Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with ValidTests

Exam PCNSA All Questions
Exam PCNSA Premium Access

View all detail and faqs for the PCNSA exam

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which User Credential Detection method should be applied within a URL Filtering Security profile to check for the submission of a valid corporate username and the associated password?

Options:

A.

Domain Credential

B.

IP User

C.

Group Mapping

D.

Valid Username Detected Log Severity

Expert Solution
Questions # 2:

What are the two main reasons a custom application is created? (Choose two.)

Options:

A.

To correctly identify an internal application in the traffic log

B.

To change the default categorization of an application

C.

To visually group similar applications

D.

To reduce unidentified traffic on a network

Expert Solution
Questions # 3:

Which two types of profiles are needed to create an authentication sequence? (Choose two.)

Options:

A.

Server profile

B.

Authentication profile

C.

Security profile

D.

Interface Management profile

Expert Solution
Questions # 4:

Which statement is true about Panorama managed devices?

Options:

A.

Panorama automatically removes local configuration locks after a commit from Panorama

B.

Local configuration locks prohibit Security policy changes for a Panorama managed device

C.

Security policy rules configured on local firewalls always take precedence

D.

Local configuration locks can be manually unlocked from Panorama

Expert Solution
Questions # 5:

What are the two default behaviors for the intrazone-default policy? (Choose two.)

Options:

A.

Allow

B.

Logging disabled

C.

Log at Session End

D.

Deny

Expert Solution
Questions # 6:

Which two options does the firewall use to dynamically populate address group members? (Choose two.)

Options:

A.

IP Addresses

B.

Tags

C.

MAC Addresses

D.

Tag-based filters

Expert Solution
Questions # 7:

At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?

Question # 7

Options:

A.

delivery

B.

command and control

C.

explotation

D.

reinsurance

E.

installation

Expert Solution
Questions # 8:

Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?

Options:

A.

URL filtering

B.

Antivirus

C.

WildFire

D.

Threat Prevention

Expert Solution
Questions # 9:

Which object would an administrator create to block access to all high-risk applications?

Options:

A.

HIP profile

B.

application filter

C.

application group

D.

Vulnerability Protection profile

Expert Solution
Questions # 10:

Match each feature to the DoS Protection Policy or the DoS Protection Profile.

Question # 10

Options:

Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions