Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

An administrator is reviewing another administrator s Security policy log settings

Which log setting configuration is consistent with best practices tor normal traffic?

Options:

A.

Log at Session Start and Log at Session End both enabled


B.

Log at Session Start disabled Log at Session End enabled


C.

Log at Session Start enabled Log at Session End disabled


D.

Log at Session Start and Log at Session End both disabled


Expert Solution
Questions # 72:

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?

Options:

A.

DoS protection


B.

URL filtering


C.

packet buffering


D.

anti-spyware


Expert Solution
Questions # 73:

The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;

1. trust for internal networks

2. untrust to the internet

Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )

Options:

A.

Create a deny rule at the top of the policy from trust to untrust with service application-default and add an application filter with the evasive characteristic


B.

Create a deny rule at the top of the policy from trust to untrust over any service and select evasive as the application


C.

Create a deny rule at the top of the policy from trust to untrust with service application-default and select evasive as the application


D.

Create a deny rule at the top of the policy from trust to untrust over any service and add an application filter with the evasive characteristic


Expert Solution
Questions # 74:

Identify the correct order to configure the PAN-OS integrated USER-ID agent.

3. add the service account to monitor the server(s)

2. define the address of the servers to be monitored on the firewall

4. commit the configuration, and verify agent connection status

1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent

Options:

A.

2-3-4-1


B.

1-4-3-2


C.

3-1-2-4


D.

1-3-2-4


Expert Solution
Questions # 75:

Which solution is a viable option to capture user identification when Active Directory is not in use?

Options:

A.

Cloud Identity Engine


B.

group mapping


C.

Directory Sync Service


D.

Authentication Portal


Expert Solution
Questions # 76:

Which three Ethernet interface types are configurable on the Palo Alto Networks firewall? (Choose three.)

Options:

A.

Virtual Wire


B.

Tap


C.

Dynamic


D.

Layer 3


E.

Static


Expert Solution
Questions # 77:

An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.

Which security policy action causes this?

Options:

A.

Reset server


B.

Reset both


C.

Deny


D.

Drop


Expert Solution
Questions # 78:

Based on the security policy rules shown, ssh will be allowed on which port?

Question # 78

Options:

A.

any port


B.

same port as ssl and snmpv3


C.

the default port


D.

only ephemeral ports


Expert Solution
Questions # 79:

What action will inform end users when their access to Internet content is being restricted?

Options:

A.

Create a custom 'URL Category' object with notifications enabled.


B.

Publish monitoring data for Security policy deny logs.


C.

Ensure that the 'site access" setting for all URL sites is set to 'alert'.


D.

Enable 'Response Pages' on the interface providing Internet access.


Expert Solution
Questions # 80:

An administrator wants to prevent access to media content websites that are risky

Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two)

Options:

A.

streaming-media


B.

high-risk


C.

recreation-and-hobbies


D.

known-risk


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions