Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PCNSA Exam Dumps - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Go to page:
Question # 73

Which Security profile would you apply to identify infected hosts on the protected network uwall user database?

A.

Anti-spyware

B.

Vulnerability protection

C.

URL filtering

D.

Antivirus

Full Access
Question # 74

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

A.

Windows-based agent deployed on the internal network

B.

PAN-OS integrated agent deployed on the internal network

C.

Citrix terminal server deployed on the internal network

D.

Windows-based agent deployed on each of the WAN Links

Full Access
Question # 75

Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?

A.

Palo Alto Networks C&C IP Addresses

B.

Palo Alto Networks Bulletproof IP Addresses

C.

Palo Alto Networks High-Risk IP Addresses

D.

Palo Alto Networks Known Malicious IP Addresses

Full Access
Question # 76

How are service routes used in PAN-OS?

A.

By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network

B.

To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services

C.

For routing, because they are the shortest path selected by the BGP routing protocol

D.

To route management plane services through data interfaces rather than the management interface

Full Access
Question # 77

Which profile should be used to obtain a verdict regarding analyzed files?

A.

WildFire analysis

B.

Vulnerability profile

C.

Content-ID

D.

Advanced threat prevention

Full Access
Question # 78

Which update option is not available to administrators?

A.

New Spyware Notifications

B.

New URLs

C.

New Application Signatures

D.

New Malicious Domains

E.

New Antivirus Signatures

Full Access
Question # 79

What is the main function of the Test Policy Match function?

A.

verify that policy rules from Expedition are valid

B.

confirm that rules meet or exceed the Best Practice Assessment recommendations

C.

confirm that policy rules in the configuration are allowing/denying the correct traffic

D.

ensure that policy rules are not shadowing other policy rules

Full Access
Question # 80

An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)

A.

Packets sent/received

B.

IP Protocol

C.

Action

D.

Decrypted

Full Access
Go to page: