Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PCNSA Exam Dumps - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Go to page:
Question # 41

When is the content inspection performed in the packet flow process?

A.

after the application has been identified

B.

after the SSL Proxy re-encrypts the packet

C.

before the packet forwarding process

D.

before session lookup

Full Access
Question # 42

What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?

A.

authentication sequence

B.

LDAP server profile

C.

authentication server list

D.

authentication list profile

Full Access
Question # 43

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

A.

on the App Dependency tab in the Commit Status window

B.

on the Policy Optimizer's Rule Usage page

C on the Application tab in the Security Policy Rule creation window

C.

on the Objects > Applications browser pages

Full Access
Question # 44

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

A.

Data redistribution

B.

Dynamic updates

C.

SNMP setup

D.

Service route

Full Access
Question # 45

An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"

Which security policy action causes this?

A.

Drop

B.

Drop, send ICMP Unreachable

C.

Reset both

D.

Reset server

Full Access
Question # 46

Which license is required to use the Palo Alto Networks built-in IP address EDLs?

A.

DNS Security

B.

Threat Prevention

C.

WildFire

D.

SD-Wan

Full Access
Question # 47

Which feature enables an administrator to review the Security policy rule base for unused rules?

A.

Test Policy Match

B.

Policy Optimizer

C.

View Rulebase as Groups

D.

Security policy tags eb

Full Access
Question # 48

Which three filter columns are available when setting up an Application Filter? (Choose three.)

A.

Parent App

B.

Category

C.

Risk

D.

Standard Ports

E.

Subcategory

Full Access
Go to page: