Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PCNSA Exam Dumps - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Go to page:
Question # 25

Which security profile should be used to classify malicious web content?

A.

URL Filtering

B.

Antivirus

C.

Web Content

D.

Vulnerability Protection

Full Access
Question # 26

Which type of address object is "10 5 1 1/0 127 248 2"?

A.

IP subnet

B.

IP wildcard mask

C.

IP netmask

D.

IP range

Full Access
Question # 27

Which two rule types allow the administrator to modify the destination zone? (Choose two )

A.

interzone

B.

intrazone

C.

universal

D.

shadowed

Full Access
Question # 28

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base.

On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days.

Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

A.

All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer matches the SuperApp-base application

B.

No impact because the apps were automatically downloaded and installed

C.

No impact because the firewall automatically adds the rules to the App-ID interface

D.

All traffic matching the SuperApp_base, SuperApp_chat, and SuperApp_download is denied until the security administrator approves the applications

Full Access
Question # 29

An administrator is reviewing another administrator s Security policy log settings

Which log setting configuration is consistent with best practices tor normal traffic?

A.

Log at Session Start and Log at Session End both enabled

B.

Log at Session Start disabled Log at Session End enabled

C.

Log at Session Start enabled Log at Session End disabled

D.

Log at Session Start and Log at Session End both disabled

Full Access
Question # 30

What are the two default behaviors for the intrazone-default policy? (Choose two.)

A.

Allow

B.

Logging disabled

C.

Log at Session End

D.

Deny

Full Access
Question # 31

View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 32

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Full Access
Go to page: