Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which three interface deployment methods can be used to block traffic flowing through the Palo Alto Networks firewall? (Choose three.)

Options:

A.

Layer 2


B.

Virtual Wire


C.

Tap


D.

Layer 3


E.

HA


Expert Solution
Questions # 22:

Place the following steps in the packet processing order of operations from first to last.

Question # 22


Expert Solution
Questions # 23:

Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?

Options:

A.

Inline Cloud Analysis


B.

Signature Exceptions


C.

Machine Learning Policies


D.

Signature Policies


Expert Solution
Questions # 24:

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

Options:

A.

override


B.

allow


C.

block


D.

continue


Expert Solution
Questions # 25:

What do dynamic user groups you to do?

Options:

A.

create a QoS policy that provides auto-remediation for anomalous user behavior and malicious activity


B.

create a policy that provides auto-sizing for anomalous user behavior and malicious activity


C.

create a policy that provides auto-remediation for anomalous user behavior and malicious activity


D.

create a dynamic list of firewall administrators


Expert Solution
Questions # 26:

An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.

What object is best suited for this configuration?

Options:

A.

Application Group


B.

Tag


C.

External Dynamic List


D.

Application Filter


Expert Solution
Questions # 27:

How would a Security policy need to be written to allow outbound traffic using Secure Shell (SSH) to destination ports tcp/22 and tcp/4422?

Options:

A.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin then creates a Security policy allowing application "ssh" and service "tcp-4422".


B.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service "application-default".


C.

The admin creates a Security policy allowing application "ssh" and service "application-default".


D.

The admin creates a custom service object named "tcp-4422" with port tcp/4422.

The admin also creates a custom service object named "tcp-22" with port tcp/22.

The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service "tcp-22".


Expert Solution
Questions # 28:

Question # 28

Given the detailed log information above, what was the result of the firewall traffic inspection?

Options:

A.

It was blocked by the Anti-Virus Security profile action.


B.

It was blocked by the Anti-Spyware Profile action.


C.

It was blocked by the Vulnerability Protection profile action.


D.

It was blocked by the Security policy action.


Expert Solution
Questions # 29:

An administrator should filter NGFW traffic logs by which attribute column to determine if the entry is for the start or end of the session?

Options:

A.

Receive Time


B.

Type


C.

Destination


D.

Source


Expert Solution
Questions # 30:

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

Options:

A.

Anti-Spyware


B.

Antivirus


C.

Vulnerability Protection


D.

URL Filtering


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions