Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks PCNSA Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Exam Practice Test

Page: 1 / 36
Total 362 questions

Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Questions and Answers

Question 1

Based on the screenshot what is the purpose of the group in User labelled ''it"?

Question # 1

Options:

A.

Allows users to access IT applications on all ports

B.

Allows users in group "DMZ" lo access IT applications

C.

Allows "any" users to access servers in the DMZ zone

D.

Allows users in group "it" to access IT applications

Question 2

What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)

Options:

A.

Service

B.

User

C.

Application

D.

Address

E.

Zone ab

Question 3

Which System log severity level would be displayed as a result of a user password change?

Options:

A.

High

B.

Critical

C.

Medium

D.

Low

Question 4

What is used to monitor Security policy applications and usage?

Options:

A.

Policy Optimizer

B.

App-ID

C.

Security profile

D.

Policy-based forwarding

Question 5

The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access the PowerBall Lottery website (www.powerball.com) for just this week. However, the company does not want employees to access any other websites also listed in the URL filtering “gambling” category.

Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the “gambling” URL category?

Options:

A.

Add just the URL www.powerball.com to a Security policy allow rule.

B.

Manually remove powerball.com from the gambling URL category.

C.

Add *.powerball.com to the URL Filtering allow list.

D.

Create a custom URL category, add *.powerball.com to it and allow it in the Security Profile.

Question 6

What is considered best practice with regards to committing configuration changes?

Options:

A.

Disable the automatic commit feature that prioritizes content database installations before committing

B.

Validate configuration changes prior to committing

C.

Wait until all running and pending jobs are finished before committing

D.

Export configuration after each single configuration change performed

Question 7

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?

Options:

A.

DoS protection

B.

URL filtering

C.

packet buffering

D.

anti-spyware

Question 8

Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and risky websites?

Options:

A.

reconnaissance

B.

delivery

C.

exploitation

D.

installation

Question 9

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

Options:

A.

Aperture

B.

AutoFocus

C.

Parisma SaaS

D.

GlobalProtect

Question 10

What must be considered with regards to content updates deployed from Panorama?

Options:

A.

Content update schedulers need to be configured separately per device group.

B.

Panorama can only install up to five content versions of the same type for potential rollback scenarios.

C.

A PAN-OS upgrade resets all scheduler configurations for content updates.

D.

Panorama can only download one content update at a time for content updates of the same type.

Question 11

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

Options:

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Question 12

An address object of type IP Wildcard Mask can be referenced in which part of the configuration?

Options:

A.

Security policy rule

B.

ACC global filter

C.

external dynamic list

D.

NAT address pool

Question 13

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?

Question # 13

Options:

A.

It defines the SSUTLS encryption strength used to protect the management interface.

B.

It defines the CA certificate used to verify the client's browser.

C.

It defines the certificate to send to the client's browser from the management interface.

D.

It defines the firewall's global SSL/TLS timeout values.

Question 14

Match the Cyber-Attack Lifecycle stage to its correct description.

Question # 14

Options:

Question 15

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Options:

A.

Active Directory monitoring

B.

Windows session monitoring

C.

Windows client probing

D.

domain controller monitoring

Question 16

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

Options:

A.

global

B.

intrazone

C.

interzone

D.

universal

Question 17

Based on the show security policy rule would match all FTP traffic from the inside zone to the outside zone?

Question # 17

Options:

A.

internal-inside-dmz

B.

engress outside

C.

inside-portal

D.

intercone-default

Question 18

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

Options:

A.

It uses techniques such as DGA.DNS tunneling detection and machine learning.

B.

It requires a valid Threat Prevention license.

C.

It enables users to access real-time protections using advanced predictive analytics.

D.

It requires a valid URL Filtering license.

E.

It requires an active subscription to a third-party DNS Security service.

Question 19

Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )

Options:

A.

Network Processing Engine

B.

Single Stream-based Engine

C.

Policy Engine

D.

Parallel Processing Hardware

Question 20

A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to

making the changes.

Which action will allow the administrator to undo the changes?

Options:

A.

Load configuration version, and choose the first item on the list.

B.

Load named configuration snapshot, and choose the first item on the list.

C.

Revert to last saved configuration.

D.

Revert to running configuration.

Question 21

Access to which feature requires the PAN-OS Filtering license?

Options:

A.

PAN-DB database

B.

DNS Security

C.

Custom URL categories

D.

URL external dynamic lists

Question 22

How do you reset the hit count on a security policy rule?

Options:

A.

First disable and then re-enable the rule.

B.

Reboot the data-plane.

C.

Select a Security policy rule, and then select Hit Count > Reset.

D.

Type the CLI command reset hitcount .

Question 23

During the packet flow process, which two processes are performed in application identification? (Choose two.)

Options:

A.

pattern based application identification

B.

application override policy match

C.

session application identified

D.

application changed from content inspection

Question 24

Given the topology, which zone type should zone A and zone B to be configured with?

Question # 24

Options:

A.

Layer3

B.

Tap

C.

Layer2

D.

Virtual Wire

Question 25

Which Security profile can you apply to protect against malware such as worms and Trojans?

Options:

A.

data filtering

B.

antivirus

C.

vulnerability protection

D.

anti-spyware

Question 26

An administrator would like to silently drop traffic from the internet to a ftp server.

Which Security policy action should the administrator select?

Options:

A.

Reset-server

B.

Block

C.

Deny

D.

Drop

Question 27

Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.

What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?

Options:

A.

save named configuration snapshot

B.

export device state

C.

export named configuration snapshot

D.

save candidate config

Question 28

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)

Options:

A.

Security policy rules inspect but do not block traffic.

B.

Security Profile should be used only on allowed traffic.

C.

Security Profile are attached to security policy rules.

D.

Security Policy rules are attached to Security Profiles.

E.

Security Policy rules can block or allow traffic.

Question 29

What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control? (Choose two.)

Options:

A.

SAML

B.

TACACS+

C.

LDAP

D.

Kerberos

Question 30

Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.

What is the quickest way to reset the hit counter to zero in all the security policy rules?

Options:

A.

At the CLI enter the command reset rules and press Enter

B.

Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule

C.

Reboot the firewall

D.

Use the Reset Rule Hit Counter > All Rules option

Question 31

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

Options:

A.

Anti-Spyware

B.

Antivirus

C.

Vulnerability Protection

D.

URL Filtering

Question 32

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

Options:

A.

Antivirus Profile

B.

Data Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Question 33

An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save the changes, but the OK button is grayed out.

What are two possible reasons the OK button is grayed out? (Choose two.)

Options:

A.

The entry contains wildcards.

B.

The entry is duplicated.

C.

The entry doesn't match a list entry.

D.

The entry matches a list entry.

Question 34

What is a default setting for NAT Translated Packets when the destination NAT translation is selected as Dynamic IP (with session distribution)?

Options:

A.

IP Hash

B.

Source IP Hash

C.

Round Robin

D.

Least Sessions

Question 35

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?

Options:

A.

Prisma SaaS

B.

Panorama

C.

AutoFocus

D.

GlobalProtect

Question 36

A Security Profile can block or allow traffic at which point?

Options:

A.

after it is matched to a Security policy rule that allows traffic

B.

on either the data plane or the management plane

C.

after it is matched to a Security policy rule that allows or blocks traffic

D.

before it is matched to a Security policy rule

Question 37

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?

Options:

A.

every 30 minutes

B.

every 5 minutes

C.

once every 24 hours

D.

every 1 minute

Question 38

The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.

Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)

Options:

A.

Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.

B.

Manually remove powerball.com from the gambling URL category.

C.

Add *.powerball.com to the allow list

D.

Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.

Question 39

An administrator wishes to follow best practices for logging traffic that traverses the firewall

Which log setting is correct?

Options:

A.

Disable all logging

B.

Enable Log at Session End

C.

Enable Log at Session Start

D.

Enable Log at both Session Start and End

Question 40

Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?

Options:

A.

override

B.

allow

C.

block

D.

continue

Question 41

How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?

Options:

A.

Select the unified log entry in the side menu.

B.

Modify the number of columns visible on the page

C.

Modify the number of logs visible on each page.

D.

Select the system logs entry in the side menu.

Question 42

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.

Options:

A.

on either the data place or the management plane.

B.

after it is matched by a security policy rule that allows traffic.

C.

before it is matched to a Security policy rule.

D.

after it is matched by a security policy rule that allows or blocks traffic.

Question 43

Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)

Options:

A.

Post-NAT address

B.

Post-NAT zone

C.

Pre-NAT zone

D.

Pre-NAT address

Question 44

What is a recommended consideration when deploying content updates to the firewall from Panorama?

Options:

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

Question 45

How are service routes used in PAN-OS?

Options:

A.

By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network

B.

To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services

C.

For routing, because they are the shortest path selected by the BGP routing protocol

D.

To route management plane services through data interfaces rather than the management interface

Question 46

How is the hit count reset on a rule?

Options:

A.

select a security policy rule, right click Hit Count > Reset

B.

with a dataplane reboot

C.

Device > Setup > Logging and Reporting Settings > Reset Hit Count

D.

in the CLI, type command reset hitcount

Question 47

Given the screenshot what two types of route is the administrator configuring? (Choose two )

Question # 47

Options:

A.

default route

B.

OSPF

C.

BGP

D.

static route

Question 48

An administrator would like to determine the default deny action for the application dns-over-https

Which action would yield the information?

Options:

A.

View the application details in beacon paloaltonetworks.com

B.

Check the action for the Security policy matching that traffic

C.

Check the action for the decoder in the antivirus profile

D.

View the application details in Objects > Applications

Question 49

Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)

Options:

A.

GlobalProtect agent

B.

XML API

C.

User-ID Windows-based agent

D.

log forwarding auto-tagging

Question 50

Which type firewall configuration contains in-progress configuration changes?

Options:

A.

backup

B.

running

C.

candidate

D.

committed

Question 51

Which feature enables an administrator to review the Security policy rule base for unused rules?

Options:

A.

Security policy tags

B.

Test Policy Match

C.

View Rulebase as Groups

D.

Policy Optimizer

Question 52

Which two types of profiles are needed to create an authentication sequence? (Choose two.)

Options:

A.

Server profile

B.

Authentication profile

C.

Security profile

D.

Interface Management profile

Question 53

Given the image, which two options are true about the Security policy rules. (Choose two.)

Question # 53

Options:

A.

The Allow Office Programs rule is using an Application Filter

B.

In the Allow FTP to web server rule, FTP is allowed using App-ID

C.

The Allow Office Programs rule is using an Application Group

D.

In the Allow Social Networking rule, allows all of Facebook’s functions

Question 54

Selecting the option to revert firewall changes will replace what settings?

Options:

A.

the running configuration with settings from the candidate configuration

B.

the device state with settings from another configuration

C.

the candidate configuration with settings from the running configuration

D.

dynamic update scheduler settings

Question 55

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

Question # 55

Options:

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on Objective

Question 56

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

Options:

A.

Policies

B.

Network

C.

Objects

D.

Device

Question 57

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base.

On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days.

Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

Options:

A.

All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer matches the SuperApp-base application

B.

No impact because the apps were automatically downloaded and installed

C.

No impact because the firewall automatically adds the rules to the App-ID interface

D.

All traffic matching the SuperApp_base, SuperApp_chat, and SuperApp_download is denied until the security administrator approves the applications

Question 58

A website is unexpectedly allowed due to miscategorization.

What are two way-s to resolve this issue for a proper response? (Choose two.)

Options:

A.

Identify the URL category being assigned to the website.

Edit the active URL Filtering profile and update that category's site access settings to block.

B.

Create a URL category and assign the affected URL.

Update the active URL Filtering profile site access setting for the custom URL category to block.

C.

Review the categorization of the website on https://urlfiltering.paloaltonetworks.com.

Submit for "request change*, identifying the appropriate categorization, and wait for confirmation before testing again.

D.

Create a URL category and assign the affected URL.

Add a Security policy with a URL category qualifier of the custom URL category below the original policy. Set the policy action to Deny.

Question 59

An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?

Options:

A.

Create an Application Filter and name it Office Programs, the filter it on the business-systems category, office-programs subcategory

B.

Create an Application Group and add business-systems to it

C.

Create an Application Filter and name it Office Programs, then filter it on the business-systems category

D.

Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office

Question 60

How frequently can wildfire updates be made available to firewalls?

Options:

A.

every 15 minutes

B.

every 30 minutes

C.

every 60 minutes

D.

every 5 minutes

Question 61

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

Options:

A.

Weaponization

B.

Reconnaissance

C.

Installation

D.

Command and Control

E.

Exploitation

Question 62

What must be configured before setting up Credential Phishing Prevention?

Options:

A.

Anti Phishing Block Page

B.

Threat Prevention

C.

Anti Phishing profiles

D.

User-ID

Question 63

What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)

Options:

A.

Blometric scanning results from iOS devices

B.

Firewall logs

C.

Custom API scripts

D.

Security Information and Event Management Systems (SIEMS), such as Splun

E.

DNS Security service

Question 64

Match each feature to the DoS Protection Policy or the DoS Protection Profile.

Question # 64

Options:

Question 65

Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)

Options:

A.

XML API

B.

log forwarding auto-tagging

C.

GlobalProtect agent

D.

User-ID Windows-based agent

Question 66

By default, which action is assigned to the interzone-default rule?

Options:

A.

Reset-client

B.

Reset-server

C.

Deny

D.

Allow

Question 67

An administrator is reviewing the Security policy rules shown in the screenshot below.

Which statement is correct about the information displayed?

Question # 67

Options:

A.

Eleven rules use the "Infrastructure* tag.

B.

The view Rulebase as Groups is checked.

C.

There are seven Security policy rules on this firewall.

D.

Highlight Unused Rules is checked.

Question 68

An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny. What deny action will the firewall perform?

Options:

A.

Drop the traffic silently

B.

Perform the default deny action as defined in the App-ID database for the application

C.

Send a TCP reset packet to the client- and server-side devices

D.

Discard the session's packets and send a TCP reset packet to let the client know the session has been terminated

Question 69

Which component is a building block in a Security policy rule?

Options:

A.

decryption profile

B.

destination interface

C.

timeout (min)

D.

application

Question 70

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?

Options:

A.

override

B.

authorization

C.

authentication

D.

continue

Question 71

What Policy Optimizer policy view differ from the Security policy do?

Options:

A.

It shows rules that are missing Security profile configurations.

B.

It indicates rules with App-ID that are not configured as port-based.

C.

It shows rules with the same Source Zones and Destination Zones.

D.

It indicates that a broader rule matching the criteria is configured above a more specific rule.

Question 72

Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.

Question # 72

Options:

A.

Exploitation

B.

Installation

C.

Reconnaissance

D.

Act on the Objective

Question 73

Which license is required to use the Palo Alto Networks built-in IP address EDLs?

Options:

A.

DNS Security

B.

Threat Prevention

C.

WildFire

D.

SD-Wan

Question 74

Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?

Options:

A.

Objects > Schedules

B.

Policies > Policy Optimizer

C.

Monitor > Packet Capture

D.

Monitor > Reports

Question 75

Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?

Options:

A.

Root

B.

Dynamic

C.

Role-based

D.

Superuser

Question 76

Question # 76

Given the detailed log information above, what was the result of the firewall traffic inspection?

Options:

A.

It was blocked by the Vulnerability Protection profile action.

B.

It was blocked by the Anti-Virus Security profile action.

C.

It was blocked by the Anti-Spyware Profile action.

D.

It was blocked by the Security policy action.

Question 77

The NetSec Manager asked to create a new firewall Local Administrator profile with customized privileges named NewAdmin. This new administrator has to authenticate without inserting any username or password to access the WebUI.

What steps should the administrator follow to create the New_Admin Administrator profile?

Options:

A.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Role Based.

3. Issue to the Client a Certificate with Common Name = NewAdmin

B.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Certificate Name = NewAdmin

C.

1. Set the Authentication profile to Local.

2. Select the "Use only client certificate authentication" check box.

3. Set Role to Role Based.

D.

1. Select the "Use only client certificate authentication" check box.

2. Set Role to Dynamic.

3. Issue to the Client a Certificate with Common Name = New Admin

Question 78

An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.

Which Security profile should be used?

Options:

A.

Antivirus

B.

URL filtering

C.

Anti-spyware

D.

Vulnerability protection

Question 79

What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?

Options:

A.

Doing so limits the templates that receive the policy rules

B.

Doing so provides audit information prior to making changes for selected policy rules

C.

You can specify the firewalls m a device group to which to push policy rules

D.

You specify the location as pre can - or post-rules to push policy rules

Question 80

What is the purpose of the automated commit recovery feature?

Options:

A.

It reverts the Panorama configuration.

B.

It causes HA synchronization to occur automatically between the HA peers after a push from Panorama.

C.

It reverts the firewall configuration if the firewall recognizes a loss of connectivity to Panorama after the change.

D.

It generates a config log after the Panorama configuration successfully reverts to the last running configuration.

Question 81

Which type of address object is "10 5 1 1/0 127 248 2"?

Options:

A.

IP subnet

B.

IP wildcard mask

C.

IP netmask

D.

IP range

Question 82

Where in Panorama Would Zone Protection profiles be configured?

Options:

A.

Shared

B.

Templates

C.

Device Groups

D.

Panorama tab

Question 83

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?

Options:

A.

Rule Usage Filter > No App Specified

B.

Rule Usage Filter >Hit Count > Unused in 30 days

C.

Rule Usage Filter > Unused Apps

D.

Rule Usage Filter > Hit Count > Unused in 90 days

Question 84

Why should a company have a File Blocking profile that is attached to a Security policy?

Options:

A.

To block uploading and downloading of specific types of files

B.

To detonate files in a sandbox environment

C.

To analyze file types

D.

To block uploading and downloading of any type of files

Question 85

An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)

Options:

A.

Reset server

B.

Reset both

C.

Drop

D.

Deny

Question 86

Which administrator type utilizes predefined roles for a local administrator account?

Options:

A.

Superuser

B.

Role-based

C.

Dynamic

D.

Device administrator

Question 87

If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?

A)

Question # 87

B)

Question # 87

C)

Question # 87

D)

Question # 87

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 88

Which type of administrator account cannot be used to authenticate user traffic flowing through the firewall’s

data plane?

Options:

A.

Kerberos user

B.

SAML user

C.

local database user

D.

local user

Question 89

Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?

Options:

A.

URL Filtering > Inline Categorization

B.

URL Filtering > Categories

C.

URL Filtering > URL Filtering Settings

D.

URL Filtering > HTTP Header Insertion

Question 90

An administrator wants to prevent access to media content websites that are risky

Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two)

Options:

A.

streaming-media

B.

high-risk

C.

recreation-and-hobbies

D.

known-risk

Question 91

Match the cyber-attack lifecycle stage to its correct description.

Question # 91

Options:

Question 92

According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?

Options:

A.

by minute

B.

hourly

C.

daily

D.

weekly

Question 93

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

Options:

A.

Data redistribution

B.

Dynamic updates

C.

SNMP setup

D.

Service route

Question 94

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)

Options:

A.

QoS profile

B.

DoS Protection profile

C.

Zone Protection profile

D.

DoS Protection policy

Question 95

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

Options:

A.

Override

B.

Allow

C.

Block

D.

Continue

Question 96

What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?

Options:

A.

any supported Palo Alto Networks firewall or Prisma Access firewall

B.

an additional subscription free of charge

C.

a firewall device running with a minimum version of PAN-OS 10.1

D.

an additional paid subscription

Question 97

Which dynamic update type includes updated anti-spyware signatures?

Options:

A.

Applications and Threats

B.

GlobalProtect Data File

C.

Antivirus

D.

PAN-DB

Question 98

An administrator wants to enable access to www.paloaltonetworks.com while denying access to all other sites in the same category.

Which object should the administrator create to use as a match condition for the security policy rule that allows access to www.paloaltonetworks.com?

Options:

A.

Application group

B.

Address ab

C.

URL category

D.

Service

Question 99

An administrator has an IP address range in the external dynamic list and wants to create an exception for one specific IP address in this address range.

Which steps should the administrator take?

Options:

A.

Add the address range to the Manual Exceptions list and exclude the IP address by selecting the entry.

B.

Add each IP address in the range as a list entry and then exclude the IP address by adding it to the Manual Exceptions list.

C.

Select the address range in the List Entries list. A column will open with the IP addresses. Select the entry to exclude.

D.

Add the specific IP address from the address range to the Manual Exceptions list by using regular expressions to define the entry.

Question 100

Which two statements are correct about App-ID content updates? (Choose two.)

Options:

A.

Updated application content may change how security policy rules are enforced

B.

After an application content update, new applications must be manually classified prior to use

C.

Existing security policy rules are not affected by application content updates

D.

After an application content update, new applications are automatically identified and classified

Question 101

Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?

Options:

A.

Layer 2

B.

Tap

C.

Layer 3

D.

Virtual Wire

Question 102

Which path in PAN-OS 10.0 displays the list of port-based security policy rules?

Options:

A.

Policies> Security> Rule Usage> No App Specified

B.

Policies> Security> Rule Usage> Port only specified

C.

Policies> Security> Rule Usage> Port-based Rules

D.

Policies> Security> Rule Usage> Unused Apps

Question 103

After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.

Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

Options:

A.

Import named config snapshot

B.

Load named configuration snapshot

C.

Revert to running configuration

D.

Revert to last saved configuration

Question 104

Which solution is a viable option to capture user identification when Active Directory is not in use?

Options:

A.

Cloud Identity Engine

B.

group mapping

C.

Directory Sync Service

D.

Authentication Portal

Question 105

Which CLI command will help confirm if FQDN objects are resolved in the event there is a shadow rule?

Options:

A.

>show system fqdn

B.

>request fqdn show system

C.

>request show system fqdn

D.

>request system fqdn show

Question 106

What is an advantage for using application tags?

Options:

A.

They are helpful during the creation of new zones

B.

They help with the design of IP address allocations in DHCP.

C.

They help content updates automate policy updates

D.

They help with the creation of interfaces

Question 107

Identify the correct order to configure the PAN-OS integrated USER-ID agent.

3. add the service account to monitor the server(s)

2. define the address of the servers to be monitored on the firewall

4. commit the configuration, and verify agent connection status

1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent

Options:

A.

2-3-4-1

B.

1-4-3-2

C.

3-1-2-4

D.

1-3-2-4

Question 108

Which action would an administrator take to ensure that a service object will be available only to the selected device group?

Options:

A.

create the service object in the specific template

B.

uncheck the shared option

C.

ensure that disable override is selected

D.

ensure that disable override is cleared

Page: 1 / 36
Total 362 questions