Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PCNSA Exam Dumps - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Go to page:
Question # 17

Based on the network diagram provided, which two statements apply to traffic between the User and Server networks? (Choose two.)

A.

Traffic is permitted through the default intrazone "allow" rule.

B.

Traffic restrictions are possible by modifying intrazone rules.

C.

Traffic restrictions are not possible, because the networks are in the same zone.

D.

Traffic is permitted through the default interzone "allow" rule.

Full Access
Question # 18

Which definition describes the guiding principle of the zero-trust architecture?

A.

never trust, never connect

B.

always connect and verify

C.

never trust, always verify

D.

trust, but verity

Full Access
Question # 19

An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.

What type of Security policy rule is created?

A.

Tagged

B.

Intrazone

C.

Universal

D.

Interzone

Full Access
Question # 20

What do you configure if you want to set up a group of objects based on their ports alone?

A.

Application groups

B.

Service groups

C.

Address groups

D.

Custom objects

Full Access
Question # 21

What is considered best practice with regards to committing configuration changes?

A.

Disable the automatic commit feature that prioritizes content database installations before committing

B.

Validate configuration changes prior to committing

C.

Wait until all running and pending jobs are finished before committing

D.

Export configuration after each single configuration change performed

Full Access
Question # 22

In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns sessions?

A.

Destination IP Hash b

B.

Concurrent Sessions

C.

Max Sessions

D.

IP Modulo

Full Access
Question # 23

How are Application Fillers or Application Groups used in firewall policy?

A.

An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group

B.

An Application Filter is a dynamic way to group applications and can be configured as a nested member of an Application Group

C.

An Application Group is a dynamic way of grouping applications and can be configured as a nested member of an Application Group

D.

An Application Group is a static way of grouping applications and cannot be configured as a nested member of Application Group

Full Access
Question # 24

Which System log severity level would be displayed as a result of a user password change?

A.

High

B.

Critical

C.

Medium

D.

Low

Full Access
Go to page: