Cyber Coastal

PCNSA Practice Questions

Which item is not one of the six primary components of the Palo Alto Networks Security Operating Platform?

Correct! Wrong!

Which cloud-delivered security service provides instant access to community-based threat data?

Correct! Wrong!

Which cloud-delivered security services provides security for branches and mobile users?

Correct! Wrong!

Which Palo Alto Networks Security Operating Platform component provides access to applications from Palo Alto Networks, third parties, and customers?

Correct! Wrong!

Which approach most accurately defines the Palo Alto Networks SP3 architecture?

Correct! Wrong!

What is the result of using a stream-based design of architecture?

Correct! Wrong!

Which security model does Palo Alto Networks recommend that you deploy?

Correct! Wrong!

The Zero Trust model is implemented to specifically inspect which type of traffic?

Correct! Wrong!

True or false: Blocking just one stage in the Cyber-Attack Lifecycle is all that is needed to protect a company's network from attack.

Correct! Wrong!

What is the default IP address on the MGT interfaces of a Palo Alto Networks firewall?

Correct! Wrong!

True or false. Service route traffic has Security policy rules applied against it.

Correct! Wrong!

Which firewall plane does the running-configuration reside on?

Correct! Wrong!

Which firewall plane does the candidate configuration reside on?

Correct! Wrong!

Candidate config and running config files are saved as which file type?

Correct! Wrong!

Which command must be performed on the firewall to activate any changes?

Correct! Wrong!

Which command backs up configuration files to a remote network device?

Correct! Wrong!

What is the shortest time interval that you can configure a Palo Alto Networks firewall to download WildFire updates?

Correct! Wrong!

What is the publishing interval for WildFire updates, with a valid WildFire license?

Correct! Wrong!

True or false. A Palo Alto Networks firewall automatically provides a backup of the configuration during a software upgrade

Correct! Wrong!

If you have a Threat Prevention subscription but not a WildFire subscription, how long must you wait for the WildFire signatures to be added into the antivirus update?

Correct! Wrong!

Which type of profile does an Authentication Sequence include?

Correct! Wrong!

An Authentication Profile includes which other type of profile?

Correct! Wrong!

True or False: Dynamic Admin Roles are called “dynamic” because you can customize them.

Correct! Wrong!

What is used to override global Minimum Password Complexity Requirements?

Correct! Wrong!

Which Palo Alto Networks firewall feature provides all the following abilities? • Stops malware, exploits, and ransomware before they can compromise endpoints • Provides protection while endpoints are online and offline, on network and off • Coordinates enforcement with network and cloud security to prevent successful attacks • Detects threats and automates containment to minimize impact • Includes WildFire cloud-based threat analysis service with your Cortex XDR subscription • Integrates with the Palo Alto Networks Security Operating Platform

Correct! Wrong!

The External zone type is used to pass traffic between which type of objects?

Correct! Wrong!

What are used to control traffic through zones?

Correct! Wrong!

What is the default administrative distance of a static route within the PAN-OS software?

Correct! Wrong!

Which value is used to distinguish the preference of routing protocols?

Correct! Wrong!

Which value is used to distinguish the best route within the same routing protocol?

Correct! Wrong!

Which value is used to distinguish the best route within the same routing protocol?

Correct! Wrong!

In path monitoring, what is used to monitor remote network devices?

Correct! Wrong!

True or false. Because the first rule that matches the traffic is applied, the more specific rules must follow the more general ones.

Correct! Wrong!

Which statement is true?

Correct! Wrong!

True or false? Best practice is to enable logging for the two predefined security policy rules.

Correct! Wrong!

What will be the result of one or more occurrences of shadowing?

Correct! Wrong!

Which type of security policy rules most often exist above the two predefined security policies?

Correct! Wrong!

A simple way to remember how to configure security policy rules where NAT was implemented is to memorize the following:

Correct! Wrong!

Which statement is true regarding bidirectional NAT?

Correct! Wrong!

What does an application filter enable an administrator to do?

Correct! Wrong!

What does the TCP Half Closed setting mean?

Correct! Wrong!

Which column in the Applications and Threats screen includes the options Review Apps and Review Policies?

Correct! Wrong!

Which link can you select in the web interface to minimize the risk using of installing new App-ID updates?

Correct! Wrong!

Which type of Server Profile is used to create group mappings?

Correct! Wrong!

Which type of file is used to generate the Heatmap report and the BPA report?

Correct! Wrong!

Leave a Reply

Your email address will not be published. Required fields are marked *