Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?

Options:

A.

Dynamic IP and Port


B.

Dynamic IP


C.

Static IP


D.

Destination


Expert Solution
Questions # 42:

Which attribute can a dynamic address group use as a filtering condition to determine its membership?

Options:

A.

tag


B.

wildcard mask


C.

IP address


D.

subnet mask


Expert Solution
Questions # 43:

What does an administrator use to validate whether a session is matching an expected NAT policy?

Options:

A.

system log


B.

test command


C.

threat log


D.

config audit


Expert Solution
Questions # 44:

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?

Options:

A.

every 30 minutes


B.

every 5 minutes


C.

once every 24 hours


D.

every 1 minute


Expert Solution
Questions # 45:

Which type security policy rule would match traffic flowing between the inside zone and outside zone within the inside zone and within the outside zone?

Options:

A.

global


B.

universal


C.

intrazone


D.

interzone


Expert Solution
Questions # 46:

Within a WildFire Analysis Profile what match criteria can be defined to forward samples for analysis?

Options:

A.

Direction


B.

Application Category


C.

File Size


D.

Source


Expert Solution
Questions # 47:

An administrator would like to silently drop traffic from the internet to a ftp server.

Which Security policy action should the administrator select?

Options:

A.

Reset-server


B.

Block


C.

Deny


D.

Drop


Expert Solution
Questions # 48:

Which interface type can use virtual routers and routing protocols?

Options:

A.

Tap


B.

Layer3


C.

Virtual Wire


D.

Layer2


Expert Solution
Questions # 49:

Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and risky websites?

Options:

A.

reconnaissance


B.

delivery


C.

exploitation


D.

installation


Expert Solution
Questions # 50:

An administrator wants to prevent users from submitting corporate credentials in a phishing attack.

Which Security profile should be applied?

Options:

A.

antivirus


B.

anti-spyware


C.

URL filtering


D.

vulnerability protection


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions