Download Palo Alto Networks.PCNSA.Prep4Sure.2019-09-11.38q.vcex

Download Exam

File Info

Exam Palo Alto Networks Certified Network Security Administrator
Number PCNSA
File Name Palo Alto Networks.PCNSA.Prep4Sure.2019-09-11.38q.vcex
Size 742 KB
Posted Sep 11, 2019
Download Palo Alto Networks.PCNSA.Prep4Sure.2019-09-11.38q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which two configuration settings shown are not the default? (Choose two.) 
  


  1. Enable Security Log
  2. Server Log Monitor Frequency (sec)
  3. Enable Session
  4. Enable Probing
Correct answer: BC
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/user-identification/device-user-identification-user-mapping/enable-server-monitoring
Reference: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/user-identification/device-user-identification-user-mapping/enable-server-monitoring



Question 2

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?  
  


  1. Signature Matching
  2. Network Processing
  3. Security Processing
  4. Security Matching
Correct answer: A



Question 3

Which option shows the attributes that are selectable when setting up application filters?


  1. Category, Subcategory, Technology, and Characteristic
  2. Category, Subcategory, Technology, Risk, and Characteristic
  3. Name, Category, Technology, Risk, and Characteristic
  4. Category, Subcategory, Risk, Standard Ports, and Technology
Correct answer: B
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects-application-filters
Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects-application-filters



Question 4

Actions can be set for which two items in a URL filtering security profile? (Choose two.)


  1. Block List
  2. Custom URL Categories
  3. PAN-DB URL Categories
  4. Allow List
Correct answer: AD



Question 5

Which statement is true regarding a Best Practice Assessment?


  1. The BPA tool can be run only on firewalls
  2. It provides a percentage of adoption for each assessment area
  3. The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities
  4. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
Correct answer: B
Explanation:
Reference: https://docs.paloaltonetworks.com/best-practices/8-1/data-center-best-practices/data-center-best-practice-security-policy/use-palo-alto-networks-assessment-and-review-tools
Reference: https://docs.paloaltonetworks.com/best-practices/8-1/data-center-best-practices/data-center-best-practice-security-policy/use-palo-alto-networks-assessment-and-review-tools



Question 6

Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application? 
  


  1. intrazone-default
  2. Deny Google
  3. allowed-security services
  4. interzone-default
Correct answer: D
Explanation:



Question 7

Which interface does not require a MAC or IP address?


  1. Virtual Wire
  2. Layer3
  3. Layer2
  4. Loopback
Correct answer: A



Question 8

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?


  1. Rule Usage Filter > No App Specified
  2. Rule Usage Filter >Hit Count > Unused in 30 days
  3. Rule Usage Filter > Unused Apps
  4. Rule Usage Filter > Hit Count > Unused in 90 days
Correct answer: D



Question 9

Order the steps needed to create a new security zone with a Palo Alto Networks firewall.


Correct answer: To work with this question, an Exam Simulator is required.
Explanation:



Question 10

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)


  1. An implicit dependency does not require the dependent application to be added in the security policy
  2. An implicit dependency requires the dependent application to be added in the security policy
  3. An explicit dependency does not require the dependent application to be added in the security policy
  4. An explicit dependency requires the dependent application to be added in the security policy
Correct answer: AD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files