Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCNSA

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
02-02-2024
Geschreven in
2023/2024

A client downloads a malicious file from the internet. The Palo Alto firewall has a valid WildFire subscription. The Security policy rule shown above matches the client HTTP session: Which three actions take place when the firewall's Content-ID engine detects a virus in the file and the decoder action is set to "block"? (Choose three.) - A threat log entry is generated. The file download is terminated. The client receives a block page. A company has a pair of PA-3050s running PAN-OS 6.0.4. Antivirus, Threat Prevention, and URL Filtering Profiles are in place and properly configured on both inbound and outbound policies. A Security Operation Center (SOC) engineer starts his shift and faces the traffic logs presented in the screenshot shown above. He notices that the traffic is being allowed outbound. Which actions should the SOC engineer take to safely allow known but not yet qualified applications, without disrupting the remaining traffic policies? - Create Application Override policies after a packet capture to identify the applications that are triggering the "unknown-tcp". Then create new custom applications for those policies, and add these new policies above the current policy that allows the traffic. A company has a Palo Alto Networks firewall configured with the following three zones: Internet DMZ Inside. All users are located on the Inside zone and are using public DNS servers for name resolution. The company hosts a publicly accessible web application on a server in the DMZ zone. Which NAT rule configuration will allow users on the Inside zone to access the web application using its public IP address? - Three zone U-turn NAT A company has a Palo Alto Networks firewall configured with the following three zones: Untrust-L3 DMZ Trust-L3. The company hosts a publicly accessible web application on a server that resides in the Trust- L3 zone. The web server is associated with the following IP addresses: Web Server Public IP: 2.2.2.1/24 , Web Server Private IP: 192.168.1.10/24 . The security administrator configures the following two-zone

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

PCNSA Study Guide Sample Questions - All
Domains

Q1. Which two statements are true about a Role Based Admin Role Profile role? (Choose two.) - ✔✔It
can be used for CLI commands.

It can be used for XML API.



Q2. The management console supports which two authentication types? (Choose two.) - ✔✔RADIUS

TACACS+



Q3. Which two Dynamic Admin Role types are available on the PAN-OS software? (Choose two.) - ✔✔
superuser

device administrator (read-only)



Q4. Which type of profile does an authentication sequence include? - ✔✔Authentication



Q5. An Authentication profile includes which other type of profile? - ✔✔Server



Q6. True or false? Dynamic Admin Roles are called "dynamic" because you can customize them. - ✔✔
false



Q7. Which profile is used to override global minimum password complexity requirements? - ✔✔
Password



Q8. What does an application filter enable an administrator to do? - ✔✔dynamically categorize
multiple applications

, Q9. Which two items can be added to an application group? (Choose two.) - ✔✔application groups

application filters



Q10. What are two application characteristics? (Choose two.) - ✔✔excessive bandwidth use

evasive



Q.1 What will be the result of one or more occurrences of shadowing? - ✔✔a warning



Q2. Which column in the Applications and Threats screen includes the options Review Apps and Review
- ✔✔Action



Q3. Which link can you select in the web interface to minimize the risk of installing new App-ID updates?
- ✔✔Disable new apps in content update



Q5. Which two protocols are implicitly allowed when you select the facebook-base application? (Choose
two.) - ✔✔web-browsing

ssl



Q7. What are the two default (predefined) Security policy rule types in PAN-OS software? (Choose two.)
- ✔✔Interzone

Intrazone



Q8. Which type of Security policy rules most often exist above the two predefined Security policies? - ✔
✔Universal

Geschreven voor

Vak

Documentinformatie

Geüpload op
2 februari 2024
Aantal pagina's
8
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
dennisgathiru
5.0
(1)

Maak kennis met de verkoper

Seller avatar
dennisgathiru City University New York
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
2 jaar
Aantal volgers
2
Documenten
2234
Laatst verkocht
7 maanden geleden

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen