A.

Review Release Notes

B.

Dynamic Updates-Review Policies

C.

Dynamic Updates-Review App

D.

Policy Optimizer-New App Viewer

Question 60

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

Options:

A.

global

B.

intrazone

C.

interzone

D.

universal

Question 61

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application

Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

Options:

A.

Data Filtering Profile applied to outbound Security policy rules

B.

Antivirus Profile applied to outbound Security policy rules

C.

Data Filtering Profile applied to inbound Security policy rules

D.

Vulnerability Profile applied to inbound Security policy rules

Question 62

A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?

Options:

A.

Create a custom-service-object called SERVICE-SSH for destination-port-TCP-22. Create a security-rule between zone USERS and OUTSIDE to allow traffic from any source IP-address to any destination IP-address for SERVICE-SSH

B.

Create a security-rule that allows traffic from zone USERS to OUTSIDE to allow traffic from any source IP-address to any destination IP-address for application SSH

C.

In addition to option a, a custom-service-object called SERVICE-SSH-RETURN that contains source-port-TCP-22 should be created. A second security-rule is required that allows traffic from zone OUTSIDE to USERS for SERVICE-SSH-RETURN for any source-IP-address to any destination-Ip-address

D.

In addition to option c, an additional rule from zone OUTSIDE to USERS for application SSH from any source-IP-address to any destination-IP-address is required to allow the return-traffic from the SSH-servers to reach the server-admin

Question 63

What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?

Options:

A.

authentication sequence

B.

LDAP server profile

C.

authentication server list

D.

authentication list profile

Question 64

Which order of steps is the correct way to create a static route?

Options:

A.

1) Enter the route and netmask

2) Enter the IP address for the specific next hop

3) Specify the outgoing interface for packets to use to go to the next hop

4) Add an IPv4 or IPv6 route by name

B.

1) Enter the route and netmask

2) Specify the outgoing interface for packets to use to go to the next hop

3) Enter the IP address for the specific next hop

4) Add an IPv4 or IPv6 route by name

C.

1) Enter the IP address for the specific next hop

2) Enter the route and netmask

3) Add an IPv4 or IPv6 route by name

4) Specify the outgoing interface for packets to use to go to the next hop

D.

1) Enter the IP address for the specific next hop

2) Add an IPv4 or IPv6 route by name

3) Enter the route and netmask

4) Specify the outgoing interface for packets to use to go to the next hop

Question 65

An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact a command-and-control (C2) server. Which two security profile components will detect and prevent this threat after the firewall’s signature database has been updated? (Choose two.)

Options:

A.

vulnerability protection profile applied to outbound security policies

B.

anti-spyware profile applied to outbound security policies

C.

antivirus profile applied to outbound security policies

D.

URL filtering profile applied to outbound security policies

Question 66

Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?

Options:

A.

Review Apps

B.

Review App Matches

C.

Pre-analyze

D.

Review Policies

Question 67

Which protocol used to map username to user groups when user-ID is configured?

Options:

A.

SAML

B.

RADIUS

C.

TACACS+

D.

LDAP

Question 68

The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.

Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)

Options:

A.

Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.

B.

Manually remove powerball.com from the gambling URL category.

C.

Add *.powerball.com to the allow list

D.

Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.

Question 69

An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.

What object is best suited for this configuration?

Options:

A.

Application Group

B.

Tag

C.

External Dynamic List

D.

Application Filter

Question 70

A Security Profile can block or allow traffic at which point?

Options:

A.

after it is matched to a Security policy rule that allows traffic

B.

on either the data plane or the management plane

C.

after it is matched to a Security policy rule that allows or blocks traffic

D.

before it is matched to a Security policy rule

Question 71

Which Security policy set should be used to ensure that a policy is applied first?

Options:

A.

Child device-group pre-rulebase

B.

Shared pre-rulebase

C.

Parent device-group pre-rulebase

D.

Local firewall policy

Question 72

In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)

Options:

A.

Objects tab > Application Filters

B.

Policies tab > Security

C.

ACC tab > Global Filters

D.

Objects tab > Application Groups

E.

Objects tab > Applications

Question 73

Why does a company need an Antivirus profile?

Options:

A.

To prevent command-and-control traffic

B.

To protect against viruses, worms, and trojans

C.

To prevent known exploits

D.

To prevent access to malicious web content

Question 74

When is an event displayed under threat logs?

Options:

A.

When traffic matches a corresponding Security Profile

B.

When traffic matches any Security policy

C.

Every time a session is blocked

D.

Every time the firewall drops a connection

Question 75

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)

Options:

A.

Security policy rules inspect but do not block traffic.

B.

Security Profile should be used only on allowed traffic.

C.

Security Profile are attached to security policy rules.

D.

Security Policy rules are attached to Security Profiles.

E.

Security Policy rules can block or allow traffic.

Question 76

Which Security profile should be applied in order to protect against illegal code execution?

Options:

A.

Vulnerability Protection profile on allowed traffic

B.

Antivirus profile on allowed traffic

C.

Antivirus profile on denied traffic

D.

Vulnerability Protection profile on denied traffic

Question 77

Match the network device with the correct User-ID technology.

as

Options:

Question 78

Based on the show security policy rule would match all FTP traffic from the inside zone to the outside zone?

as

Options:

A.

internal-inside-dmz

B.

engress outside

C.

inside-portal

D.

intercone-default

Question 79

What must be considered with regards to content updates deployed from Panorama?

Options:

A.

Content update schedulers need to be configured separately per device group.

B.

Panorama can only install up to five content versions of the same type for potential rollback scenarios.

C.

A PAN-OS upgrade resets all scheduler configurations for content updates.

D.

Panorama can only download one content update at a time for content updates of the same type.

Question 80

Selecting the option to revert firewall changes will replace what settings?

Options:

A.

The running configuration with settings from the candidate configuration

B.

The candidate configuration with settings from the running configuration

C.

The device state with settings from another configuration

D.

Dynamic update scheduler settings

Question 81

Which Security policy action will message a user's browser thai their web session has been terminated?

Options:

A.

Reset server

B.

Deny

C.

Drop

D.

Reset client

Question 82

During the packet flow process, which two processes are performed in application identification? (Choose two.)

Options:

A.

pattern based application identification

B.

application override policy match

C.

session application identified

D.

application changed from content inspection

Question 83

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?

Options:

A.

Rule Usage Filter > No App Specified

B.

Rule Usage Filter >Hit Count > Unused in 30 days

C.

Rule Usage Filter > Unused Apps

D.

Rule Usage Filter > Hit Count > Unused in 90 days

Question 84

What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)

Options:

A.

Blometric scanning results from iOS devices

B.

Firewall logs

C.

Custom API scripts

D.

Security Information and Event Management Systems (SIEMS), such as Splun

E.

DNS Security service

Question 85

Which Security profile can you apply to protect against malware such as worms and Trojans?

Options:

A.

data filtering

B.

antivirus

C.

vulnerability protection

D.

anti-spyware

Question 86

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

Options:

A.

Anti-Spyware

B.

Antivirus

C.

Vulnerability Protection

D.

URL Filtering

Question 87

An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.

Which security policy action causes this?

Options:

A.

Reset server

B.

Reset both

C.

Deny

D.

Drop

Question 88

An administrator would like to apply a more restrictive Security profile to traffic for file sharing applications. The administrator does not want to update the Security policy or object when new applications are released.

Which object should the administrator use as a match condition in the Security policy?

Options:

A.

the Content Delivery Networks URL category

B.

the Online Storage and Backup URL category

C.

an application group containing all of the file-sharing App-IDs reported in the traffic logs

D.

an application filter for applications whose subcategory is file-sharing

Question 89

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.

Options:

A.

on either the data place or the management plane.

B.

after it is matched by a security policy rule that allows traffic.

C.

before it is matched to a Security policy rule.

D.

after it is matched by a security policy rule that allows or blocks traffic.

Question 90

Which administrator type utilizes predefined roles for a local administrator account?

Options:

A.

Superuser

B.

Role-based

C.

Dynamic

D.

Device administrator

Question 91

Which three configuration settings are required on a Palo Alto networks firewall management interface?

Options:

A.

default gateway

B.

netmask

C.

IP address

D.

hostname

E.

auto-negotiation

Question 92

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

Options:

A.

An implicit dependency does not require the dependent application to be added in the security policy

B.

An implicit dependency requires the dependent application to be added in the security policy

C.

An explicit dependency does not require the dependent application to be added in the security policy

D.

An explicit dependency requires the dependent application to be added in the security policy

Question 93

Which statements is true regarding a Heatmap report?

Options:

A.

When guided by authorized sales engineer, it helps determine te areas of greatest security risk.

B.

It provides a percentage of adoption for each assessment area.

C.

It runs only on firewall.

D.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.

Question 94

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

Options:

A.

User identification

B.

Filtration protection

C.

Vulnerability protection

D.

Antivirus

E.

Application identification

F.

Anti-spyware

Question 95

What must first be created on the firewall for SAML authentication to be configured?

Options:

A.

Server Policy

B.

Server Profile

C.

Server Location

D.

Server Group

Question 96

What is a recommended consideration when deploying content updates to the firewall from Panorama?

Options:

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

Question 97

Which situation is recorded as a system log?

Options:

A.

An attempt to access a spoofed website has been blocked.

B.

A connection with an authentication server has been dropped.

C.

A file that has been analyzed is potentially dangerous for the system.

D.

A new asset has been discovered on the network.

Question 98

Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?

Options:

A.

data

B.

network processing

C.

management

D.

security processing

Question 99

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

Options:

A.

on the App Dependency tab in the Commit Status window

B.

on the Policy Optimizer's Rule Usage page

C on the Application tab in the Security Policy Rule creation window

C.

on the Objects > Applications browser pages

Question 100

Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)

as

Options:

A.

Path monitoring does not determine if route is useable

B.

Route with highest metric is actively used

C.

Path monitoring determines if route is useable

D.

Route with lowest metric is actively used

Question 101

A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to

making the changes.

Which action will allow the administrator to undo the changes?

Options:

A.

Load configuration version, and choose the first item on the list.

B.

Load named configuration snapshot, and choose the first item on the list.

C.

Revert to last saved configuration.

D.

Revert to running configuration.

Question 102

Which component is a building block in a Security policy rule?

Options:

A.

decryption profile

B.

destination interface

C.

timeout (min)

D.

application

Question 103

Which path is used to save and load a configuration with a Palo Alto Networks firewall?

Options:

A.

Device>Setup>Services

B.

Device>Setup>Management

C.

Device>Setup>Operations

D.

Device>Setup>Interfaces

Question 104

Which dynamic update type includes updated anti-spyware signatures?

Options:

A.

Applications and Threats

B.

GlobalProtect Data File

C.

Antivirus

D.

PAN-DB

Question 105

Which path in PAN-OS 10.0 displays the list of port-based security policy rules?

Options:

A.

Policies> Security> Rule Usage> No App Specified

B.

Policies> Security> Rule Usage> Port only specified

C.

Policies> Security> Rule Usage> Port-based Rules

D.

Policies> Security> Rule Usage> Unused Apps

Question 106

Which the app-ID application will you need to allow in your security policy to use facebook-chat?

Options:

A.

facebook-email

B.

facebook-base

C.

facebook

D.

facebook-chat

Question 107

How would a Security policy need to be written to allow outbound traffic using Secure Shell (SSH) to destination ports tcp/22 and tcp/4422?

Options:

A.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin then creates a Security policy allowing application "ssh" and service "tcp-4422".

B.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service "application-default".

C.

The admin creates a Security policy allowing application "ssh" and service "application-default".

D.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin also creates a custom service object named "tcp-22" with port tcp/22.

The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service "tcp-22".

Question 108

Which solution is a viable option to capture user identification when Active Directory is not in use?

Options:

A.

Cloud Identity Engine

B.

group mapping

C.

Directory Sync Service

D.

Authentication Portal

Page: 1 / 36
Total 362 questions