Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Question and Answers

Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Last Update May 3, 2024
Total Questions : 362

We are offering FREE PCNSA Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare PCNSA free exam questions and then go for complete pool of Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) test questions that will help you more.

PCNSA pdf

PCNSA PDF

$35  $99.99
PCNSA Engine

PCNSA Testing Engine

$42  $119.99
PCNSA PDF + Engine

PCNSA PDF + Testing Engine

$56  $159.99
Questions 1

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

Options:

A.  

domain controller

B.  

TACACS+

C.  

LDAP

D.  

RADIUS

Discussion 0
Questions 2

Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.

Options:

A.  

Exploitation

B.  

Installation

C.  

Reconnaissance

D.  

Act on the Objective

Discussion 0
Questions 3

Which path is used to save and load a configuration with a Palo Alto Networks firewall?

Options:

A.  

Device>Setup>Services

B.  

Device>Setup>Management

C.  

Device>Setup>Operations

D.  

Device>Setup>Interfaces

Discussion 0
Questions 4

Which objects would be useful for combining several services that are often defined together?

Options:

A.  

shared service objects

B.  

service groups

C.  

application groups

D.  

application filters

Discussion 0
Questions 5

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)

Options:

A.  

Security policy rules inspect but do not block traffic.

B.  

Security Profile should be used only on allowed traffic.

C.  

Security Profile are attached to security policy rules.

D.  

Security Policy rules are attached to Security Profiles.

E.  

Security Policy rules can block or allow traffic.

Discussion 0
Questions 6

An administrator is configuring a NAT rule

At a minimum, which three forms of information are required? (Choose three.)

Options:

A.  

name

B.  

source zone

C.  

destination interface

D.  

destination address

E.  

destination zone

Discussion 0
Questions 7

Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP –to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.

Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.

Options:

A.  

syslog

B.  

RADIUS

C.  

UID redistribution

D.  

XFF headers

Discussion 0
Questions 8

Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data plane? (Choose three )

Options:

A.  

TACACS

B.  

SAML2

C.  

SAML10

D.  

Kerberos

E.  

TACACS+

Discussion 0
Questions 9

In a File Blocking profile, which two actions should be taken to allow file types that support critical apps? (Choose two.)

Options:

A.  

Clone and edit the Strict profile.

B.  

Use URL filtering to limit categories in which users can transfer files.

C.  

Set the action to Continue.

D.  

Edit the Strict profile.

Discussion 0
Questions 10

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

Options:

A.  

Data redistribution

B.  

Dynamic updates

C.  

SNMP setup

D.  

Service route

Discussion 0
Questions 11

By default, what is the maximum number of templates that can be added to a template stack?

Options:

A.  

6

B.  

8

C.  

10

D.  

12

Discussion 0
Questions 12

Which setting is available to edit when a tag is created on the local firewall?

Options:

A.  

Location

B.  

Color

C.  

Order

D.  

Priority

Discussion 0
Questions 13

Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic

Which statement accurately describes how the firewall will apply an action to matching traffic?

Options:

A.  

If it is an allowed rule, then the Security Profile action is applied last

B.  

If it is a block rule then the Security policy rule action is applied last

C.  

If it is an allow rule then the Security policy rule is applied last

D.  

If it is a block rule then Security Profile action is applied last

Discussion 0
Questions 14

Which security profile should be used to classify malicious web content?

Options:

A.  

URL Filtering

B.  

Antivirus

C.  

Web Content

D.  

Vulnerability Protection

Discussion 0
Questions 15

What are three configurable interface types for a data-plane ethernet interface? (Choose three.)

Options:

A.  

Layer 3

B.  

HSCI

C.  

VWire

D.  

Layer 2

E.  

Management

Discussion 0
Questions 16

Which feature enables an administrator to review the Security policy rule base for unused rules?

Options:

A.  

Security policy tags

B.  

Test Policy Match

C.  

View Rulebase as Groups

D.  

Policy Optimizer

Discussion 0
Questions 17

An administrator is troubleshooting traffic that should match the interzone-default rule. However, the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was never changed from its default configuration.

Why doesn't the administrator see the traffic?

Options:

A.  

Logging on the interzone-default policy is disabled.

B.  

Traffic is being denied on the interzone-default policy.

C.  

The Log Forwarding profile is not configured on the policy.

D.  

The interzone-default policy is disabled by default.

Discussion 0
Questions 18

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

Options:

A.  

It uses techniques such as DG

A.  

DNS tunneling detection and machine learning.

B.  

It requires a valid Threat Prevention license.

C.  

It enables users to access real-time protections using advanced predictive analytics.

D.  

It requires a valid URL Filtering license.

E.  

It requires an active subscription to a third-party DNS Security service.

Discussion 0
Questions 19

An administrator is reviewing the Security policy rules shown in the screenshot below.

Which statement is correct about the information displayed?

Options:

A.  

Eleven rules use the "Infrastructure* tag.

B.  

The view Rulebase as Groups is checked.

C.  

There are seven Security policy rules on this firewall.

D.  

Highlight Unused Rules is checked.

Discussion 0
Questions 20

Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?

Options:

A.  

Objects > Schedules

B.  

Policies > Policy Optimizer

C.  

Monitor > Packet Capture

D.  

Monitor > Reports

Discussion 0
Questions 21

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?

Options:

A.  

Windows session monitoring via a domain controller

B.  

passive server monitoring using the Windows-based agent

C.  

Captive Portal

D.  

passive server monitoring using a PAN-OS integrated User-ID agent

Discussion 0
Questions 22

In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)

Options:

A.  

URL Filtering

B.  

Vulnerability Protection

C.  

Antivirus b

D.  

Anti-spyware

Discussion 0
Questions 23

What is the maximum volume of concurrent administrative account sessions?

Options:

A.  

Unlimited

B.  

2

C.  

10

D.  

1

Discussion 0
Questions 24

Which license is required to use the Palo Alto Networks built-in IP address EDLs?

Options:

A.  

DNS Security

B.  

Threat Prevention

C.  

WildFire

D.  

SD-Wan

Discussion 0
Questions 25

In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns sessions?

Options:

A.  

Destination IP Hash b

B.  

Concurrent Sessions

C.  

Max Sessions

D.  

IP Modulo

Discussion 0
Questions 26

Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?

Options:

A.  

Palo Alto Networks Bulletproof IP Addresses

B.  

Palo Alto Networks C&C IP Addresses

C.  

Palo Alto Networks Known Malicious IP Addresses

D.  

Palo Alto Networks High-Risk IP Addresses

Discussion 0
Questions 27

According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?

Options:

A.  

by minute

B.  

hourly

C.  

daily

D.  

weekly

Discussion 0
Questions 28

Which feature enables an administrator to review the Security policy rule base for unused rules?

Options:

A.  

Test Policy Match

B.  

Policy Optimizer

C.  

View Rulebase as Groups

D.  

Security policy tags eb

Discussion 0
Questions 29

An administrator is updating Security policy to align with best practices.

Which Policy Optimizer feature is shown in the screenshot below?

Options:

A.  

Rules without App Controls

B.  

New App Viewer

C.  

Rule Usage

D.  

Unused Unused Apps

Discussion 0
Questions 30

Access to which feature requires the PAN-OS Filtering license?

Options:

A.  

PAN-DB database

B.  

DNS Security

C.  

Custom URL categories

D.  

URL external dynamic lists

Discussion 0
Questions 31

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)

Options:

A.  

QoS profile

B.  

DoS Protection profile

C.  

Zone Protection profile

D.  

DoS Protection policy

Discussion 0
Questions 32

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

Options:

A.  

It functions like PAN-DB and requires activation through the app portal.

B.  

It removes the 100K limit for DNS entries for the downloaded DNS updates.

C.  

IT eliminates the need for dynamic DNS updates.

D.  

IT is automatically enabled and configured.

Discussion 0
Questions 33

Match the Cyber-Attack Lifecycle stage to its correct description.

Options:

Discussion 0
Questions 34

What are three valid ways to map an IP address to a username? (Choose three.)

Options:

A.  

using the XML API

B.  

DHCP Relay logs

C.  

a user connecting into a GlobalProtect gateway using a GlobalProtect Agent

D.  

usernames inserted inside HTTP Headers

E.  

WildFire verdict reports

Discussion 0
Questions 35

Which operations are allowed when working with App-ID application tags?

Options:

A.  

Predefined tags may be deleted.

B.  

Predefined tags may be augmented by custom tags.

C.  

Predefined tags may be modified.

D.  

Predefined tags may be updated by WildFire dynamic updates.

Discussion 0
Questions 36

How does the Policy Optimizer policy view differ from the Security policy view?

Options:

A.  

It provides sorting options that do not affect rule order.

B.  

It displays rule utilization.

C.  

It details associated zones.

D.  

It specifies applications seen by rules.

Discussion 0
Questions 37

Place the following steps in the packet processing order of operations from first to last.

Options:

Discussion 0
Questions 38

Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.

Which two Security policy rules will accomplish this configuration? (Choose two.)

Options:

A.  

Untrust (Any) to DMZ (1.1.1.100), ssh - Allow

B.  

Untrust (Any) to Untrust (10.1.1.1), web-browsing -Allow

C.  

Untrust (Any) to Untrust (10.1.1.1), ssh -Allow

D.  

Untrust (Any)to DMZ (10.1.1.100. 10.1.1.101), ssh, web-browsing-Allow

E.  

Untrust (Any) to DMZ (1.1.1.100), web-browsing - Allow

Discussion 0
Questions 39

An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?

Options:

A.  

branch office traffic

B.  

north-south traffic

C.  

perimeter traffic

D.  

east-west traffic

Discussion 0
Questions 40

If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 41

An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240 addresses and found that connections from addresses that needed new translations were being dropped.

Which type of NAT was configured?

Options:

A.  

Static IP

B.  

Dynamic IP

C.  

Destination NAT

D.  

Dynamic IP and Port

Discussion 0
Questions 42

Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?

Options:

A.  

Review Policies

B.  

Review Apps

C.  

Pre-analyze

D.  

Review App Matches

Discussion 0
Questions 43

Identify the correct order to configure the PAN-OS integrated USER-ID agent.

3. add the service account to monitor the server(s)

2. define the address of the servers to be monitored on the firewall

4. commit the configuration, and verify agent connection status

1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent

Options:

A.  

2-3-4-1

B.  

1-4-3-2

C.  

3-1-2-4

D.  

1-3-2-4

Discussion 0
Questions 44

In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)

Options:

A.  

Objects tab > Application Filters

B.  

Policies tab > Security

C.  

ACC tab > Global Filters

D.  

Objects tab > Application Groups

E.  

Objects tab > Applications

Discussion 0
Questions 45

Which object would an administrator create to block access to all high-risk applications?

Options:

A.  

HIP profile

B.  

application filter

C.  

application group

D.  

Vulnerability Protection profile

Discussion 0
Questions 46

Which dynamic update type includes updated anti-spyware signatures?

Options:

A.  

Applications and Threats

B.  

GlobalProtect Data File

C.  

Antivirus

D.  

PAN-DB

Discussion 0
Questions 47

Which Security profile can you apply to protect against malware such as worms and Trojans?

Options:

A.  

data filtering

B.  

antivirus

C.  

vulnerability protection

D.  

anti-spyware

Discussion 0
Questions 48

Which statement best describes the use of Policy Optimizer?

Options:

A.  

Policy Optimizer can display which Security policies have not been used in the last 90 days

B.  

Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications

C.  

Policy Optimizer can add or change a Log Forwarding profile for each Secunty policy selected

D.  

Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID Security policy for every Layer 4 policy that exists Admins can then manually enable policies they want to keep and delete ones they want to remove

Discussion 0
Questions 49

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application

Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

Options:

A.  

Data Filtering Profile applied to outbound Security policy rules

B.  

Antivirus Profile applied to outbound Security policy rules

C.  

Data Filtering Profile applied to inbound Security policy rules

D.  

Vulnerability Profile applied to inbound Security policy rules

Discussion 0
Questions 50

The NetSec Manager asked to create a new firewall Local Administrator profile with customized privileges named NewAdmin. This new administrator has to authenticate without inserting any username or password to access the WebUI.

What steps should the administrator follow to create the New_Admin Administrator profile?

Options:

A.  

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Role Based.

3. Issue to the Client a Certificate with Common Name = NewAdmin

B.  

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Certificate Name = NewAdmin

C.  

1. Set the Authentication profile to Local.

2. Select the "Use only client certificate authentication" check box.

3. Set Role to Role Based.

D.  

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Common Name = New Admin

Discussion 0
Questions 51

What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?

Options:

A.  

Increase the backup capacity for configuration backups per firewall

B.  

Increase the per-firewall capacity for address and service objects

C.  

Reduce the configuration and session synchronization time between HA pairs

D.  

Reduce the number of objects pushed to a firewall

Discussion 0
Questions 52

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

Options:

A.  

on the App Dependency tab in the Commit Status window

B.  

on the Policy Optimizer's Rule Usage page

C on the Application tab in the Security Policy Rule creation window

C.  

on the Objects > Applications browser pages

Discussion 0
Questions 53

Which administrator type utilizes predefined roles for a local administrator account?

Options:

A.  

Superuser

B.  

Role-based

C.  

Dynamic

D.  

Device administrator

Discussion 0
Questions 54

Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications

Which policy achieves the desired results?

A)

B)

C)

D)

Options:

A.  

Option

B.  

Option

C.  

Option

D.  

Option

Discussion 0
Questions 55

When a security rule is configured as Intrazone, which field cannot be changed?

Options:

A.  

Actions

B.  

Source Zone

C.  

Application

D.  

Destination Zone

Discussion 0
Questions 56

Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?

Options:

A.  

Apps Allowed

B.  

Name

C.  

Apps Seen

D.  

Service

Discussion 0
Questions 57

An administrator wants to prevent users from submitting corporate credentials in a phishing attack.

Which Security profile should be applied?

Options:

A.  

antivirus

B.  

anti-spyware

C.  

URL filtering

D.  

vulnerability protection

Discussion 0
Questions 58

Which two options does the firewall use to dynamically populate address group members? (Choose two.)

Options:

A.  

IP Addresses

B.  

Tags

C.  

MAC Addresses

D.  

Tag-based filters

Discussion 0
Questions 59

Which statement is true regarding a Best Practice Assessment?

Options:

A.  

The BPA tool can be run only on firewalls

B.  

It provides a percentage of adoption for each assessment data

C.  

The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities

D.  

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture

Discussion 0
Questions 60

What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?

Options:

A.  

any supported Palo Alto Networks firewall or Prisma Access firewall

B.  

an additional subscription free of charge

C.  

a firewall device running with a minimum version of PAN-OS 10.1

D.  

an additional paid subscription

Discussion 0
Questions 61

What are three factors that can be used in domain generation algorithms? (Choose three.)

Options:

A.  

cryptographic keys

B.  

time of day

C.  

other unique values

D.  

URL custom categories

E.  

IP address

Discussion 0
Questions 62

Which profile should be used to obtain a verdict regarding analyzed files?

Options:

A.  

WildFire analysis

B.  

Vulnerability profile

C.  

Content-ID

D.  

Advanced threat prevention

Discussion 0
Questions 63

Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?

Options:

A.  

Application Category

B.  

Source

C.  

File Size

D.  

Direction

Discussion 0
Questions 64

At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?

Options:

A.  

after clicking Check New in the Dynamic Update window

B.  

after connecting the firewall configuration

C.  

after downloading the update

D.  

after installing the update

Discussion 0
Questions 65

An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule. What is the best way to do this?

Options:

A.  

Create a Security policy rule to allow the traffic.

B.  

Create a new NAT rule with the correct parameters and leave the translation type as None

C.  

Create a static NAT rule with an application override.

D.  

Create a static NAT rule translating to the destination interface.

Discussion 0
Questions 66

If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?

Options:

A.  

Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL

B.  

Configure a frequency schedule to clear group mapping cache

C.  

Configure a Primary Employee ID number for user-based Security policies

D.  

Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or 389

Discussion 0
Questions 67

What are three differences between security policies and security profiles? (Choose three.)

Options:

A.  

Security policies are attached to security profiles

B.  

Security profiles are attached to security policies

C.  

Security profiles should only be used on allowed traffic

D.  

Security profiles are used to block traffic by themselves

E.  

Security policies can block or allow traffic

Discussion 0
Questions 68

Which statement is true regarding NAT rules?

Options:

A.  

Static NAT rules have precedence over other forms of NAT.

B.  

Translation of the IP address and port occurs before security processing.

C.  

NAT rules are processed in order from top to bottom.

D.  

Firewall supports NAT on Layer 3 interfaces only.

Discussion 0
Questions 69

Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?

Options:

A.  

Review Apps

B.  

Review App Matches

C.  

Pre-analyze

D.  

Review Policies

Discussion 0
Questions 70

Which type firewall configuration contains in-progress configuration changes?

Options:

A.  

backup

B.  

running

C.  

candidate

D.  

committed

Discussion 0
Questions 71

A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?

Options:

A.  

Create a custom-service-object called SERVICE-SSH for destination-port-TCP-22. Create a security-rule between zone USERS and OUTSIDE to allow traffic from any source IP-address to any destination IP-address for SERVICE-SSH

B.  

Create a security-rule that allows traffic from zone USERS to OUTSIDE to allow traffic from any source IP-address to any destination IP-address for application SSH

C.  

In addition to option a, a custom-service-object called SERVICE-SSH-RETURN that contains source-port-TCP-22 should be created. A second security-rule is required that allows traffic from zone OUTSIDE to USERS for SERVICE-SSH-RETURN for any source-IP-address to any destination-Ip-address

D.  

In addition to option c, an additional rule from zone OUTSIDE to USERS for application SSH from any source-IP-address to any destination-IP-address is required to allow the return-traffic from the SSH-servers to reach the server-admin

Discussion 0
Questions 72

Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP Addresses list?

Options:

A.  

destination address

B.  

source address

C.  

destination zone

D.  

source zone

Discussion 0
Questions 73

Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)

Options:

A.  

Static IP

B.  

Dynamic IP / Port Fallback

C.  

Dynamic IP

D.  

Dynamic IP and Port (DIPP)

Discussion 0
Questions 74

Which Security policy set should be used to ensure that a policy is applied first?

Options:

A.  

Child device-group pre-rulebase

B.  

Shared pre-rulebase

C.  

Parent device-group pre-rulebase

D.  

Local firewall policy

Discussion 0
Questions 75

What is a recommended consideration when deploying content updates to the firewall from Panorama?

Options:

A.  

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.  

Content updates for firewall A/A HA pairs need a defined master device.

C.  

Before deploying content updates, always check content release version compatibility.

D.  

After deploying content updates, perform a commit and push to Panorama.

Discussion 0
Questions 76

Place the steps in the correct packet-processing order of operations.

Options:

Discussion 0
Questions 77

An administrator has configured a Security policy where the matching condition includes a single application and the action is deny

If the application s default deny action is reset-both what action does the firewall take*?

Options:

A.  

It sends a TCP reset to the client-side and server-side devices

B.  

It silently drops the traffic and sends an ICMP unreachable code

C.  

It silently drops the traffic

D.  

It sends a TCP reset to the server-side device

Discussion 0
Questions 78

When HTTPS for management and GlobalProtect are enabled on the same data plane interface, which TCP port is used for management access?

Options:

A.  

80

B.  

443

C.  

4443

D.  

8443

Discussion 0
Questions 79

An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?

Options:

A.  

Create an Application Filter and name it Office Programs, the filter it on the business-systems category, office-programs subcategory

B.  

Create an Application Group and add business-systems to it

C.  

Create an Application Filter and name it Office Programs, then filter it on the business-systems category

D.  

Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office

Discussion 0
Questions 80

Why should a company have a File Blocking profile that is attached to a Security policy?

Options:

A.  

To block uploading and downloading of specific types of files

B.  

To detonate files in a sandbox environment

C.  

To analyze file types

D.  

To block uploading and downloading of any type of files

Discussion 0
Questions 81

Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?

Options:

A.  

intrazone

B.  

interzone

C.  

universal

D.  

global

Discussion 0
Questions 82

Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?

Options:

A.  

global

B.  

intrazone

C.  

interzone

D.  

universal

Discussion 0
Questions 83

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

Options:

A.  

GlobalProtect

B.  

Panorama

C.  

Aperture

D.  

AutoFocus

Discussion 0
Questions 84

What is an advantage for using application tags?

Options:

A.  

They are helpful during the creation of new zones

B.  

They help with the design of IP address allocations in DHCP.

C.  

They help content updates automate policy updates

D.  

They help with the creation of interfaces

Discussion 0
Questions 85

What is a prerequisite before enabling an administrative account which relies on a local firewall user database?

Options:

A.  

Configure an authentication policy

B.  

Configure an authentication sequence

C.  

Configure an authentication profile

D.  

Isolate the management interface on a dedicated management VLAN

Discussion 0
Questions 86

Which option is part of the content inspection process?

Options:

A.  

IPsec tunnel encryption

B.  

Packet egress process

C.  

SSL Proxy re-encrypt

D.  

Packet forwarding process

Discussion 0
Questions 87

Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)

Options:

A.  

Path monitoring does not determine if route is useable

B.  

Route with highest metric is actively used

C.  

Path monitoring determines if route is useable

D.  

Route with lowest metric is actively used

Discussion 0
Questions 88

How are service routes used in PAN-OS?

Options:

A.  

By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network

B.  

To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services

C.  

For routing, because they are the shortest path selected by the BGP routing protocol

D.  

To route management plane services through data interfaces rather than the management interface

Discussion 0
Questions 89

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

Options:

A.  

override

B.  

allow

C.  

block

D.  

continue

Discussion 0
Questions 90

Which rule type is appropriate for matching traffic occurring within a specified zone?

Options:

A.  

Interzone

B.  

Universal

C.  

Intrazone

D.  

Shadowed

Discussion 0
Questions 91

Which order of steps is the correct way to create a static route?

Options:

A.  

1) Enter the route and netmask

2) Enter the IP address for the specific next hop

3) Specify the outgoing interface for packets to use to go to the next hop

4) Add an IPv4 or IPv6 route by name

B.  

1) Enter the route and netmask

2) Specify the outgoing interface for packets to use to go to the next hop

3) Enter the IP address for the specific next hop

4) Add an IPv4 or IPv6 route by name

C.  

1) Enter the IP address for the specific next hop

2) Enter the route and netmask

3) Add an IPv4 or IPv6 route by name

4) Specify the outgoing interface for packets to use to go to the next hop

D.  

1) Enter the IP address for the specific next hop

2) Add an IPv4 or IPv6 route by name

3) Enter the route and netmask

4) Specify the outgoing interface for packets to use to go to the next hop

Discussion 0
Questions 92

The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.

Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)

Options:

A.  

Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.

B.  

Manually remove powerball.com from the gambling URL category.

C.  

Add *.powerball.com to the allow list

D.  

Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.

Discussion 0
Questions 93

Which two types of profiles are needed to create an authentication sequence? (Choose two.)

Options:

A.  

Server profile

B.  

Authentication profile

C.  

Security profile

D.  

Interface Management profile

Discussion 0
Questions 94

Which Security policy action will message a user's browser thai their web session has been terminated?

Options:

A.  

Reset server

B.  

Deny

C.  

Drop

D.  

Reset client

Discussion 0
Questions 95

Which two statements are correct about App-ID content updates? (Choose two.)

Options:

A.  

Updated application content may change how security policy rules are enforced

B.  

After an application content update, new applications must be manually classified prior to use

C.  

Existing security policy rules are not affected by application content updates

D.  

After an application content update, new applications are automatically identified and classified

Discussion 0
Questions 96

An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"

Which security policy action causes this?

Options:

A.  

Drop

B.  

Drop, send ICMP Unreachable

C.  

Reset both

D.  

Reset server

Discussion 0
Questions 97

What Policy Optimizer policy view differ from the Security policy do?

Options:

A.  

It shows rules that are missing Security profile configurations.

B.  

It indicates rules with App-ID that are not configured as port-based.

C.  

It shows rules with the same Source Zones and Destination Zones.

D.  

It indicates that a broader rule matching the criteria is configured above a more specific rule.

Discussion 0
Questions 98

What do you configure if you want to set up a group of objects based on their ports alone?

Options:

A.  

Application groups

B.  

Service groups

C.  

Address groups

D.  

Custom objects

Discussion 0
Questions 99

An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.

What type of Security policy rule is created?

Options:

A.  

Tagged

B.  

Intrazone

C.  

Universal

D.  

Interzone

Discussion 0
Questions 100

Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)

Options:

A.  

GlobalProtect agent

B.  

XML API

C.  

User-ID Windows-based agent

D.  

log forwarding auto-tagging

Discussion 0
Questions 101

A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

Options:

A.  

Windows-based agent on a domain controller

B.  

Captive Portal

C.  

Citrix terminal server with adequate data-plane resources

D.  

PAN-OS integrated agent

Discussion 0
Questions 102

Which three configuration settings are required on a Palo Alto networks firewall management interface?

Options:

A.  

default gateway

B.  

netmask

C.  

IP address

D.  

hostname

E.  

auto-negotiation

Discussion 0
Questions 103

How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?

Options:

A.  

Select the unified log entry in the side menu.

B.  

Modify the number of columns visible on the page

C.  

Modify the number of logs visible on each page.

D.  

Select the system logs entry in the side menu.

Discussion 0
Questions 104

A website is unexpectedly allowed due to miscategorization.

What are two way-s to resolve this issue for a proper response? (Choose two.)

Options:

A.  

Identify the URL category being assigned to the website.

Edit the active URL Filtering profile and update that category's site access settings to block.

B.  

Create a URL category and assign the affected URL.

Update the active URL Filtering profile site access setting for the custom URL category to block.

C.  

Review the categorization of the website on https://urlfiltering.paloaltonetworks.com.

Submit for "request change*, identifying the appropriate categorization, and wait for confirmation before testing again.

D.  

Create a URL category and assign the affected URL.

Add a Security policy with a URL category qualifier of the custom URL category below the original policy. Set the policy action to Deny.

Discussion 0
Questions 105

All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.

Complete the empty field in the Security policy using an application object to permit only this type of access.

Source Zone: Internal -

Destination Zone: DMZ Zone -

Application: __________

Service: application-default -

Action: allow

Options:

A.  

Application = "any"

B.  

Application = "web-browsing"

C.  

Application = "ssl"

D.  

Application = "http"

Discussion 0
Questions 106

The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the laptop.

Which security profile feature could have been used to prevent the communication with the CnC server?

Options:

A.  

Create an anti-spyware profile and enable DNS Sinkhole

B.  

Create an antivirus profile and enable DNS Sinkhole

C.  

Create a URL filtering profile and block the DNS Sinkhole category

D.  

Create a security policy and enable DNS Sinkhole

Discussion 0
Questions 107

Which statements is true regarding a Heatmap report?

Options:

A.  

When guided by authorized sales engineer, it helps determine te areas of greatest security risk.

B.  

It provides a percentage of adoption for each assessment area.

C.  

It runs only on firewall.

D.  

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.

Discussion 0
Questions 108

Selecting the option to revert firewall changes will replace what settings?

Options:

A.  

the running configuration with settings from the candidate configuration

B.  

the device state with settings from another configuration

C.  

the candidate configuration with settings from the running configuration

D.  

dynamic update scheduler settings

Discussion 0