Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
PCNSA : Palo Alto Networks Certified Network Security Administrator Exam

Palo-Alto PCNSA Questions & Answers
Full Version: 437 Q&A
Latest PCNSA Practice Tests with Actual Questions
Get Complete pool of questions with Premium PDF and Test Engine
Exam Code : PCNSA
Exam Name : Palo Alto Networks Certified Network Security Administrator
Vendor Name :
"Palo-Alto"
PCNSA Dumps PCNSA Braindumps PCNSA Real Questions PCNSA Practice Test
PCNSA Actual Questions
Palo-Alto
PCNSA
Palo Alto Networks Certified Network Security Administrator
https://killexams.com/pass4sure/exam-detail/PCNSA
Question: 80
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone. Complete the security policy to ensure only Telnet is allowed.
Security Policy: Source Zone: Internal to DMZ Zone services “Application defaults”, and action = Allow A. Destination IP: 192.168.1.123/24
Application = ‘Telnet’
Log Forwarding
USER-ID = ‘Allow users in Trusted’
Answer: B
Question: 81
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )
TACACS
SAML2
SAML10
Kerberos
TACACS+
Answer: A,B,D
Question: 82
What do you configure if you want to set up a group of objects based on their ports alone?
Application groups
Service groups
Address groups
Custom objects
Answer: B
Question: 83
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications.
Which policy achieves the desired results? A)
B)
C)
D)
Option
Option
Option
Option
Answer: C
Question: 84
Given the detailed log information above, what was the result of the firewall traffic inspection?
It was blocked by the Vulnerability Protection profile action.
It was blocked by the Anti-Virus Security profile action.
It was blocked by the Anti-Spyware Profile action.
Answer: C
Question: 85
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
Exploitation
Installation
Reconnaissance
Act on Objective
Answer: A
Question: 86
How are Application Fillers or Application Groups used in firewall policy?
An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group
An Application Filter is a dynamic way to group applications and can be configured as a nested member of an Application Group
An Application Group is a dynamic way of grouping applications and can be configured as a nested member of an Application Group
An Application Group is a static way of grouping applications and cannot be configured as a nested member of Application Group
Answer: B
Question: 87
Complete the statement. A security profile can block or allow traffic
on unknown-tcp or unknown-udp traffic
after it is matched by a security policy that allows traffic
before it is matched by a security policy
after it is matched by a security policy that allows or blocks traffic
Answer: B
Explanation:
Security profiles are objects added to policy rules that are configured with an action of allow.
Question: 88
Which interface does not require a MAC or IP address?
Virtual Wire
Layer3
Layer2
Loopback
Answer: A
Question: 89
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)
facebook
facebook-chat
facebook-base
facebook-email
Answer: B,C
Question: 90
Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.
Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?
antivirus profile applied to outbound security policies
data filtering profile applied to inbound security policies
data filtering profile applied to outbound security policies
vulnerability profile applied to inbound security policies
Answer: C
Question: 91
Which statement is true about Panorama managed devices?
Panorama automatically removes local configuration locks after a commit from Panorama
Local configuration locks prohibit Security policy changes for a Panorama managed device
Security policy rules configured on local firewalls always take precedence
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/administer-panorama/manage- locks- forrestricting-configuration-changes.html
Question: 92
Which solution is a viable option to capture user identification when Active Directory is not in use?
Cloud Identity Engine
group mapping
Directory Sync Service
Authentication Portal
Answer: D
Question: 93
An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?
NAT policy with source zone and destination zone specified
post-NAT policy with external source and any destination address
NAT policy with no source of destination zone selected
pre-NAT policy with external source and any destination address
Answer: A
Question: 94
What are three differences between security policies and security profiles? (Choose three.)
Security policies are attached to security profiles
Security profiles are attached to security policies
Security profiles should only be used on allowed traffic
Security profiles are used to block traffic by themselves
Security policies can block or allow traffic
Answer: B,C,E
Question: 95
What is a recommended consideration when deploying content updates to the firewall from Panorama?
Before deploying content updates, always check content release version compatibility.
Content updates for firewall A/P HA pairs can only be pushed to the active firewall.
Content updates for firewall A/A HA pairs need a defined master device.
After deploying content updates, perform a commit and push to Panorama.
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-licenses-and-updates/deploy- updates-to-firewalls-log-collectors-and-wildfire-appliances-using-panorama/schedule-a-content-update-using- panorama.html
Question: 96
An administrator wishes to follow best practices for logging traffic that traverses the firewall Which log setting is correct?
Disable all logging
Enable Log at Session End
Enable Log at Session Start
Enable Log at both Session Start and End
Answer: B
Explanation:
Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC
Question: 97
Which administrator type utilizes predefined roles for a local administrator account?
Superuser
Role-based
Dynamic
Device administrator
Answer: C
Question: 98
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
any supported Palo Alto Networks firewall or Prisma Access firewall
an additional subscription free of charge
a firewall device running with a minimum version of PAN-OS 10.1
an additional paid subscription
Answer: A
Question: 99 Refer to the exhibit.
A web server in the DMZ is being mapped to a public address through DNAT. Which Security policy rule will allow traffic to flow to the web server?
Untrust (any) to DMZ (10.1.1.100), web browsing -Allow
Untrust (any) to Untrust (1.1.1.100), web browsing – Allow
Untrust (any) to Untrust (10.1.1.100), web browsing -Allow
Untrust (any) to DMZ (1.1.1.100), web browsing – Allow
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/networking/nat/nat-configuration- examples/destination-nat-exampleone-to-one-mapping
User: Luba*****![]() ![]() ![]() ![]() ![]() While my overall experience with killexams.com was great, I did not fare well in one assignment. Nevertheless, with the help of the killexams.com team, I succeeded in the second assignment quickly. Their exam simulator was excellent. |
User: Jules*****![]() ![]() ![]() ![]() ![]() After weeks of coaching with the Killexams.com material, I passed my PCNSA exam. The questions and answers in their package are accurate, and they are taken from the actual PCNSA exam. I found this to be immensely helpful, and I scored higher than I had hoped for. I am relieved to have passed and grateful for the assistance provided by Killexams.com. |
User: Mary*****![]() ![]() ![]() ![]() ![]() killexams.com is the best IT exam preparation resource I have come across. I passed the pcnsa exam without any problems. The questions are not only realistic but are based on the way pcnsa does it, making it easy to remember the answers during the exam. Though not all questions are a hundred percent identical, many are. If you study the material well, you will have no trouble sorting it out. It is useful for IT experts like me. |
User: Maryam*****![]() ![]() ![]() ![]() ![]() While there are many materials available online for various pcnsa certifications, I was hesitant to use free practice tests as they often contain inaccurate information, and the individuals who post them have no obligation to provide accurate information. So, I decided to purchase the Killexams.com pcnsa questions and answers, and I could not be happier. They provided me with real exam questions and answers, which made my preparation much easier. I passed the pcnsa exam with flying colors and did not have to stress about it at all. |
User: Stas*****![]() ![]() ![]() ![]() ![]() I am greatly obliged to Killexams.com for their trustworthy system to pass the exam. I would like to thank the Killexams.com questions and answers exam result for my achievement in the PCNSA exam. The exam was only three weeks away when I started to study with their resources, and it worked for me. I scored 89%, identifying how to finish the exam in due time. |
Features of iPass4sure PCNSA Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 437 Q&A
Get Full VersionAll Palo-Alto Exams
Palo-Alto ExamsCertification and Entry Test Exams
Complete exam list