Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which security profile should be used to classify malicious web content?

Options:

A.

URL Filtering


B.

Antivirus


C.

Web Content


D.

Vulnerability Protection


Expert Solution
Questions # 62:

What is the maximum volume of concurrent administrative account sessions?

Options:

A.

Unlimited


B.

2


C.

10


D.

1


Expert Solution
Questions # 63:

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

Options:

A.

block


B.

sinkhole


C.

alert


D.

allow


Expert Solution
Questions # 64:

Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?

Options:

A.

NAT Target Tab


B.

NAT Active/Active HA Binding Tab


C.

NAT Translated Packet Tab


D.

NAT Policies General Tab


Expert Solution
Questions # 65:

Which action should be taken to identify threats that have been detected by using inline cloud analysis?

Options:

A.

Filter Threat logs by Type


B.

Filter Threat logs by Action


C.

Filter Threat logs by Application


D.

Filter Threat logs by Threat Category


Expert Solution
Questions # 66:

Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?

Options:

A.

data


B.

network processing


C.

management


D.

security processing


Expert Solution
Questions # 67:

Match each feature to the DoS Protection Policy or the DoS Protection Profile.

Question # 67


Expert Solution
Questions # 68:

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

Options:

A.

GlobalProtect


B.

AutoFocus


C.

Aperture


D.

Panorama


Expert Solution
Questions # 69:

Which Security profile would you apply to identify infected hosts on the protected network uwall user database?

Options:

A.

Anti-spyware


B.

Vulnerability protection


C.

URL filtering


D.

Antivirus


Expert Solution
Questions # 70:

An internal host wants to connect to servers of the internet through using source NAT.

Which policy is required to enable source NAT on the firewall?

Options:

A.

NAT policy with source zone and destination zone specified


B.

post-NAT policy with external source and any destination address


C.

NAT policy with no source of destination zone selected


D.

pre-NAT policy with external source and any destination address


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions