Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PCNSC Exam Dumps - Palo Alto Networks Certified Network Security Consultant

Go to page:
Question # 4

A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the switch it connect.

How would an administrator configure the interface to IGbps?

A.

set deviceconfig system speed-duplex 10Gbps-full-duplex

B.

set deviceconfig interface speed-duplex 1Gbs--full-duplex

C.

set deviceconfig interface speed-duplex 1Gbs--half-duplex

D.

set deviceconfig system speed-duplex 1Gbs--half-duplex.

Full Access
Question # 5

An administrator deploys PA-500 NGFWs as an active/passive high availability pair . Thedevices are not participating in dynamic router and preemption is disabled.

What must be verified to upgrade the firewalls to the most recent version of PAN OS® software?

A.

Antivirus update package

B.

Applications and Threats update package

C.

Wildfire update package

D.

User-ID agent

Full Access
Question # 6

Which two action would be part of an automatic solution that would block sites with untrusted certificates without enabling SSLforward proxy? (Choose two.)

A.

Configure an EDL to pull IP Addresses of known sites resolved from a CRL.

B.

Create a Security Policy rule with vulnerability Security Profile attached.

C.

Create a no-decrypt Decryption Policy rule.

D.

Enable the "Block seasons with untrusted Issuers- setting.

E.

Configure a Dynamic Address Group for untrusted sites.

Full Access
Question # 7

An administrator wants multiple web servers in the DMZ to receive connections from the internet. Traffic destined for 206.15.22.9 port 80/TCP needs to be forwarded to the server at 10 1.22

Based on the information shown in the age, which NAT rule will forward web-browsing traffic correctly?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Which PAN-OS® policy must you configure to force a user to provide additional credential before he is allowed to access an internal application that contains highly sensitive business data?

A.

Authentication policy

B.

Decryption policy

C.

Security policy

D.

Application Override policy

Full Access
Go to page: