Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which data flow direction is protected in a zero trust firewall deployment that is not protected in a perimeter-only firewall deployment?

Options:

A.

outbound


B.

north south


C.

inbound


D.

east west


Expert Solution
Questions # 12:

What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)

Options:

A.

Service


B.

User


C.

Application


D.

Address


E.

Zone ab


Expert Solution
Questions # 13:

An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)

Options:

A.

Reset server


B.

Reset both


C.

Drop


D.

Deny


Expert Solution
Questions # 14:

Which two security profile types can be attached to a security policy? (Choose two.)

Options:

A.

antivirus


B.

DDoS protection


C.

threat


D.

vulnerability


Expert Solution
Questions # 15:

An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs.

What is the correct process to enable this logging1?

Options:

A.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OK


B.

Select the interzone-default rule and edit the rule on the Actions tab select Log at Session End and click OK


C.

This rule has traffic logging enabled by default no further action is required


D.

Select the interzone-default rule and click Override on the Actions tab select Log at Session End and click OK


Expert Solution
Questions # 16:

Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized.

Which user-ID agent sufficient in your network?

Options:

A.

PAN-OS integrated agent deployed on the firewall


B.

Windows-based agent deployed on the internal network a domain member


C.

Citrix terminal server agent deployed on the network


D.

Windows-based agent deployed on each domain controller


Expert Solution
Questions # 17:

Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?

Options:

A.

intrazone


B.

interzone


C.

universal


D.

global


Expert Solution
Questions # 18:

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?

Options:

A.

Rule Usage Filter > No App Specified


B.

Rule Usage Filter >Hit Count > Unused in 30 days


C.

Rule Usage Filter > Unused Apps


D.

Rule Usage Filter > Hit Count > Unused in 90 days


Expert Solution
Questions # 19:

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

Options:

A.

on the App Dependency tab in the Commit Status window


B.

on the Policy Optimizer's Rule Usage page

C on the Application tab in the Security Policy Rule creation window


C.

on the Objects > Applications browser pages


Expert Solution
Questions # 20:

Review the Screenshot:

Question # 20

Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the

SERVER zone to the DMZ on SSH only.

Which rule group enables the required traffic?

A)

Question # 20

B)

Question # 20

C)

Question # 20

D)

Question # 20

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions