Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Paloalto Networks > Network Security Administrator > PCNSA

PCNSA Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Question and Answers

Question # 4

When a security rule is configured as Intrazone, which field cannot be changed?

A.

Actions

B.

Source Zone

C.

Application

D.

Destination Zone

Full Access
Question # 5

Which two rule types allow the administrator to modify the destination zone? (Choose two )

A.

interzone

B.

intrazone

C.

universal

D.

shadowed

Full Access
Question # 6

An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?

A.

Dynamic IP and Port

B.

Dynamic IP

C.

Static IP

D.

Destination

Full Access
Question # 7

Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?

A.

Palo Alto Networks Bulletproof IP Addresses

B.

Palo Alto Networks C&C IP Addresses

C.

Palo Alto Networks Known Malicious IP Addresses

D.

Palo Alto Networks High-Risk IP Addresses

Full Access
Question # 8

In a security policy what is the quickest way to rest all policy rule hit counters to zero?

A.

Use the CLI enter the command reset rules all

B.

Highlight each rule and use the Reset Rule Hit Counter > Selected Rules.

C.

use the Reset Rule Hit Counter > All Rules option.

D.

Reboot the firewall.

Full Access
Question # 9

Access to which feature requires PAN-OS Filtering licens?

A.

PAN-DB database

B.

URL external dynamic lists

C.

Custom URL categories

D.

DNS Security

Full Access
Question # 10

An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)

A.

Reset server

B.

Reset both

C.

Drop

D.

Deny

Full Access
Question # 11

Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?

A.

Threat Prevention License

B.

Threat Implementation License

C.

Threat Environment License

D.

Threat Protection License

Full Access
Question # 12

Given the topology, which zone type should you configure for firewall interface E1/1?

A.

Tap

B.

Tunnel

C.

Virtual Wire

D.

Layer3

Full Access
Question # 13

Which statement is true about Panorama managed devices?

A.

Panorama automatically removes local configuration locks after a commit from Panorama

B.

Local configuration locks prohibit Security policy changes for a Panorama managed device

C.

Security policy rules configured on local firewalls always take precedence

D.

Local configuration locks can be manually unlocked from Panorama

Full Access
Question # 14

What allows a security administrator to preview the Security policy rules that match new application signatures?

A.

Review Release Notes

B.

Dynamic Updates-Review Policies

C.

Dynamic Updates-Review App

D.

Policy Optimizer-New App Viewer

Full Access
Question # 15

Why does a company need an Antivirus profile?

A.

To prevent command-and-control traffic

B.

To protect against viruses, worms, and trojans

C.

To prevent known exploits

D.

To prevent access to malicious web content

Full Access
Question # 16

Complete the statement. A security profile can block or allow traffic____________

A.

on unknown-tcp or unknown-udp traffic

B.

after it is matched by a security policy that allows traffic

C.

before it is matched by a security policy

D.

after it is matched by a security policy that allows or blocks traffic

Full Access
Question # 17

Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?

A.

URL Filtering > Inline Categorization

B.

URL Filtering > Categories

C.

URL Filtering > URL Filtering Settings

D.

URL Filtering > HTTP Header Insertion

Full Access
Question # 18

Which two types of profiles are needed to create an authentication sequence? (Choose two.)

A.

Server profile

B.

Authentication profile

C.

Security profile

D.

Interface Management profile

Full Access
Question # 19

Which protocol used to map username to user groups when user-ID is configured?

A.

SAML

B.

RADIUS

C.

TACACS+

D.

LDAP

Full Access
Question # 20

After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.

Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

A.

Import named config snapshot

B.

Load named configuration snapshot

C.

Revert to running configuration

D.

Revert to last saved configuration

Full Access
Question # 21

Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.

Which Security policy rule will allow traffic to flow to the web server?

A.

Untrust (any) to DMZ (10.1.1.100), web browsing -Allow

B.

Untrust (any) to Untrust (1.1.1.100), web browsing - Allow

C.

Untrust (any) to Untrust (10.1.1.100), web browsing -Allow

D.

Untrust (any) to DMZ (1.1.1.100), web browsing - Allow

Full Access
Question # 22

Which rule type is appropriate for matching traffic both within and between the source and destination zones?

A.

interzone

B.

shadowed

C.

intrazone

D.

universal

Full Access
Question # 23

An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?

A.

Create an Application Filter and name it Office Programs, the filter it on the business-systems category, office-programs subcategory

B.

Create an Application Group and add business-systems to it

C.

Create an Application Filter and name it Office Programs, then filter it on the business-systems category

D.

Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office

Full Access
Question # 24

What do you configure if you want to set up a group of objects based on their ports alone?

A.

Application groups

B.

Service groups

C.

Address groups

D.

Custom objects

Full Access
Question # 25

What is a recommended consideration when deploying content updates to the firewall from Panorama?

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

Full Access
Question # 26

Which action would an administrator take to ensure that a service object will be available only to the selected device group?

A.

create the service object in the specific template

B.

uncheck the shared option

C.

ensure that disable override is selected

D.

ensure that disable override is cleared

Full Access
Question # 27

Based on the security policy rules shown, ssh will be allowed on which port?

A.

80

B.

53

C.

22

D.

23

Full Access
Question # 28

What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?

A.

every 5 minutes

B.

every 1 minute

C.

every 24 hours

D.

every 30 minutes

Full Access
Question # 29

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

A.

User identification

B.

Filtration protection

C.

Vulnerability protection

D.

Antivirus

E.

Application identification

F.

Anti-spyware

Full Access
Question # 30

An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)

A.

Packets sent/received

B.

IP Protocol

C.

Action

D.

Decrypted

Full Access
Question # 31

Which situation is recorded as a system log?

A.

An attempt to access a spoofed website has been blocked.

B.

A connection with an authentication server has been dropped.

C.

A file that has been analyzed is potentially dangerous for the system.

D.

A new asset has been discovered on the network.

Full Access
Question # 32

Where within the firewall GUI can all existing tags be viewed?

A.

Network > Tags

B.

Monitor > Tags

C.

Objects > Tags

D.

Policies > Tags

Full Access
Question # 33

Based on the screenshot what is the purpose of the included groups?

A.

They are only groups visible based on the firewall's credentials.

B.

They are used to map usernames to group names.

C.

They contain only the users you allow to manage the firewall.

D.

They are groups that are imported from RADIUS authentication servers.

Full Access
Question # 34

Which information is included in device state other than the local configuration?

A.

uncommitted changes

B.

audit logs to provide information of administrative account changes

C.

system logs to provide information of PAN-OS changes

D.

device group and template settings pushed from Panorama

Full Access
Question # 35

Which statement is true regarding a Best Practice Assessment?

A.

The BPA tool can be run only on firewalls

B.

It provides a percentage of adoption for each assessment data

C.

The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities

D.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture

Full Access
Question # 36

Which operations are allowed when working with App-ID application tags?

A.

Predefined tags may be deleted.

B.

Predefined tags may be augmented by custom tags.

C.

Predefined tags may be modified.

D.

Predefined tags may be updated by WildFire dynamic updates.

Full Access
Question # 37

Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)

A.

Static IP

B.

Dynamic IP / Port Fallback

C.

Dynamic IP

D.

Dynamic IP and Port (DIPP)

Full Access
Question # 38

Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?

A.

global

B.

intrazone

C.

interzone

D.

universal

Full Access
Question # 39

URL categories can be used as match criteria on which two policy types? (Choose two.)

A.

authentication

B.

decryption

C application override

C.

NAT

Full Access
Question # 40

What are three factors that can be used in domain generation algorithms? (Choose three.)

A.

cryptographic keys

B.

time of day

C.

other unique values

D.

URL custom categories

E.

IP address

Full Access
Question # 41

View the diagram.

What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 42

Which order of steps is the correct way to create a static route?

A.

1) Enter the route and netmask

2) Enter the IP address for the specific next hop

3) Specify the outgoing interface for packets to use to go to the next hop

4) Add an IPv4 or IPv6 route by name

B.

1) Enter the route and netmask

2) Specify the outgoing interface for packets to use to go to the next hop

3) Enter the IP address for the specific next hop

4) Add an IPv4 or IPv6 route by name

C.

1) Enter the IP address for the specific next hop

2) Enter the route and netmask

3) Add an IPv4 or IPv6 route by name

4) Specify the outgoing interface for packets to use to go to the next hop

D.

1) Enter the IP address for the specific next hop

2) Add an IPv4 or IPv6 route by name

3) Enter the route and netmask

4) Specify the outgoing interface for packets to use to go to the next hop

Full Access
Question # 43

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?

A.

Prisma SaaS

B.

Panorama

C.

AutoFocus

D.

GlobalProtect

Full Access
Question # 44

Which file is used to save the running configuration with a Palo Alto Networks firewall?

A.

running-config.xml

B.

run-config.xml

C.

running-configuration.xml

D.

run-configuratin.xml

Full Access
Question # 45

Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?

A.

SAML

B.

Multi-Factor Authentication

C.

Role-based

D.

Dynamic

Full Access
Question # 46

What are three Palo Alto Networks best practices when implementing the DNS Security Service? (Choose three.)

A.

Implement a threat intel program.

B.

Configure a URL Filtering profile.

C.

Train your staff to be security aware.

D.

Rely on a DNS resolver.

E.

Plan for mobile-employee risk

Full Access
Question # 47

You must configure which firewall feature to enable a data-plane interface to submit DNS queries on behalf of the control plane?

A.

Admin Role profile

B.

virtual router

C.

DNS proxy

D.

service route

Full Access
Question # 48

Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.

What is the quickest way to reset the hit counter to zero in all the security policy rules?

A.

At the CLI enter the command reset rules and press Enter

B.

Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule

C.

Reboot the firewall

D.

Use the Reset Rule Hit Counter > All Rules option

Full Access
Question # 49

During the packet flow process, which two processes are performed in application identification? (Choose two.)

A.

pattern based application identification

B.

application override policy match

C.

session application identified

D.

application changed from content inspection

Full Access
Question # 50

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

A.

block

B.

sinkhole

C.

alert

D.

allow

Full Access
Question # 51

You receive notification about new malware that infects hosts through malicious files transferred by FTP.

Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?

A.

URL Filtering profile applied to inbound Security policy rules.

B.

Data Filtering profile applied to outbound Security policy rules.

C.

Antivirus profile applied to inbound Security policy rules.

D.

Vulnerability Prote

ction profile applied to outbound Security policy rules.

Full Access
Question # 52

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?

A.

Management

B.

High Availability

C.

Aggregate

D.

Aggregation

Full Access
Question # 53

What does an administrator use to validate whether a session is matching an expected NAT policy?

A.

system log

B.

test command

C.

threat log

D.

config audit

Full Access
Question # 54

Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?

A.

intrazone

B.

interzone

C.

universal

D.

global

Full Access
Question # 55

Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?

A.

Inline Cloud Analysis

B.

Signature Exceptions

C.

Machine Learning Policies

D.

Signature Policies

Full Access
Question # 56

A website is unexpectedly allowed due to miscategorization.

What are two way-s to resolve this issue for a proper response? (Choose two.)

A.

Identify the URL category being assigned to the website.

Edit the active URL Filtering profile and update that category's site access settings to block.

B.

Create a URL category and assign the affected URL.

Update the active URL Filtering profile site access setting for the custom URL category to block.

C.

Review the categorization of the website on https://urlfiltering.paloaltonetworks.com.

Submit for "request change*, identifying the appropriate categorization, and wait for confirmation before testing again.

D.

Create a URL category and assign the affected URL.

Add a Security policy with a URL category qualifier of the custom URL category below the original policy. Set the policy action to Deny.

Full Access
Question # 57

An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.

Which configuration action should the administrator take when creating the address object?

A.

Ensure that the Shared option is checked.

B.

Ensure that the Shared option is cleared.

C.

Ensure that Disable Override is cleared.

D.

Tag the address object with the Global tag.

Full Access
Question # 58

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

A.

Aperture

B.

AutoFocus

C.

Parisma SaaS

D.

GlobalProtect

Full Access
Question # 59

An administrator would like to determine the default deny action for the application dns-over-https

Which action would yield the information?

A.

View the application details in beacon paloaltonetworks.com

B.

Check the action for the Security policy matching that traffic

C.

Check the action for the decoder in the antivirus profile

D.

View the application details in Objects > Applications

Full Access
Question # 60

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

A.

override

B.

allow

C.

block

D.

continue

Full Access
Question # 61

Based on the security policy rules shown, ssh will be allowed on which port?

A.

any port

B.

same port as ssl and snmpv3

C.

the default port

D.

only ephemeral ports

Full Access
Question # 62

Which interface does not require a MAC or IP address?

A.

Virtual Wire

B.

Layer3

C.

Layer2

D.

Loopback

Full Access
Question # 63

Selecting the option to revert firewall changes will replace what settings?

A.

The running configuration with settings from the candidate configuration

B.

The candidate configuration with settings from the running configuration

C.

The device state with settings from another configuration

D.

Dynamic update scheduler settings

Full Access
Question # 64

Which Security profile should be applied in order to protect against illegal code execution?

A.

Vulnerability Protection profile on allowed traffic

B.

Antivirus profile on allowed traffic

C.

Antivirus profile on denied traffic

D.

Vulnerability Protection profile on denied traffic

Full Access
Question # 65

An administrator is updating Security policy to align with best practices.

Which Policy Optimizer feature is shown in the screenshot below?

A.

Rules without App Controls

B.

New App Viewer

C.

Rule Usage

D.

Unused Unused Apps

Full Access
Question # 66

What must be considered with regards to content updates deployed from Panorama?

A.

Content update schedulers need to be configured separately per device group.

B.

Panorama can only install up to five content versions of the same type for potential rollback scenarios.

C.

A PAN-OS upgrade resets all scheduler configurations for content updates.

D.

Panorama can only download one content update at a time for content updates of the same type.

Full Access
Question # 67

An address object of type IP Wildcard Mask can be referenced in which part of the configuration?

A.

Security policy rule

B.

ACC global filter

C.

external dynamic list

D.

NAT address pool

Full Access
Question # 68

An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny. What deny action will the firewall perform?

A.

Drop the traffic silently

B.

Perform the default deny action as defined in the App-ID database for the application

C.

Send a TCP reset packet to the client- and server-side devices

D.

Discard the session's packets and send a TCP reset packet to let the client know the session has been terminated

Full Access
Question # 69

What is the best-practice approach to logging traffic that traverses the firewall?

A.

Enable both log at session start and log at session end.

B.

Enable log at session start only.

C.

Enable log at session end only.

D.

Disable all logging options.

Full Access
Question # 70

Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized.

Which user-ID agent sufficient in your network?

A.

PAN-OS integrated agent deployed on the firewall

B.

Windows-based agent deployed on the internal network a domain member

C.

Citrix terminal server agent deployed on the network

D.

Windows-based agent deployed on each domain controller

Full Access
Question # 71

Which feature must be configured to enable a data plane interface to submit DNS queries originated from the firewall on behalf of the control plane?

A.

Service route

B.

Admin role profile

C.

DNS proxy

D.

Virtual router

Full Access
Question # 72

An administrator is troubleshooting traffic that should match the interzone-default rule. However, the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was never changed from its default configuration.

Why doesn't the administrator see the traffic?

A.

Logging on the interzone-default policy is disabled.

B.

Traffic is being denied on the interzone-default policy.

C.

The Log Forwarding profile is not configured on the policy.

D.

The interzone-default policy is disabled by default.

Full Access
Question # 73

In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)

A.

Objects tab > Application Filters

B.

Policies tab > Security

C.

ACC tab > Global Filters

D.

Objects tab > Application Groups

E.

Objects tab > Applications

Full Access
Question # 74

Which interface type requires no routing or switching but applies Security or NAT policy rules before passing allowed traffic?

A.

Layer 3

B.

Virtual Wire

C.

Tap

D.

Layer 2

Full Access
Question # 75

Selecting the option to revert firewall changes will replace what settings?

A.

the running configuration with settings from the candidate configuration

B.

the device state with settings from another configuration

C.

the candidate configuration with settings from the running configuration

D.

dynamic update scheduler settings

Full Access
Question # 76

What are three ways application characteristics are used? (Choose three.)

A.

As an attribute to define an application group

B.

As a setting to define a new custom application

C.

As an Object to define Security policies

D.

As an attribute to define an application filter

E.

As a global filter in the Application Command Center (ACC)

Full Access
Question # 77

An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule. What is the best way to do this?

A.

Create a Security policy rule to allow the traffic.

B.

Create a new NAT rule with the correct parameters and leave the translation type as None

C.

Create a static NAT rule with an application override.

D.

Create a static NAT rule translating to the destination interface.

Full Access
Question # 78

A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.

Which two types of traffic will the rule apply to? (Choose two)

A.

traffic between zone IT and zone Finance

B.

traffic between zone Finance and zone HR

C.

traffic within zone IT

D.

traffic within zone HR

Full Access
Question # 79

Why should a company have a File Blocking profile that is attached to a Security policy?

A.

To block uploading and downloading of specific types of files

B.

To detonate files in a sandbox environment

C.

To analyze file types

D.

To block uploading and downloading of any type of files

Full Access
Question # 80

Which solution is a viable option to capture user identification when Active Directory is not in use?

A.

Cloud Identity Engine

B.

group mapping

C.

Directory Sync Service

D.

Authentication Portal

Full Access
Question # 81

Place the following steps in the packet processing order of operations from first to last.

Full Access
Question # 82

An administrator is configuring a NAT rule

At a minimum, which three forms of information are required? (Choose three.)

A.

name

B.

source zone

C.

destination interface

D.

destination address

E.

destination zone

Full Access
Question # 83

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

A.

domain controller

B.

TACACS+

C.

LDAP

D.

RADIUS

Full Access
Question # 84

Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks through DNS queries to malicious domains? (Choose two.)

A.

Deny

B.

Sinkhole

C.

Override

D.

Block

Full Access
Question # 85

An administrator would like to silently drop traffic from the internet to a ftp server.

Which Security policy action should the administrator select?

A.

Reset-server

B.

Block

C.

Deny

D.

Drop

Full Access
Question # 86

In order to attach an Antivirus, Anti-Spyware and Vulnerability Protection security profile to your Security Policy rules, which setting must be selected?

A.

Policies > Security > Actions Tab > Select Group-Profiles as Profile Type

B.

Policies > Security > Actions Tab > Select Default-Profiles as Profile Type

C.

Policies > Security > Actions Tab > Select Profiles as Profile Type

D.

Policies > Security > Actions Tab > Select Tagged-Profiles as Profile Type

Full Access
Question # 87

Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP Addresses list?

A.

destination address

B.

source address

C.

destination zone

D.

source zone

Full Access
Question # 88

Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?

A.

NAT Target Tab

B.

NAT Active/Active HA Binding Tab

C.

NAT Translated Packet Tab

D.

NAT Policies General Tab

Full Access
Question # 89

You have been tasked to configure access to a new web server located in the DMZ

Based on the diagram what configuration changes are required in the NGFW virtual router to route traffic from the 10 1 1 0/24 network to 192 168 1 0/24?

A.

Add a route with the destination of 192 168 1 0/24 using interface Eth 1/3 with a next-hop of 192.168 1.10

B.

Add a route with the destination of 192 168 1 0/24 using interface Eth 1/2 with a next-hop of 172.16.1.2

C.

Add a route with the destination of 192 168 1 0/24 using interface Eth 1/3 with a next-hop of 172.16.1.2

D.

Add a route with the destination of 192 168 1 0/24 using interface Eth 1/3 with a next-hop of 192.168.1.254

Full Access
Question # 90

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Full Access
Question # 91

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

A.

on the App Dependency tab in the Commit Status window

B.

on the Policy Optimizer's Rule Usage page

C on the Application tab in the Security Policy Rule creation window

C.

on the Objects > Applications browser pages

Full Access
Question # 92

Match the Cyber-Attack Lifecycle stage to its correct description.

Full Access
Question # 93

How many zones can an interface be assigned with a Palo Alto Networks firewall?

A.

two

B.

three

C.

four

D.

one

Full Access
Question # 94

Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?

A.

Objects > Schedules

B.

Policies > Policy Optimizer

C.

Monitor > Packet Capture

D.

Monitor > Reports

Full Access
Question # 95

Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?

A.

local username

B.

dynamic user group

C.

remote username

D.

static user group

Full Access
Question # 96

By default, what is the maximum number of templates that can be added to a template stack?

A.

6

B.

8

C.

10

D.

12

Full Access
Question # 97

Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?

A.

Review Policies

B.

Review Apps

C.

Pre-analyze

D.

Review App Matches

Full Access
Question # 98

Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?

A.

Objects > Dynamic Updates > Review App-IDs

B.

Device > Dynamic Updates > Review Policies

C.

Device > Dynamic Updates > Review App-IDs

D.

Objects > Dynamic Updates > Review Policies

Full Access
Question # 99

Files are sent to the WildFire cloud service via the WildFire Analysis Profile. How are these files used?

A.

WildFire signature updates

B.

Malware analysis

C.

Domain Generation Algorithm (DGA) learning

D.

Spyware analysis

Full Access
Question # 100

If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?

A.

Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL

B.

Configure a frequency schedule to clear group mapping cache

C.

Configure a Primary Employee ID number for user-based Security policies

D.

Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or 389

Full Access
Question # 101

What action will inform end users when their access to Internet content is being restricted?

A.

Create a custom 'URL Category' object with notifications enabled.

B.

Publish monitoring data for Security policy deny logs.

C.

Ensure that the 'site access" setting for all URL sites is set to 'alert'.

D.

Enable 'Response Pages' on the interface providing Internet access.

Full Access
Question # 102

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

Full Access
Question # 103

Match the Palo Alto Networks Security Operating Platform architecture to its description.

Full Access
Question # 104

Match each feature to the DoS Protection Policy or the DoS Protection Profile.

Full Access
Question # 105

What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?

A.

any supported Palo Alto Networks firewall or Prisma Access firewall

B.

an additional subscription free of charge

C.

a firewall device running with a minimum version of PAN-OS 10.1

D.

an additional paid subscription

Full Access
Question # 106

A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to

making the changes.

Which action will allow the administrator to undo the changes?

A.

Load configuration version, and choose the first item on the list.

B.

Load named configuration snapshot, and choose the first item on the list.

C.

Revert to last saved configuration.

D.

Revert to running configuration.

Full Access
Question # 107

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

A.

Network ab

B.

Policies

C.

Objects

D.

Device

Full Access
Question # 108

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

A.

Override

B.

Allow

C.

Block

D.

Continue

Full Access