PCNSA Exam
PCNSA Exam
om
Palo Alto Networks PCNSA Exam Question & Answers
Palo Alto Networks Certified Network Security
.c
Administrator Exam
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 2/157
Question: 1
om
DRAG DROP
.c
Match the Palo Alto Networks Security Operating Platform architecture to its description.
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
Answer:
tp
Explanation:
ht
Threat Intelligence Cloud – Gathers, analyzes, correlates, and disseminates threats to and from the
network and endpoints located within the network.
Next-Generation Firewall – Identifies and inspects all traffic to block known threats
Advanced Endpoint Protection - Inspects processes and files to prevent known and unknown exploits
Question: 2
Which firewall plane provides configuration, logging, and reporting functions on a separate
processor?
A. control
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 3/157
B. network processing
C. data
D. security processing
Answer: A
Explanation:
Question: 3
om
A security administrator has configured App-ID updates to be automatically downloaded and
installed. The company is currently using an application identified by App-ID as SuperApp_base.
.c
On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat
and SuperApp_download, which will be deployed in 30 days.
ps
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
m
A. All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer
du
matches the SuperApp-base application
B. No impact because the apps were automatically downloaded and installed
am
C. No impact because the firewall automatically adds the rules to the App-ID interface
D. All traffic matching the SuperApp_base, SuperApp_chat, and SuperApp_download is denied until
ex
Answer: A
al
Explanation:
.v
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-
w
introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
w
Question: 4
// w
s:
tp
How many zones can an interface be assigned with a Palo Alto Networks firewall?
ht
A. two
B. three
C. four
D. one
Answer: D
Explanation:
References:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 4/157
Question: 5
Which two configuration settings shown are not the default? (Choose two.)
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
Answer: B,C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 5/157
References:
Question: 6
Which data-plane processor layer of the graphic shown provides uniform matching for spyware and
vulnerability exploits on a Palo Alto Networks Firewall?
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
A. Signature Matching
B. Network Processing
tp
C. Security Processing
ht
D. Security Matching
Answer: A
Explanation:
Question: 7
Which option lists the attributes that are selectable when setting up an Application filters?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 6/157
Answer: B
Explanation:
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects-
om
application- filters
Question: 8
.c
ps
m
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
A. Block List
du
am
B. Custom URL Categories
C. PAN-DB URL Categories
ex
D. Allow List
id
Answer: AD
al
Explanation:
.v
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-
w
filtering-profile-actions
w
Question: 9
// w
s:
DRAG DROP
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 7/157
om
.c
ps
m
du
am
ex
id
Answer:
Explanation:
al
.v
Reconnaissance – stage where the attacker scans for network vulnerabilities and services that can be
w
exploited.
Installation – stage where the attacker will explore methods such as a root kit to establish persistence
w
Command and Control – stage where the attacker has access to a specific server so they can
w
communicate and pass data to and from infected devices within a network.
//
Act on the Objective – stage where an attacker has motivation for attacking a network to deface web
s:
property
tp
Question: 10
ht
Which two statements are correct about App-ID content updates? (Choose two.)
A. Updated application content may change how security policy rules are enforced
B. After an application content update, new applications must be manually classified prior to use
C. Existing security policy rules are not affected by application content updates
D. After an application content update, new applications are automatically identified and classified
Answer: A,D
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 8/157
Question: 11
Which User-ID mapping method should be used for an environment with clients that do not
authenticate to Windows Active Directory?
om
Answer: C
Explanation:
.c
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-ip-addresses-to-
ps
users/map-ip-addresses-to-usernames-using-captive-portal.html
m
Question: 12
du
am
An administrator needs to allow users to use their own office applications. How should the
administrator configure the firewall to allow multiple applications in a dynamic environment?
ex
A. Create an Application Filter and name it Office Programs, the filter it on the business-systems
id
category
w
D. Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office
w
Answer: A
w
Explanation:
//
s:
An application filter is an object that dynamically groups applications based on application attributes
tp
that you define, including category, subcategory, technology, risk factor, and characteristic. This is
ht
useful when you want to safely enable access to applications that you do not explicitly sanction, but
that you want users to be able to access. For example, you may want to enable employees to choose
their own office programs (such as Evernote, Google Docs, or Microsoft Office 365) for business use.
To safely enable these types of applications, you could create an application filter that matches on
the Category business-systems and the Subcategory office-programs. As new applications office
programs emerge and new App-IDs get created, these new applications will automatically match the
filter you defined; you will not have to make any additional changes to your policy rulebase to safely
enable any application that matches the attributes you defined for the filter.
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/use-application-objects-in -
policy/create-an-application-filter.html
Question: 13
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 9/157
Answer: C
om
Explanation:
Question: 14
.c
ps
The firewall sends employees an application block page when they try to access Youtube.
m
Which Security policy rule is blocking the youtube application?
du
am
ex
id
al
.v
w
w
w
A. intrazone-default
//
B. Deny Google
s:
C. allowed-security services
tp
D. interzone-default
ht
Answer: D
Explanation:
Question: 15
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 10/157
Answer: B
Explanation:
Security profiles are objects added to policy rules that are configured with an action of allow.
Question: 16
om
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options
Dynamic IP and Port, Dynamic, Static IP, and None?
.c
ps
m
du
am
ex
id
al
.v
w
w
A. Translation Type
w
B. Interface
C. Address Type
//
D. IP Address
s:
tp
Answer: A
ht
Explanation:
Question: 17
A. Virtual Wire
B. Layer3
C. Layer2
D. Loopback
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 11/157
Answer: A
Explanation:
Question: 18
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which
utility should the company use to identify out-of-date or unused rules on the firewall?
om
B. Rule Usage Filter >Hit Count > Unused in 30 days
C. Rule Usage Filter > Unused Apps
.c
D. Rule Usage Filter > Hit Count > Unused in 90 days
ps
Answer: D
m
Explanation:
du
Question: 19
am
DRAG DROP
ex
Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
id
al
.v
w
w
// w
s:
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 12/157
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
Answer:
tp
Explanation:
ht
Question: 20
What are two differences between an implicit dependency and an explicit dependency in App-ID?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 13/157
(Choose two.)
A. An implicit dependency does not require the dependent application to be added in the security
policy
B. An implicit dependency requires the dependent application to be added in the security policy
C. An explicit dependency does not require the dependent application to be added in the security
policy
D. An explicit dependency requires the dependent application to be added in the security policy
Answer: A,D
Explanation:
om
Question: 21
.c
ps
Recently changes were made to the firewall to optimize the policies and the security team wants to
see if those changes are helping.
m
What is the quickest way to reset the hit counter to zero in all the security policy rules?
A. At the CLI enter the command reset rules and press Enter
du
am
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule
C. Reboot the firewall
ex
D. Use the Reset Rule Hit Counter > All Rules option
id
Answer: D
al
Explanation:
.v
References:
w
w
Question: 22
// w
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)
s:
tp
A. facebook
ht
B. facebook-chat
C. facebook-base
D. facebook-email
Answer: B,C
Explanation:
Question: 23
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 14/157
Answer: A
Explanation:
Another reason to choose the Windows agent over the integrated PAN-OS agent is to save
om
processing cycles on the firewall’s management plane.
Question: 24
.c
ps
Your company requires positive username attribution of every IP address used by wireless devices to
m
support a new compliance requirement. You must collect IP –to-user mappings as soon as possible
du
with minimal downtime and minimal configuration changes to the wireless devices themselves. The
wireless devices are from various manufactures.
am
Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.
ex
A. syslog
id
B. RADIUS
C. UID redistribution
al
D. XFF headers
.v
w
Answer: A
w
Explanation:
w
Question: 25
//
s:
tp
An administrator receives a global notification for a new malware that infects hosts. The infection
ht
will result in the infected host attempting to contact a command-and-control (C2) server. Which two
security profile components will detect and prevent this threat after the firewall’s signature database
has been updated? (Choose two.)
Answer: B,D
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 15/157
References:
Question: 26
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
A. Weaponization
B. Reconnaissance
C. Installation
D. Command and Control
om
E. Exploitation
Answer: A
.c
Explanation:
ps
Question: 27
m
du
Identify the correct order to configure the PAN-OS integrated USER-ID agent.
am
3. add the service account to monitor the server(s)
ex
1. create a service account on the Domain Controller with sufficient permissions to execute the User-
al
ID agent
.v
A. 2-3-4-1
w
B. 1-4-3-2
w
C. 3-1-2-4
D. 1-3-2-4
// w
Answer: D
s:
Explanation:
tp
ht
Question: 28
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.
Complete the security policy to ensure only Telnet is allowed.
Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and
action = Allow
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 16/157
Answer: B
Explanation:
Question: 29
Based on the security policy rules shown, ssh will be allowed on which port?
om
.c
ps
m
du
am
A. 80
ex
B. 53
C. 22
id
D. 23
al
.v
Answer: C
Explanation:
w
w
Question: 30
// w
s:
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with
tp
the firewall?
ht
Answer: A
Explanation:
Question: 31
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 17/157
An administrator notices that protection is needed for traffic within the network due to malicious
lateral movement activity. Based on the image shown, which traffic would the administrator need to
monitor and block to mitigate the malicious activity?
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
Answer: D
Explanation:
Question: 32
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 18/157
Given the topology, which zone type should zone A and zone B to be configured with?
om
A. Layer3
B. Tap
.c
C. Layer2
D. Virtual Wire
ps
Answer: A
m
Explanation:
Question: 33 du
am
ex
To use Active Directory to authenticate administrators, which server profile is required in the
id
authentication profile?
al
A. domain controller
.v
B. TACACS+
C. LDAP
w
D. RADIUS
w
w
Answer: C
//
Explanation:
s:
tp
Question: 34
ht
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
A. Layer 2
B. Tap
C. Layer 3
D. Virtual Wire
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 19/157
Question: 35
Which administrator type provides more granular options to determine what the administrator can
view and modify when creating an administrator account?
A. Root
B. Dynamic
C. Role-based
D. Superuser
om
Answer: C
Explanation:
.c
Question: 36
ps
m
Which administrator type utilizes predefined roles for a local administrator account?
A. Superuser
du
am
B. Role-based
C. Dynamic
ex
D. Device administrator
id
Answer: C
al
Explanation:
.v
References:
w
w
Question: 37
// w
s:
Which two security profile types can be attached to a security policy? (Choose two.)
tp
A. antivirus
ht
B. DDoS protection
C. threat
D. vulnerability
Answer: A,D
Explanation:
References:
Question: 38
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 20/157
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The
USB drive had malware on it that loaded onto their computer and then contacted a known command
and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the
laptop.
Which security profile feature could have been used to prevent the communication with the CnC
server?
om
D. Create a security policy and enable DNS Sinkhole
.c
Answer: A
ps
Explanation:
m
References:
Question: 39
du
am
ex
Which user mapping method could be used to discover user IDs in an environment with multiple
Windows domain controllers?
id
Answer: A
w
Explanation:
//
s:
Question: 40
tp
ht
What are three differences between security policies and security profiles? (Choose three.)
Answer: B,C,E
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 21/157
Question: 41
Given the image, which two options are true about the Security policy rules. (Choose two.)
om
.c
A. The Allow Office Programs rule is using an Application Filter
ps
B. In the Allow FTP to web server rule, FTP is allowed using App-ID
C. The Allow Office Programs rule is using an Application Group
m
D. In the Allow Social Networking rule, allows all of Facebook’s functions
du Answer: AD
am
Explanation:
ex
In the Allow FTP to web server rule, FTP is allowed using port based rule and not APP-ID.
id
Question: 42
al
.v
Which type of security rule will match traffic between the Inside zone and Outside zone, within the
w
A. global
B. intrazone
//
C. interzone
s:
D. universal
tp
Answer: D
ht
Explanation:
References:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC
Question: 43
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints
by inspecting traffic deployed as internet gateways?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 22/157
A. GlobalProtect
B. AutoFocus
C. Aperture
D. Panorama
Answer: A
Explanation:
GlobalProtect: GlobalProtect safeguards your mobile workforce by inspecting all traffic using your
next-generation firewalls deployed as internet gateways, whether at the perimeter, in the
om
Demilitarized Zone (DMZ), or in the cloud.
Question: 44
.c
ps
Given the scenario, which two statements are correct regarding multiple static default routes?
m
(Choose two.)
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
Answer: C,D
Explanation:
Question: 45
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 23/157
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate
malicious code against a targeted machine.
om
.c
ps
m
A. Exploitation
B. Installation
du
C. Reconnaissance
am
D. Act on Objective
Answer: A
ex
Explanation:
id
Question: 46
al
.v
w
Which file is used to save the running configuration with a Palo Alto Networks firewall?
w
A. running-config.xml
w
B. run-config.xml
//
C. running-configuration.xml
s:
D. run-configuratin.xml
tp
Answer: A
ht
Explanation:
Question: 47
In the example security policy shown, which two websites fcked? (Choose two.)
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 24/157
A. LinkedIn
B. Facebook
C. YouTube
D. Amazon
om
Answer: A,B
Explanation:
.c
ps
Question: 48
m
du
Which two Palo Alto Networks security management tools provide a consolidated creation of
policies, centralized management and centralized threat intelligence. (Choose two.)
am
A. GlobalProtect
B. Panorama
ex
C. Aperture
D. AutoFocus
id
al
Answer: B,D
.v
Explanation:
w
Question: 49
w
// w
A. The Security Policy Adoption Heatmap component filters the information by device groups, serial
numbers, zones, areas of architecture, and other categories
ht
B. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas
of network and security architecture
C. It provides a percentage of adoption for each assessment area
D. It performs over 200 security checks on Panorama/firewall for the assessment
Answer: B
Explanation:
Question: 50
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 25/157
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated
approach to prevent threats? (Choose five.)
A. User identification
B. Filtration protection
C. Vulnerability protection
D. Antivirus
E. Application identification
F. Anti-spyware
Answer: A,C,D,E,F
om
Explanation:
Question: 51
.c
ps
The PowerBall Lottery has reached a high payout amount and a company has decided to help
m
employee morale by allowing employees to check the number, but doesn’t want to unblock the
du
gambling URL category.
am
Which two methods will allow the employees to get to the PowerBall Lottery site without the
company unlocking the gambling URL category? (Choose two.)
ex
A. Add all the URLs from the gambling category except powerball.com to the block list and then set
id
D. Create a custom URL category called PowerBall and add *.powerball.com to the category and set
w
Answer: C,D
w
Explanation:
//
s:
Question: 52
tp
ht
Which service protects cloud-based applications such as Dropbox and Salesforce by administering
permissions and scanning files for sensitive information?
A. Aperture
B. AutoFocus
C. Parisma SaaS
D. GlobalProtect
Answer: C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 26/157
Question: 53
Which administrator receives a global notification for a new malware that infects hosts. The infection
will result in the infected host attempting to contact and command-and-control (C2) server.
Which security profile components will detect and prevent this threat after the firewall`s signature
database has been updated?
om
D. vulnerability profile applied to inbound security policies
Answer: C
.c
Explanation:
ps
Question: 54
m
Which update option is not available to administrators?
du
am
A. New Spyware Notifications
ex
B. New URLs
C. New Application Signatures
id
Answer: B
w
Explanation:
w
w
Question: 55
//
s:
A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future
tp
Public Cloud environments. All other required connections have already been enabled between the
ht
USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 27/157
Answer: B
Explanation:
Question: 56
A. every 5 minutes
om
B. every 15 minutes
C. every 60 minutes
.c
D. every 30 minutes
ps
Answer: A
m
Explanation:
du
References:
am
Question: 57
ex
id
What is the minimum timeframe that can be set on the firewall to check for new WildFire
signatures?
al
.v
A. every 30 minutes
B. every 5 minutes
w
D. every 1 minute
// w
Answer: D
s:
Explanation:
tp
Because new WildFire signatures are now available every five minutes, it is a best practice to use this
ht
setting to ensure the firewall retrieves these signatures within a minute of availability.
Question: 58
A network has 10 domain controllers, multiple WAN links, and a network infrastructure with
bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID
agent is considered a best practice by Palo Alto Networks?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 28/157
Answer: A
Explanation:
Question: 59
DRAG DROP
Arrange the correct order that the URL classifications are processed within the system.
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
Answer:
tp
Explanation:
ht
Question: 60
What must be configured for the firewall to access multiple authentication profiles for external
services to authenticate a non-local account?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 29/157
A. authentication sequence
B. LDAP server profile
C. authentication server list
D. authentication list profile
Answer: A
Explanation:
References:
om
Question: 61
.c
Which prevention technique will prevent attacks based on packet count?
ps
A. zone protection profile
m
B. URL filtering profile
du
C. antivirus profile
D. vulnerability profile
am
Answer: A
ex
Explanation:
id
Question: 62
al
.v
Which interface type can use virtual routers and routing protocols?
w
w
A. Tap
w
B. Layer3
C. Virtual Wire
//
D. Layer2
s:
tp
Answer: B
ht
Explanation:
Question: 63
Which URL profiling action does not generate a log entry when a user attempts to access that URL?
A. Override
B. Allow
C. Block
D. Continue
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 30/157
Answer: B
Explanation:
References:
Question: 64
An internal host wants to connect to servers of the internet through using source NAT.
Which policy is required to enable source NAT on the firewall?
om
A. NAT policy with source zone and destination zone specified
.c
B. post-NAT policy with external source and any destination address
C. NAT policy with no source of destination zone selected
ps
D. pre-NAT policy with external source and any destination address
m
Answer: A
du
Explanation:
am
Question: 65
ex
id
Which security profile will provide the best protection against ICMP floods, based on individual
combinations of a packet`s source and destination IP address?
al
.v
A. DoS protection
B. URL filtering
w
C. packet buffering
w
D. anti-spyware
// w
Answer: A
s:
Explanation:
tp
Question: 66
ht
Which path in PAN-OS 10.0 displays the list of port-based security policy rules?
Answer: A
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 31/157
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/security-policy-rule-
optimization/migrate-port-based-to-app-id-based-security-policy-rules.html
Question: 67
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo
Alto Networks Firewall? (Choose two.)
A. Layer-ID
om
B. User-ID
C. QoS-ID
D. App-ID
.c
ps
Answer: B,D
Explanation:
m
du
Question: 68
am
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
ex
A. Device>Setup>Services
id
B. Device>Setup>Management
al
C. Device>Setup>Operations
D. Device>Setup>Interfaces
.v
w
Answer: C
w
Explanation:
// w
Question: 69
s:
DRAG DROP
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 32/157
om
.c
ps
m
du
am
ex
Answer:
id
Explanation:
al
Question: 70
//
s:
Which action related to App-ID updates will enable a security administrator to view the existing
security policy rule that matches new application signatures?
tp
ht
A. Review Policies
B. Review Apps
C. Pre-analyze
D. Review App Matches
Answer: A
Explanation:
References:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-
introduced- incontent-releases/review-new-app-id-impact-on- existing-policy-rules
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 33/157
Question: 71
A. select a security policy rule, right click Hit Count > Reset
B. with a dataplane reboot
C. Device > Setup > Logging and Reporting Settings > Reset Hit Count
D. in the CLI, type command reset hitcount <POLICY-NAME>
om
Answer: A
Explanation:
.c
Question: 72
ps
m
du
am
ex
id
al
.v
w
w
Given the topology, which zone type should interface E1/1 be configured with?
w
A. Tap
//
B. Tunnel
s:
C. Virtual Wire
tp
D. Layer3
ht
Answer: A
Explanation:
Question: 73
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
A. Management
B. High Availability
C. Aggregate
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 34/157
D. Aggregation
Answer: C
Explanation:
Question: 74
Which security policy rule would be needed to match traffic that passes between the Outside zone
and Inside zone, but does not match traffic that passes within the zones?
om
A. intrazone
B. interzone
.c
C. universal
D. global
ps
Answer: B
m
Explanation:
Question: 75 du
am
Based on the show security policy rule would match all FTP traffic from the inside zone to the outside
ex
zone?
id
al
.v
w
w
// w
s:
tp
ht
A. internal-inside-dmz
B. engress outside
C. inside-portal
D. intercone-default
Answer: B
Explanation:
Question: 76
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 35/157
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
A. facebook-email
B. facebook-base
C. facebook
D. facebook-chat
Answer: B, D
Explanation:
Question: 77
om
Which type security policy rule would match traffic flowing between the inside zone and outside
.c
zone within the inside zone and within the outside zone?
ps
A. global
B. universal
m
C. intrazone
du
D. interzone
am
Answer: B
Explanation:
ex
Question: 78
id
al
Based on the screenshot presented which column contains the link that when clicked opens a
.v
A. Apps Allowed
B. Name
C. Apps Seen
D. Service
Answer: C
Explanation:
Question: 79
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 36/157
In a security policy what is the quickest way to rest all policy rule hit counters to zero?
Answer: C
Explanation:
Question: 80
om
What in the minimum frequency for which you can configure the firewall too check for new wildfire
.c
antivirus signatures?
ps
A. every 5 minutes
B. every 1 minute
m
C. every 24 hours
du
D. every 30 minutes
am
Answer: B
Explanation:
ex
id
al
.v
w
Question: 81
w
w
A. create a QoS policy that provides auto-remediation for anomalous user behavior and malicious
s:
activity
tp
B. create a policy that provides auto-sizing for anomalous user behavior and malicious activity
C. create a policy that provides auto-remediation for anomalous user behavior and malicious activity
ht
Answer: C
Explanation:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-
user-
groups#:~:text=Dynamic%20user%20groups%20help%20you,activity%20while%20maintaining%20us
er%20visibility.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 37/157
Question: 82
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions
on a separate processor?
A. data
B. network processing
C. management
D. security processing
Answer: C
om
Explanation:
.c
Question: 83
ps
Your company occupies one floor in a single building you have two active directory domain
m
controllers on a single networks the firewall s management plane is only slightly utilized.
Which user-ID agent sufficient in your network?
Answer: D
al
Explanation:
.v
Explanation/Reference:
w
Reference:
w
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-
w
users/configureuser-mapping-using-the-windows-user-id- agent/configure-the-windows-based-user-
id- agent-for-usermapping.html
//
s:
Question: 84
tp
ht
At which point in the app-ID update process can you determine if an existing policy rule is affected by
an app-ID update?
Answer: A
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 38/157
Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-
help/device/device-dynamicupdates
Question: 85
Which Palo Alto network security operating platform component provides consolidated policy
creation and centralized management?
A. Prisma SaaS
B. Panorama
C. AutoFocus
om
D. GlobalProtect
Answer: B
.c
Explanation:
ps
Question: 86
m
du
Which type firewall configuration contains in-progress configuration changes?
am
A. backup
B. running
ex
C. candidate
D. committed
id
al
Answer: C
.v
Explanation:
w
Question: 87
w
w
Which link in the web interface enables a security administrator to view the security policy rules that
//
A. Review Apps
tp
C. Pre-analyze
D. Review Policies
Answer: D
Explanation:
Question: 88
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an
email?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 39/157
om
A. delivery
.c
B. command and control
C. explotation
ps
D. reinsurance
m
E. installation
du
Answer: A
Explanation:
am
Question: 89
ex
id
A. every 15 minutes
.v
B. every 30 minutes
C. every 60 minutes
w
D. every 5 minutes
w
w
Answer: D
//
Explanation:
s:
tp
Question: 90
ht
Which data flow direction is protected in a zero trust firewall deployment that is not protected in a
perimeter-only firewall deployment?
A. outbound
B. north south
C. inbound
D. east west
Answer: D
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 40/157
Question: 91
Answer: C
Explanation:
om
Question: 92
.c
ps
Which protocol used to map username to user groups when user-ID is configured?
m
A. SAML
B. RADIUS
du
C. TACACS+
D. LDAP
am
Answer: D
ex
Explanation:
id
Question: 93
al
.v
Based on the graphic which statement accurately describes the output shown in the server
w
monitoring panel?
w
// w
s:
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 41/157
om
.c
ps
m
du
am
A. The User-ID agent is connected to a domain controller labeled lab-client.
B. The host lab-client has been found by the User-ID agent.
ex
Answer: A
Explanation:
.v
w
Question: 94
w
// w
Which three configuration settings are required on a Palo Alto networks firewall management
s:
interface?
tp
A. default gateway
ht
B. netmask
C. IP address
D. hostname
E. auto-negotiation
Answer: ABC
Explanation:
Explanation/Reference:
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClN7CAK
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 42/157
Question: 95
Which Palo Alto networks security operating platform service protects cloud-based application such
as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive
information?
A. Prisma SaaS
B. AutoFocus
C. Panorama
om
D. GlobalProtect
Answer: A
.c
Explanation:
ps
Question: 96
m
Which statements is true regarding a Heatmap report?
du
am
A. When guided by authorized sales engineer, it helps determine te areas of greatest security risk.
ex
D. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas
al
Answer: B
w
Explanation:
w
w
Reference: https://live.paloaltonetworks.com/t5/best-practice-assessment-blogs/the-best-practice-
assessment-bpa-tool-for-ngfw-and-panorama/ba-p/248343
//
s:
Question: 97
tp
ht
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field
of a security policy rule?
A. local username
B. dynamic user group
C. remote username
D. static user group
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 43/157
Question: 98
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?
A. It functions like PAN-DB and requires activation through the app portal.
B. It removes the 100K limit for DNS entries for the downloaded DNS updates.
C. IT eliminates the need for dynamic DNS updates.
D. IT is automatically enabled and configured.
om
Answer: AB
Explanation:
.c
Question: 99
ps
m
Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose
du
three)
am
A. Security policy rules inspect but do not block traffic.
B. Security Profile should be used only on allowed traffic.
ex
Answer: BCE
.v
Explanation:
w
w
Question: 100
// w
s:
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 44/157
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-users-to-groups.html
Question: 101
om
D. They help with the creation of interfaces
Answer: C
.c
Explanation:
ps
Question: 102
m
du
Which operations are allowed when working with App-ID application tags?
am
A. Predefined tags may be deleted.
B. Predefined tags may be augmented by custom tags.
ex
Answer: B
.v
Explanation:
w
Question: 103
w
// w
You need to allow users to access the office–suite application of their choice. How should you
s:
A. Create an Application Group and add Office 365, Evernote Google Docs and Libre Office
ht
Answer: C
Explanation:
Question: 104
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 45/157
Answer: B
Explanation:
om
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/dns-
.c
security/enable- dnssecurity.html
ps
Question: 105
m
du
Access to which feature requires PAN-OS Filtering licens?
am
A. PAN-DB database
B. URL external dynamic lists
ex
Answer: A
al
Explanation:
.v
w
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-
w
licenses-and-subscriptions.html
w
Question: 106
//
s:
You must configure which firewall feature to enable a data-plane interface to submit DNS queries on
tp
Answer: A
Explanation:
Question: 107
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 46/157
Which license must an administrator acquire prior to downloading Antivirus updates for use with the
firewall?
A. URL filtering
B. Antivirus
C. WildFire
D. Threat Prevention
Answer: D
Explanation:
om
Question: 108
.c
Which definition describes the guiding principle of the zero-trust architecture?
ps
A. never trust, never connect
m
B. always connect and verify
du
C. never trust, always verify
D. trust, but verity
am
Answer: C
ex
Explanation:
id
Explanation/Reference:
al
Reference:
https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
.v
w
Question: 109
w
w
Four configuration choices are listed, and each could be used to block access to a specific URL. If you
configured each choices to block the sameURL then which choice would be the last to block access to
//
the URL?
s:
tp
Answer: D
Explanation:
The precedence is from the top down; First Match Wins: 1) Block list: Manually entered blocked URLs
Objects - 2) Allow list: Manually entered allowed URLs Objects - 3) Custom URL Categories - 4)
Cached Cached: URLs learned from External Dynamic Lists (EDLs) - 5) Pre-Defined Categories: PAN-
DB or Brightcloud categories.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 47/157
Question: 110
The CFO found a malware infected USB drive in the parking lot, which when inserted infected their
corporate laptop the malware contacted a known command-and-control server which exfiltrating
corporate data.
Which Security profile feature could have been used to prevent the communications with the
command-and-control server?
A. Create a Data Filtering Profile and enable its DNS sinkhole feature.
om
B. Create an Antivirus Profile and enable its DNS sinkhole feature.
C. Create an Anti-Spyware Profile and enable its DNS sinkhole feature.
D. Create a URL Filtering Profile and block the DNS sinkhole URL category.
.c
ps
Answer: C
Explanation:
m
du
Question: 111
am
Which two features can be used to tag a user name so that it is included in a dynamic user group?
(Choose two)
ex
A. XML API
id
C. GlobalProtect agent
D. User-ID Windows-based agent
.v
w
Answer: AD
w
Explanation:
w
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-
//
filtering-profile-actions
s:
tp
Question: 112
ht
Based on the security policy rules shown, ssh will be allowed on which port?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 48/157
om
A. any port
B. same port as ssl and snmpv3
.c
C. the default port
ps
D. only ephemeral ports
m
Answer: C
du
Explanation:
am
Question: 113
ex
Which action results in the firewall blocking network traffic with out notifying the sender?
id
al
A. Drop
.v
B. Deny
C. Reset Server
w
D. Reset Client
w
w
Answer: B
//
Explanation:
s:
Question: 114
tp
ht
All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone.
Complete the two empty fields in the Security Policy rules that permits only this type of access.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 49/157
Choose two.
A. Service = "any"
B. Application = "Telnet"
C. Service - "application-default"
D. Application = "any"
Answer: BC
Explanation:
om
Question: 115
.c
Which type of administrative role must you assign to a firewall administrator account, if the account
ps
must include a custom set of firewall permissions?
m
A. SAML
du
B. Multi-Factor Authentication
C. Role-based
am
D. Dynamic
ex
Answer: C
Explanation:
id
al
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-
administration/manage-firewall-administrators/administrative-role-types.html
.v
w
Question: 116
w
w
The PowerBall Lottery has reached an unusually high value this week. Your company has decided to
//
raise morale by allowing employees to access the PowerBall Lottery website (www.powerball.com)
s:
for just this week. However, the company does not want employees to access any other websites
tp
Which method allows the employees to access the PowerBall Lottery website but without unblocking
access to the “gambling” URL category?
Answer: CD
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 50/157
Question: 117
Which type of administrator account cannot be used to authenticate user traffic flowing through the
firewall’s
data plane?
A. Kerberos user
B. SAML user
C. local database user
D. local user
om
Answer: B
.c
Explanation:
ps
Question: 118
m
DRAG DROP
du
Match each feature to the DoS Protection Policy or the DoS Protection Profile.
am
ex
id
al
.v
w
w
// w
s:
tp
ht
Answer:
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 51/157
om
.c
ps
m
du
am
Question: 119
ex
A. PAN-DB database
.v
B. DNS Security
C. Custom URL categories
w
Answer: A
//
Explanation:
s:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-
tp
licenses-andsubscriptions.html
ht
Question: 120
You receive notification about new malware that is being used to attack hosts The malware exploits a
software bug in a common application
Which Security Profile detects and blocks access to this threat after you update the firewall's threat
signature database?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 52/157
Answer: B
Explanation:
Question: 121
Which Security profile can you apply to protect against malware such as worms and Trojans?
A. data filtering
B. antivirus
om
C. vulnerability protection
D. anti-spyware
.c
Answer: B
ps
Explanation:
m
Reference:
du
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-
profiles#:~:text=Antivirus%
am
20profiles%20protect%20against%20viruses,as
%20well%20as%20spyware%20downloads
ex
Question: 122
id
al
Which two settings allow you to restrict access to the management interface? (Choose two )
.v
D. permitted IP addresses
//
s:
Answer: A, C
Explanation:
tp
ht
Question: 123
Which object would an administrator create to block access to all high-risk applications?
A. HIP profile
B. application filter
C. application group
D. Vulnerability Protection profile
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 53/157
Explanation/Reference:
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKECA0
Question: 124
An administrator would like to override the default deny action for a given application and instead
would like to block the traffic and send the ICMP code "communication with the destination is
administratively prohibited"
Which security policy action causes this?
om
A. Drop
B. Drop, send ICMP Unreachable
.c
C. Reset both
ps
D. Reset server
m
Answer: B
du
Explanation:
am
Question: 125
ex
What is a prerequisite before enabling an administrative account which relies on a local firewall user
database?
id
al
Answer: C
w
Explanation:
//
s:
Question: 126
tp
ht
Which two rule types allow the administrator to modify the destination zone? (Choose two )
A. interzone
B. intrazone
C. universal
D. shadowed
Answer: A, C
Explanation:
Question: 127
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 54/157
A. Panorama automatically removes local configuration locks after a commit from Panorama
B. Local configuration locks prohibit Security policy changes for a Panorama managed device
C. Security policy rules configured on local firewalls always take precedence
D. Local configuration locks can be manually unlocked from Panorama
Answer: D
Explanation:
om
Explanation
Explanation/Reference:
Reference:
.c
https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/administer-
ps
panorama/manage- locks-forrestricting-configuration-changes.html
m
du
am
ex
id
al
.v
w
w
// w
s:
Question: 128
tp
ht
What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?
Answer: C
Explanation:
Question: 129
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 55/157
An administrator would like to see the traffic that matches the interzone-default rule in the traffic
logs.
What is the correct process to enable this logging1?
A. Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start
and click OK
B. Select the interzone-default rule and edit the rule on the Actions tab select Log at Session End and
click OK
C. This rule has traffic logging enabled by default no further action is required
D. Select the interzone-default rule and click Override on the Actions tab select Log at Session End
and click OK
om
Answer: D
.c
Explanation:
ps
Question: 130
m
du
What is the correct process tor creating a custom URL category?
am
A. Objects > Security Profiles > URL Category > Add
B. Objects > Custom Objects > URL Filtering > Add
ex
Answer: D
al
Explanation:
.v
w
Question: 131
w
w
A. Device
s:
B. Policies
tp
C. Monitor
ht
D. Objects
Answer: D
Explanation:
Question: 132
An administrator would like to silently drop traffic from the internet to a ftp server.
Which Security policy action should the administrator select?
A. Reset-server
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 56/157
B. Block
C. Deny
D. Drop
Answer: D
Explanation:
Question: 133
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1 What changes
are required on VR-1 to route traffic between two interfaces on the NGFW?
om
A. Add zones attached to interfaces to the virtual router
.c
B. Add interfaces to the virtual router
C. Enable the redistribution profile to redistribute connected routes
ps
D. Add a static routes to route between the two interfaces
m
Answer: D
du
Explanation:
am
Question: 134
ex
B. confirm that rules meet or exceed the Best Practice Assessment recommendations
.v
C. confirm that policy rules in the configuration are allowing/denying the correct traffic
D. ensure that policy rules are not shadowing other policy rules
w
w
Answer: D
w
Explanation:
//
s:
Question: 135
tp
DRAG DROP
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 57/157
om
Answer:
.c
Explanation:
ps
m
du
am
ex
id
al
.v
w
Question: 136
w
Answer: C
Explanation:
Question: 137
Which objects would be useful for combining several services that are often defined together?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 58/157
C. application groups
D. application filters
Answer: B
Explanation:
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-
services.html
om
Question: 138
.c
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two
components'? (Choose two )
ps
A. Network Processing Engine
m
B. Single Stream-based Engine
du
C. Policy Engine
D. Parallel Processing Hardware
am
Answer: B
ex
Explanation:
id
Question: 139
al
.v
A. IP subnet
w
B. IP wildcard mask
w
C. IP netmask
D. IP range
//
s:
Answer: B
tp
Explanation:
ht
Question: 140
An administrator has configured a Security policy where the matching condition includes a single
application and the action is deny
If the application s default deny action is reset-both what action does the firewall take*?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 59/157
Answer: A
Explanation:
Question: 141
A. An Application Filter is a static way of grouping applications and can be configured as a nested
member of an Application Group
B. An Application Filter is a dynamic way to group applications and can be configured as a nested
om
member of an Application Group
C. An Application Group is a dynamic way of grouping applications and can be configured as a nested
.c
member of an Application Group
D. An Application Group is a static way of grouping applications and cannot be configured as a nested
ps
member of Application Group
m
Answer: B
du
Explanation:
am
Question: 142
ex
An administrator wishes to follow best practices for logging traffic that traverses the firewall
id
Answer: B
//
Explanation:
s:
Explanation
tp
Explanation/Reference:
ht
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC
Question: 143
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to
block matching traffic
Which statement accurately describes how the firewall will apply an action to matching traffic?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 60/157
Answer: A
Explanation:
Question: 144
You have been tasked to configure access to a new web server located in the DMZ
Based on the diagram what configuration changes are required in the NGFW virtual router to route
traffic from the 10 1 1 0/24 network to 192 168 1 0/24?
om
.c
ps
m
du
am
ex
id
al
.v
A. Add a route with the destination of 192 168 1 0/24 using interface Eth 1/3 with a next-hop of
w
192.168 1.10
w
B. Add a route with the destination of 192 168 1 0/24 using interface Eth 1/2 with a next-hop of
172.16.1.2
w
C. Add a route with the destination of 192 168 1 0/24 using interface Eth 1/3 with a next-hop of
//
172.16.1.2
s:
D. Add a route with the destination of 192 168 1 0/24 using interface Eth 1/3 with a next-hop of
tp
192.168.1.254
ht
Answer: C
Explanation:
Question: 145
An administrator wants to prevent access to media content websites that are risky
Which two URL categories should be combined in a custom URL category to accomplish this goal?
(Choose two)
A. streaming-media
B. high-risk
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 61/157
C. recreation-and-hobbies
D. known-risk
Answer: A, C
Explanation:
Question: 146
DRAG DROP
Place the following steps in the packet processing order of operations from first to last.
om
.c
ps
m
du
am
ex
id
al
.v
w
Answer:
w
Explanation:
// w
s:
tp
ht
Question: 147
A Security Profile can block or allow traffic at which point?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 62/157
Answer: A
Explanation:
Question: 148
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious
om
code against a vulnerability in a targeted machine.
.c
ps
m
du
am
ex
id
A. Exploitation
al
B. Installation
.v
C. Reconnaissance
D. Act on the Objective
w
w
Answer: A
w
Explanation:
//
s:
Question: 149
tp
Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website
ht
How can file uploading/downloading be restricted for the website while permitting general browsing
access to that website?
A. Create a Security policy with a URL Filtering profile that references the site access setting of
continue to NO-FILES
B. Create a Security policy with a URL Filtering profile that references the site access setting of block
to NO-FILES
C. Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate
Data Filtering profile
D. Create a Security policy that references NO-FILES as a URL Category qualifier, with an appropriate
File Blocking profile
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 63/157
Answer: B
Explanation:
Question: 150
Which three types of authentication services can be used to authenticate user traffic flowing through
the firewalls data plane? (Choose three )
A. TACACS
B. SAML2
om
C. SAML10
D. Kerberos
.c
E. TACACS+
ps
Answer: A, B, D
m
Explanation:
du
Question: 151
am
Given the screenshot what two types of route is the administrator configuring? (Choose two )
ex
id
al
.v
w
w
// w
s:
tp
ht
A. default route
B. OSPF
C. BGP
D. static route
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 64/157
Answer: A
Explanation:
Question: 152
Based on the screenshot what is the purpose of the group in User labelled ''it"?
om
A. Allows users to access IT applications on all ports
.c
B. Allows users in group "DMZ" lo access IT applications
ps
C. Allows "any" users to access servers in the DMZ zone
D. Allows users in group "it" to access IT applications
m
Answer: D
Explanation:
du
am
Question: 153
ex
C. Antivirus
w
D. PAN-DB
w
Answer: A
w
Explanation:
//
s:
Question: 154
tp
ht
Which URL Filtering Profile action does not generate a log entry when a user attempts to access a
URL?
A. override
B. allow
C. block
D. continue
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 65/157
Question: 155
om
.c
ps
m
du
am
ex
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access
id
general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
al
A)
.v
w
w
// w
s:
B)
tp
ht
C)
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 66/157
D)
A. Option
B. Option
C. Option
D. Option
om
Answer: C
.c
Explanation:
ps
Question: 156
m
du
Which action results in the firewall blocking network traffic without notifying the sender?
am
A. Deny
B. No notification
C. Drop
ex
D. Reset Client
id
Answer: C
al
Explanation:
.v
w
Question: 157
w
Which type of profile must be applied to the Security policy rule to protect against buffer overflows
w
A. anti-spyware
tp
B. URL filtering
C. vulnerability protection
ht
D. file blocking
Answer: C
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-
help/objects/objects-security-profiles-vulnerability-protection.html
Vulnerability Protection Security Profiles protect against threats entering the network. For example,
Vulnerability Protection Security Profiles protect against buffer overflows, illegal code execution, and
other attempts to exploit system vulnerabilities. The default Vulnerability Protection Security Profile
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 67/157
protects clients and servers from all known critical-, high-, and medium-severity threats. You also can
create exceptions that enable you to change the response to a specific signature.
Question: 158
om
D. Log at Session Start and Log at Session End both disabled
Answer: B
.c
Explanation:
ps
Question: 159
m
du
Which URL Filtering profile action would you set to allow users the option to access a site only if they
provide a URL admin password?
am
A. override
ex
B. authorization
C. authentication
id
D. continue
al
Answer: B
.v
Explanation:
w
w
Explanation/Reference:
w
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-
//
filteringprofile-actions.html
s:
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 68/157
om
.c
ps
m
du
Question: 160
am
Selecting the option to revert firewall changes will replace what settings?
ex
Answer: C
w
Explanation:
w
w
Question: 161
//
s:
A. Disable the automatic commit feature that prioritizes content database installations before
ht
committing
B. Validate configuration changes prior to committing
C. Wait until all running and pending jobs are finished before committing
D. Export configuration after each single configuration change performed
Answer: A
Explanation:
Question: 162
An administrator wants to prevent users from submitting corporate credentials in a phishing attack.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 69/157
A. antivirus
B. anti-spyware
C. URL filtering
D. vulnerability protection
Answer: B
Explanation:
Question: 163
om
Which Security profile would you apply to identify infected hosts on the protected network using
.c
DNS traffic?
ps
A. URL traffic
B. vulnerability protection
m
C. anti-spyware
du
D. antivirus
am
Answer: C
Explanation:
ex
Question: 164
id
al
Which two firewall components enable you to configure SYN flood protection thresholds? (Choose
.v
two.)
w
A. QoS profile
w
Answer: B, C
tp
Explanation:
ht
Explanation
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 70/157
om
.c
ps
m
Question: 165 du
am
What is the main function of Policy Optimizer?
ex
B. migrate other firewall vendors’ security rules to Palo Alto Networks configuration
al
Answer: D
w
Explanation:
// w
Explanation/Reference:
s:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/policy-
tp
optimizer.html
ht
Question: 166
How does an administrator schedule an Applications and Threats dynamic update while delaying
installation of the update for a certain amount of time?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 71/157
Answer: D
Explanation:
Question: 167
You receive notification about new malware that infects hosts through malicious files transferred by
FTP.
Which Security profile detects and protects your internal networks from this threat after you update
your firewall’s threat signature database?
om
A. URL Filtering profile applied to inbound Security policy rules.
B. Data Filtering profile applied to outbound Security policy rules.
.c
C. Antivirus profile applied to inbound Security policy rules.
D. Vulnerability Prote
ps
ction profile applied to outbound Security policy rules.
m
Answer: C
du
Explanation:
am
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles
ex
Question: 168
id
al
Which rule type is appropriate for matching traffic both within and between the source and
.v
destination zones?
w
A. interzone
w
B. shadowed
w
C. intrazone
D. universal
//
s:
Answer: A
tp
Explanation:
ht
Question: 169
What must be considered with regards to content updates deployed from Panorama?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 72/157
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-licenses-
and-updates/deploy-updates-to-firewalls-log-collectors-and-wildfire-appliances-using-
panorama/schedule-a-content-update-using-panorama.html
Question: 170
During the packet flow process, which two processes are performed in application identification?
om
(Choose two.)
.c
A. pattern based application identification
B. application override policy match
ps
C. session application identified
D. application changed from content inspection
m
du
Answer: AB
Explanation:
am
Reference: http://live.paloaltonetworks.com//t5/image/serverpage/image-
ex
id/12862i950F549C7D4E6309
id
Question: 171
al
.v
Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.
w
w
// w
s:
tp
ht
Which Security policy rule will allow traffic to flow to the web server?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 73/157
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/networking/nat/nat-
configuration-examples/destination-nat-exampleone-to-one-mapping
om
Question: 172
.c
What does an administrator use to validate whether a session is matching an expected NAT policy?
ps
A. system log
m
B. test command
du
C. threat log
D. config audit
am
Answer: B
ex
Explanation:
id
Reference:
al
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClQSCA0
.v
Question: 173
w
w
w
B. It causes HA synchronization to occur automatically between the HA peers after a push from
tp
Panorama.
ht
C. It reverts the firewall configuration if the firewall recognizes a loss of connectivity to Panorama
after the change.
D. It generates a config log after the Panorama configuration successfully reverts to the last running
configuration.
Answer: C
Explanation:
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/administer-
panorama/enable-automated-commit-recovery.html
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 74/157
Question: 174
According to the best practices for mission critical devices, what is the recommended interval for
antivirus updates?
A. by minute
B. hourly
C. daily
D. weekly
Answer: C
om
Explanation:
.c
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/best-
practices-for-content-and-threat-content-updates/best-practices-mission-critical.html
ps
Question: 175
m
du
DRAG DROP
am
Place the steps in the correct packet-processing order of operations.
ex
id
al
.v
w
w
// w
s:
tp
Answer:
ht
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 75/157
om
.c
ps
Reference:
m
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
Question: 176 du
am
Which Security policy match condition would an administrator use to block traffic from IP addresses
ex
A. destination address
al
B. source address
C. destination zone
.v
D. source zone
w
w
Answer: B
w
Explanation:
//
s:
Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/use-an-external-
dynamic-list-in-policy/external-dynamic-list.html
tp
ht
Question: 177
URL categories can be used as match criteria on which two policy types? (Choose two.)
A. authentication
B. decryption
C application override
D. NAT
Answer: AB
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 76/157
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-
concepts/url-category-as-policy-match-criteria.html
Question: 178
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
om
.c
A. The web session was unsuccessfully decrypted.
ps
B. The traffic was denied by security profile.
C. The traffic was denied by URL filtering.
m
D. The web session was decrypted.
du Answer: D
am
Explanation:
ex
Question: 179
id
al
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address.
Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100)
.v
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 77/157
Which two Security policy rules will accomplish this configuration? (Choose two.)
A. Untrust (Any) to DMZ (1.1.1.100), ssh - Allow
B. Untrust (Any) to Untrust (10.1.1.1), web-browsing -Allow
C. Untrust (Any) to Untrust (10.1.1.1), ssh -Allow
D. Untrust (Any)to DMZ (10.1.1.100. 10.1.1.101), ssh, web-browsing-Allow
E. Untrust (Any) to DMZ (1.1.1.100), web-browsing - Allow
Answer: AE
Explanation:
Question: 180
om
Starting with PAN-OS version 9.1, application dependency information is now reported in which two
.c
locations? (Choose two.)
ps
A. on the App Dependency tab in the Commit Status window
B. on the Policy Optimizer's Rule Usage page
m
C. on the Application tab in the Security Policy Rule creation window
du
D. on the Objects > Applications browser pages
am
Answer: AC
Explanation:
ex
Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-
id
objects-in-policy/resolve-application-dependencies.html
al
Question: 181
.v
w
w
What action will inform end users when their access to Internet content is being restricted?
w
C. Ensure that the 'site access" setting for all URL sites is set to 'alert'.
tp
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-
help/device/device-response-pages.html
Question: 182
What is a recommended consideration when deploying content updates to the firewall from
Panorama?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 78/157
A. Before deploying content updates, always check content release version compatibility.
B. Content updates for firewall A/P HA pairs can only be pushed to the active firewall.
C. Content updates for firewall A/A HA pairs need a defined master device.
D. After deploying content updates, perform a commit and push to Panorama.
Answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-licenses-
and-updates/deploy-updates-to-firewalls-log-collectors-and-wildfire-appliances-using-
om
panorama/schedule-a-content-update-using-panorama.html
Question: 183
.c
ps
Which information is included in device state other than the local configuration?
m
du
A. uncommitted changes
B. audit logs to provide information of administrative account changes
am
C. system logs to provide information of PAN-OS changes
D. device group and template settings pushed from Panorama
ex
Answer: D
id
Explanation:
al
Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-
.v
help/device/device-setup-operations.html
w
w
Question: 184
// w
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
s:
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 79/157
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
A. It defines the SSUTLS encryption strength used to protect the management interface.
B. It defines the CA certificate used to verify the client's browser.
C. It defines the certificate to send to the client's browser from the management interface.
D. It defines the firewall's global SSL/TLS timeout values.
Answer: C
Explanation:
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFGCA0
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 80/157
Question: 185
An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule,
which is set to default configuration.
om
D. tune your Traffic Log filter to include the dates
Answer: A
.c
Explanation:
ps
Question: 186
m
du
When is the content inspection performed in the packet flow process?
am
A. after the application has been identified
ex
Answer: A
.v
Explanation:
w
w
Reference:
w
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
//
s:
Question: 187
tp
ht
During the App-ID update process, what should you click on to confirm whether an existing policy
rule is affected by an App-ID update?
A. check now
B. review policies
C. test policy match
D. download
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 81/157
Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-
ids-introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/manage-new-app-ids-
introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
Question: 188
om
A. domain match
B. host names
C. wildcard
.c
D. category match
ps
Answer: D
m
Explanation:
du
Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-
am
help/objects/objects-custom-objects-url-category.html
ex
Question: 189
id
al
When HTTPS for management and GlobalProtect are enabled on the same interface, which TCP port
is used for management access?
.v
w
A. 80
w
B. 8443
C. 4443
w
D. 443
//
s:
Answer: C
tp
Explanation:
ht
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm8SCAS#:~:text=
Details,using%20https%20on%20port%204443
Question: 190
What two authentication methods on the Palo Alto Networks firewalls support authentication and
authorization for role-based access control? (Choose two.)
A. SAML
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 82/157
B. TACACS+
C. LDAP
D. Kerberos
Answer: AB
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-
administration/manage-firewall-administrators/administrative-authentication.html
The administrative accounts are defined on an external SAML, TACACS+, or RADIUS server. The server
performs both authentication and authorization. For authorization, you define Vendor-Specific
om
Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML attributes on the SAML server. PAN-OS
maps the attributes to administrator roles, access domains, user groups, and virtual systems that you
define on the firewall.
.c
ps
Question: 191
m
Choose the option that correctly completes this statement. A Security Profile can block or allow
du
traffic ____________.
am
A. on either the data place or the management plane.
B. after it is matched by a security policy rule that allows traffic.
ex
Answer: B
al
Explanation:
.v
w
Explanation/Reference:
w
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy.html
// w
After a packet has been allowed by the Security policy, Security Profiles are used to scan packets for
s:
threats, vulnerabilities, viruses, spyware, malicious URLs, data exfiltration, and exploitation software.
tp
Question: 192
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 83/157
om
Given the topology, which zone type should you configure for firewall interface E1/1?
.c
A. Tap
B. Tunnel
ps
C. Virtual Wire
m
D. Layer3
du
Answer: A
am
Explanation:
Question: 193
ex
id
Which two features can be used to tag a username so that it is included in a dynamic user group?
(Choose two.)
al
.v
A. GlobalProtect agent
w
B. XML API
C. User-ID Windows-based agent
w
Answer: B, C
s:
Explanation:
tp
Question: 194
ht
For the firewall to use Active Directory to authenticate users, which Server Profile is required in the
Authentication Profile?
A. TACACS+
B. RADIUS
C. LDAP
D. SAML
Answer: C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 84/157
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/configure-an-
authenticationprofile-and-sequence
Question: 195
Which type of security policy rule will match traffic that flows between the Outside zone and inside
zone, but would not match traffic that flows within the zones?
om
A. global
B. intrazone
C. interzone
.c
D. universal
ps
Answer: C
m
Explanation:
Reference:
du
am
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/software-and-content-
updates/dynamic-
ex
contentupdates.html#:~:text=WildFire%20signature%20updates%20are%20made,within%20a%20mi
nute%20of %
id
20availability
al
Question: 196
.v
w
Which license is required to use the Palo Alto Networks built-in IP address EDLs?
w
A. DNS Security
w
B. Threat Prevention
//
C. WildFire
s:
D. SD-Wan
tp
Answer: B
ht
Explanation:
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/use-an-external-dynamic-list-
in- policy/builtin-edls.html#:~:text=With%20an%
Question: 197
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 85/157
A. decryption profile
B. destination interface
C. timeout (min)
D. application
Answer: D
Explanation:
Explanation/Reference:
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/policies/policies-
om
security/buildingblocks-in-a-security-policy-rule.html
Question: 198
.c
ps
An administrator would like to use App-ID's deny action for an application and would like that action
updated with dynamic updates as new content becomes available.
m
Which security policy action causes this?
A. Reset server
du
am
B. Reset both
C. Deny
ex
D. Drop
id
Answer: C
al
Explanation:
.v
Explanation/Reference:
w
Reference:
w
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage-
configuration backups/revert-firewall-configuration- changes.html
// w
Question: 199
s:
tp
Which DNS Query action is recommended for traffic that is allowed by Security policy and matches
ht
A. block
B. sinkhole
C. alert
D. allow
Answer: B
Explanation:
To enable DNS sinkholing for domain queries using DNS security, you must activate your DNS Security
subscription, create (or modify) an Anti-Spyware policy to reference the DNS Security service,
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 86/157
configure the log severity and policy settings for each DNS signature category, and then attach the
profile to a security policy rule.
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/threat-prevention/dns-
security/enable-dns-security
Question: 200
Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users
on spear phishing links, unknown emails, and risky websites?
A. reconnaissance
om
B. delivery
C. exploitation
D. installation
.c
ps
Answer: B
Explanation:
m
du
Weaponization and Delivery: Attackers will then determine which methods to use in order to deliver
malicious payloads. Some of the methods they might utilize are automated tools, such as exploit kits,
am
spear phishing attacks with malicious links, or attachments and malvertizing.
Gain full visibility into all traffic, including SSL, and block high-risk applications. Extend those
ex
Block known exploits, malware and inbound command-and-control communications using multiple
threat prevention disciplines, including IPS, anti-malware, anti-CnC, DNS monitoring and sinkholing,
al
Detect unknown malware and automatically deliver protections globally to thwart new attacks.
w
Provide ongoing education to users on spear phishing links, unknown emails, risky websites, etc.
w
https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle
// w
Question: 201
s:
tp
What are three factors that can be used in domain generation algorithms? (Choose three.)
ht
A. cryptographic keys
B. time of day
C. other unique values
D. URL custom categories
E. IP address
Answer: ABC
Explanation:
Domain generation algorithms (DGAs) are used to auto-generate domains, typically in large numbers
within the context of establishing a malicious command-and-control (C2) communications channel.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 87/157
DGA-based malware (such as Pushdo, BankPatch, and CryptoLocker) limit the number of domains
from being blocked by hiding the location of their active C2 servers within a large number of possible
suspects, and can be algorithmically generated based on factors such as time of day, cryptographic
keys, or other unique values.
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/dns-
security/domain-generation-algorithm-detection
Question: 202
Which action would an administrator take to ensure that a service object will be available only to the
selected device group?
om
A. create the service object in the specific template
B. uncheck the shared option
.c
C. ensure that disable override is selected
ps
D. ensure that disable override is cleared
m
Answer: D
du
Explanation:
am
https://docs.paloaltonetworks.com/panorama/9-0/panorama-admin/manage-firewalls/manage-
device-groups/create-objects-for-use-in-shared-or-device-group-policy
ex
Question: 203
id
al
If using group mapping with Active Directory Universal Groups, what must you do when configuring
the User-ID?
.v
w
A. Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port
w
D. Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or
s:
389
tp
Answer: B
ht
Explanation:
If you have Universal Groups, create an LDAP server profile to connect to the root domain of the
Global Catalog server on port 3268 or 3269 for SSL, then create another LDAP server profile to
connect to the root domain controllers on port 389. This helps ensure that users and group
information is available for all domains and subdomains.
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-users-to-groups
Question: 204
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 88/157
Answer: D
Explanation:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/management-
om
interfaces
You can use the following user interfaces to manage the Palo Alto Networks firewall:
.c
ps
Use the Web Interface to perform configuration and monitoring tasks with relative ease. This
graphical interface allows you to access the firewall using HTTPS (recommended) or HTTP and it is
m
the best way to perform administrative tasks.
du
Use the Command Line Interface (CLI) to perform a series of tasks by entering commands in rapid
succession over SSH (recommended), Telnet, or the console port. The CLI is a no-frills interface that
am
supports two command modes, operational and configure, each with a distinct hierarchy of
commands and statements. When you become familiar with the nesting structure and syntax of the
commands, the CLI provides quick response times and administrative efficiency.
ex
Use the XML API to streamline your operations and integrate with existing, internally developed
id
applications and repositories. The XML API is a web service implemented using HTTP/HTTPS requests
and responses.
al
Use Panorama to perform web-based management, reporting, and log collection for multiple
.v
firewalls. The Panorama web interface resembles the firewall web interface but with additional
functions for centralized management.
w
w
Question: 205
// w
Which feature would be useful for preventing traffic from hosting providers that place few
s:
restrictions on content, whose services are frequently used by attackers to distribute illegal or
unethical material?
tp
ht
Answer: A
Explanation:
To block hosts that use bulletproof hosts to provide malicious, illegal, and/or unethical content, use
the bulletproof IP address list in policy.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 89/157
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/content-inspection-
features/edl-for-bulletproof-
isps#:~:text=A%20new%20built%2Din%20external,%2C%20illegal%2C%20and%20unethical%20cont
ent.
Question: 206
Which attribute can a dynamic address group use as a filtering condition to determine its
membership?
A. tag
om
B. wildcard mask
C. IP address
D. subnet mask
.c
ps
Answer: A
Explanation:
m
du
Dynamic Address Groups: A dynamic address group populates its members dynamically using looks
ups for tags and tag-based filters. Dynamic address groups are very useful if you have an extensive
am
virtual infrastructure where changes in virtual machine location/IP address are frequent. For
example, you have a sophisticated failover setup or provision new virtual machines frequently and
ex
would like to apply policy to traffic from or to the new machine without modifying the
configuration/rules on the firewall.
id
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-address-
groups
al
.v
Question: 207
w
w
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 90/157
om
.c
ps
m
What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into
du
both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?
A)
am
ex
id
B)
al
.v
w
w
w
C)
//
s:
tp
ht
D)
A. Option A
B. Option B
C. Option C
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 91/157
D. Option D
Answer: C
Explanation:
Question: 208
An administrator needs to add capability to perform real-time signature lookups to block or sinkhole
all known malware domains.
Which type of single unified engine will get this result?
om
A. User-ID
B. App-ID
.c
C. Security Processing Engine
D. Content-ID
ps
Answer: A
m
Explanation:
Question: 209 du
am
Which solution is a viable option to capture user identification when Active Directory is not in use?
ex
id
D. Authentication Portal
w
Answer: D
w
Explanation:
// w
Question: 210
s:
tp
You receive notification about a new malware that infects hosts An infection results in the infected
host attempting to contact a command-and-control server Which Security Profile when applied to
ht
outbound Security policy rules detects and prevents this threat from establishing a command-and-
control connection?
A. Antivirus Profile
B. Data Filtering Profile
C. Vulnerability Protection Profile
D. Anti-Spyware Profile
Answer: D
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 92/157
Anti-Spyware Security Profiles block spyware on compromised hosts from trying to communicate
with external command-and-control (C2) servers, thus enabling you to detect malicious traffic
leaving the network from infected clients.
Question: 211
Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are
verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?
om
C. Palo Alto Networks High-Risk IP Addresses
D. Palo Alto Networks Known Malicious IP Addresses
.c
Answer: D
ps
Explanation:
m
Palo Alto Networks Known Malicious IP Addresses
du
—Contains IP addresses that are verified malicious based on WildFire analysis, Unit 42 research, and
data gathered from telemetry (Share Threat Intelligence with Palo Alto Networks). Attackers use
am
these IP addresses almost exclusively to distribute malware, initiate command-and-control activity,
and launch attacks.
ex
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/use-an-external-dynamic-list-
id
in-policy/built-in-edls
al
Question: 212
.v
w
The compliance officer requests that all evasive applications need to be blocked on all perimeter
w
firewalls out to the internet The firewall is configured with two zones;
1. trust for internal networks
w
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security
s:
A. Create a deny rule at the top of the policy from trust to untrust with service application-default
ht
Answer: AD
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 93/157
Question: 213
Answer: B
Explanation:
om
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-
.c
credential-phishing/set-up-credential-phishing-prevention
ps
Question: 214
m
What allows a security administrator to preview the Security policy rules that match new application
du
signatures?
am
A. Review Release Notes
B. Dynamic Updates-Review Policies
ex
Answer: B
.v
Explanation:
w
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-
w
introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
// w
Question: 215
s:
A. Policy Optimizer can display which Security policies have not been used in the last 90 days
B. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have
unused applications
C. Policy Optimizer can add or change a Log Forwarding profile for each Secunty policy selected
D. Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID
Security policy for every Layer 4 policy that exists Admins can then manually enable policies they
want to keep and delete ones they want to remove
Answer: B
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 94/157
Question: 216
An address object of type IP Wildcard Mask can be referenced in which part of the configuration?
Answer: A
om
Explanation:
.c
You can use an address object of type IP Wildcard Mask only in a Security policy rule.
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/objects/objects-
ps
addresses
m
IP Wildcard Mask
du
—Enter an IP wildcard address in the format of an IPv4 address followed by a slash and a mask
(which must begin with a zero); for example, 10.182.1.1/0.127.248.0. In the wildcard mask, a zero (0)
am
bit indicates that the bit being compared must match the bit in the IP address that is covered by the
0. A one (1) bit in the mask is a wildcard bit, meaning the bit being compared need not match the bit
ex
in the IP address that is covered by the 1. Convert the IP address and the wildcard mask to binary. To
illustrate the matching: on binary snippet 0011, a wildcard mask of 1010 results in four matches
id
Question: 217
.v
w
An administrator would like to determine the default deny action for the application dns-over-https
w
B. Check the action for the Security policy matching that traffic
s:
Answer: D
Explanation:
Question: 218
An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone,
and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow
traffic between the DMZ and LAN zones.
Which Security policy rule type should they use?
A. default
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 95/157
B. universal
C. intrazone
D. interzone
Answer: C
Explanation:
Question: 219
What are three valid ways to map an IP address to a username? (Choose three.)
om
A. using the XML API
B. DHCP Relay logs
.c
C. a user connecting into a GlobalProtect gateway using a GlobalProtect Agent
D. usernames inserted inside HTTP Headers
ps
E. WildFire verdict reports
m
Answer: A, C, D
du
Explanation:
am
Question: 220
ex
Which object would an administrator create to enable access to all applications in the office-
id
programs subcategory?
al
A. application filter
.v
B. URL category
C. HIP profile
w
D. application group
w
w
Answer: A
//
Explanation:
s:
tp
Question: 221
ht
An administrator would like to create a URL Filtering log entry when users browse to any gambling
website. What combination of Security policy and Security profile actions is correct?
Answer: C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 96/157
Question: 222
Answer: C
Explanation:
om
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-policy-rules/nat-
.c
policy-overview
ps
Question: 223
m
After making multiple changes to the candidate configuration of a firewall, the administrator would
du
like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient way
am
to accomplish this?
ex
Answer: C
w
Explanation:
w
w
Question: 224
//
s:
An administrator is reviewing the Security policy rules shown in the screenshot below.
Which statement is correct about the information displayed?
tp
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 97/157
Answer: B
Explanation:
Question: 225
What are the two default behaviors for the intrazone-default policy? (Choose two.)
om
A. Allow
.c
B. Logging disabled
C. Log at Session End
ps
D. Deny
m
Answer: A, B
du
Explanation:
am
Question: 226
ex
What are two valid selections within an Antivirus profile? (Choose two.)
id
A. deny
al
B. drop
.v
C. default
D. block-ip
w
w
Answer: B, C
w
Explanation:
//
s:
Question: 227
tp
DRAG DROP
ht
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 98/157
Answer:
Explanation:
om
.c
ps
Question: 228
m
An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated
du
to the same public IP address. What is the most appropriate NAT policy to achieve this?
am
A. Dynamic IP and Port
B. Dynamic IP
ex
C. Static IP
D. Destination
id
Answer: A
al
Explanation:
.v
w
Question: 229
w
w
Which action can be set in a URL Filtering Security profile to provide users temporary access to all
websites in a given category using a provided password?
//
s:
A. exclude
tp
B. continue
C. hold
ht
D. override
Answer: D
Explanation:
The user will see a response page indicating that a password is required to allow access to websites
in the given category. With this option, the security administrator or help-desk person would provide
a password granting temporary access to all websites in the given category. A log entry is generated
in the URL Filtering log. The Override webpage doesn’t display properly on client systems configured
to use a proxy server.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 99/157
Question: 230
Answer: C
Explanation:
om
Question: 231
.c
ps
What are three Palo Alto Networks best practices when implementing the DNS Security Service?
(Choose three.)
m
A. Implement a threat intel program.
du
B. Configure a URL Filtering profile.
C. Train your staff to be security aware.
am
D. Rely on a DNS resolver.
E. Plan for mobile-employee risk
ex
Answer: A, B, D
id
Explanation:
al
.v
Question: 232
w
An administrator is investigating a log entry for a session that is allowed and has the end reason of
w
aged-out. Which two fields could help in determining if this is normal? (Choose two.)
// w
A. Packets sent/received
s:
B. IP Protocol
C. Action
tp
D. Decrypted
ht
Answer: B, D
Explanation:
Question: 233
A. It dynamically provides application statistics based on network, threat, and blocked activity,
B. It dynamically filters applications based on critical, high, medium, low. or informational severity.
C. It dynamically groups applications based on application attributes such as category and
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 100/157
subcategory.
D. It dynamically shapes defined application traffic based on active sessions and bandwidth usage.
Answer: C
Explanation:
Question: 234
Prior to a maintenance-window activity, the administrator would like to make a backup of only the
running configuration to an external location. What command in Device > Setup > Operations would
provide the most operationally efficient way to achieve this outcome?
om
A. save named configuration snapshot
.c
B. export device state
C. export named configuration snapshot
ps
D. save candidate config
m
Answer: A
du
Explanation:
am
Export Named Configuration Snapshot This option exports the current running configuration, a
candidate configuration snapshot, or a previously imported configuration (candidate or running). The
ex
firewall exports the configuration as an XML file with the specified name. You can save the snapshot
in any network location. These exports often are used as backups. These XML files also can be used
id
Question: 235
.v
w
Your company is highly concerned with their Intellectual property being accessed by unauthorized
w
resources. There is a mature process to store and include metadata tags for all confidential
w
documents.
Which Security profile can further ensure that these documents do not exit the corporate network?
//
s:
A. File Blocking
tp
B. Data Filtering
ht
C. Anti-Spyware
D. URL Filtering
Answer: B
Explanation:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-security-
profiles-data-filtering
Question: 236
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 101/157
An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule. What is
the best way to do this?
Answer: B
Explanation:
om
Question: 237
.c
When creating a Panorama administrator type of Device Group and Template Admin, which two
things must you create first? (Choose two.)
ps
A. password profile
m
B. access domain
du
C. admin rote
D. server profile
am
Answer: C, D
ex
Explanation:
id
Question: 238
al
.v
An administrator is troubleshooting traffic that should match the interzone-default rule. However,
the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was
w
Answer: D
Explanation:
Question: 239
A. name
B. source zone
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 102/157
C. destination interface
D. destination address
E. destination zone
Answer: B, D, E
Explanation:
Question: 240
om
A. IP range
B. IP netmask
.c
C. named address
D. FQDN
ps
Answer: D
m
Explanation:
Question: 241 du
am
What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)
ex
id
Answer: A, B, C
w
Explanation:
//
s:
DNS Security subscription enables users to access real-time protections using advanced predictive
analytics. When techniques such as DGA/DNS tunneling detection and machine learning are used,
tp
threats hidden within DNS traffic can be proactively identified and shared through an infinitely
ht
scalable cloud service. Because the DNS signatures and protections are stored in a cloud-based
architecture, you can access the full database of ever-expanding signatures that have been generated
using a multitude of data sources. This list of signatures allows you to defend against an array of
threats using DNS in real-time against newly generated malicious domains. To combat future threats,
updates to the analysis, detection, and prevention capabilities of the DNS Security service will be
available through content releases. To access the DNS Security service, you must have a Threat
Prevention license and DNS Security license.
Question: 242
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 103/157
Answer: A
Explanation:
om
Question: 243
.c
An administrator would like to block access to a web server, while also preserving resources and
minimizing half-open sockets. What are two security policy actions the administrator can select?
ps
(Choose two.)
m
A. Reset server
du
B. Reset both
C. Drop
am
D. Deny
ex
Answer: A, C
Explanation:
id
al
Question: 244
.v
An administrator would like to apply a more restrictive Security profile to traffic for file sharing
w
applications. The administrator does not want to update the Security policy or object when new
w
Which object should the administrator use as a match condition in the Security policy?
//
C. an application group containing all of the file-sharing App-IDs reported in the traffic logs
ht
Answer: D
Explanation:
Question: 245
A network administrator is required to use a dynamic routing protocol for network connectivity.
Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose?
(Choose three.)
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 104/157
A. RIP
B. OSPF
C. IS-IS
D. EIGRP
E. BGP
Answer: A, B, E
Explanation:
Question: 246
om
.c
ps
m
du
am
ex
id
al
.v
Given the detailed log information above, what was the result of the firewall traffic inspection?
w
w
Answer: C
ht
Explanation:
Question: 247
Which three interface deployment methods can be used to block traffic flowing through the Palo Alto
Networks firewall? (Choose three.)
A. Layer 2
B. Virtual Wire
C. Tap
D. Layer 3
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 105/157
E. HA
Answer: B, D, E
Explanation:
Question: 248
An administrator configured a Security policy rule where the matching condition includes a single
application and the action is set to deny. What deny action will the firewall perform?
om
B. Perform the default deny action as defined in the App-ID database for the application
C. Send a TCP reset packet to the client- and server-side devices
.c
D. Discard the session's packets and send a TCP reset packet to let the client know the session has
been terminated
ps
Answer: D
m
Explanation:
Question: 249 du
am
Which object would an administrator create to enable access to all applications in the office-
ex
programs subcategory?
id
A. HIP profile
al
B. Application group
.v
C. URL category
D. Application filter
w
w
Answer: C
w
Explanation:
//
s:
Question: 250
tp
What do you configure if you want to set up a group of objects based on their ports alone?
ht
A. Application groups
B. Service groups
C. Address groups
D. Custom objects
Answer: B
Explanation:
Question: 251
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 106/157
om
.c
ps
m
View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and
du
SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust
Zones?
am
A)
ex
id
al
B)
.v
w
w
w
C)
//
s:
tp
ht
D)
A. Option
B. Option
C. Option
D. Option
Answer: C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 107/157
Question: 252
om
Submit for "request change*, identifying the appropriate categorization, and wait for confirmation
before testing again.
D. Create a URL category and assign the affected URL.
.c
Add a Security policy with a URL category qualifier of the custom URL category below the original
ps
policy. Set the policy action to Deny.
m
Answer: C, D
du
Explanation:
am
Question: 253
ex
Why should a company have a File Blocking profile that is attached to a Security policy?
id
Answer: A
w
Explanation:
//
s:
Question: 254
tp
An administrator is troubleshooting traffic that should match the interzone-default rule. However,
ht
the administrator doesn't see this traffic in the traffic logs on the firewall. The interzone-default was
never changed from its default configuration.
Why doesn't the administrator see the traffic?
Answer: A
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 108/157
Question: 255
om
.c
ps
m
Given the detailed log information above, what was the result of the firewall traffic inspection?
Answer: B
al
Explanation:
.v
w
w
Question: 256
// w
An administrator would like to protect against inbound threats such as buffer overflows and illegal
s:
code execution.
tp
A. Antivirus
B. URL filtering
C. Anti-spyware
D. Vulnerability protection
Answer: C
Explanation:
Question: 257
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 109/157
A. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have
unused applications.
B. Policy Optimizer can add or change a Log Forwarding profile for each Security policy selected.
C. Policy Optimizer can display which Security policies have not been used in the last 90 days.
D. Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID
Security policy for every Layer 4 policy that exists. Admins can then manually enable policies they
want to keep and delete ones they want to remove.
Answer: C
om
Explanation:
.c
ps
Question: 258
m
Which rule type is appropriate for matching traffic occurring within a specified zone?
A. Interzone
du
am
B. Universal
C. Intrazone
ex
D. Shadowed
id
Answer: C
al
Explanation:
.v
Question: 259
w
w
What is a recommended consideration when deploying content updates to the firewall from
w
Panorama?
//
A. Content updates for firewall A/P HA pairs can only be pushed to the active firewall.
s:
B. Content updates for firewall A/A HA pairs need a defined master device.
tp
C. Before deploying content updates, always check content release version compatibility.
ht
Answer: C
Explanation:
Question: 260
Which Security policy action will message a user's browser thai their web session has been
terminated?
A. Reset server
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 110/157
B. Deny
C. Drop
D. Reset client
Answer: B
Explanation:
Question: 261
An administrator configured a Security policy rule with an Antivirus Security profile. The
administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall
om
handle the traffic?
.c
A. It allows the traffic because the profile was not set to explicitly deny the traffic.
B. It drops the traffic because the profile was not set to explicitly allow the traffic.
ps
C. It uses the default action assigned to the virus signature.
D. It allows the traffic but generates an entry in the Threat logs.
m
du
Answer: B
Explanation:
am
Question: 262
ex
id
Selecting the option to revert firewall changes will replace what settings?
al
Answer: A
//
Explanation:
s:
tp
Question: 263
ht
What can be used as match criteria for creating a dynamic address group?
A. Usernames
B. IP addresses
C. Tags
D. MAC addresses
Answer: C
Explanation:
Question: 264
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 111/157
A. Create an application filter and filter it on the collaboration category, email subcategory.
B. Create an application group and add the email applications to it.
C. Create an application filter and filter it on the collaboration category.
D. Create an application group and add the email category to it.
Answer: B
Explanation:
om
Question: 265
.c
An administrator has an IP address range in the external dynamic list and wants to create an
ps
exception for one specific IP address in this address range.
Which steps should the administrator take?
m
du
A. Add the address range to the Manual Exceptions list and exclude the IP address by selecting the
entry.
am
B. Add each IP address in the range as a list entry and then exclude the IP address by adding it to the
Manual Exceptions list.
ex
C. Select the address range in the List Entries list. A column will open with the IP addresses. Select
the entry to exclude.
id
D. Add the specific IP address from the address range to the Manual Exceptions list by using regular
expressions to define the entry.
al
.v
Answer: D
w
Explanation:
w
Question: 266
// w
list manually. The administrator wants to save the changes, but the OK button is grayed out.
tp
What are two possible reasons the OK button is grayed out? (Choose two.)
ht
Answer: B, C
Explanation:
Question: 267
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 112/157
om
An administrator is updating Security policy to align with best practices.
Which Policy Optimizer feature is shown in the screenshot below?
.c
ps
A. Rules without App Controls
B. New App Viewer
m
C. Rule Usage
du
D. Unused Unused Apps
am
Answer: C
Explanation:
ex
Question: 268
id
al
A. Reset-client
w
B. Reset-server
w
C. Deny
w
D. Allow
//
s:
Answer: C
Explanation:
tp
ht
Question: 269
Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)
A. Post-NAT address
B. Post-NAT zone
C. Pre-NAT zone
D. Pre-NAT address
Answer: B, D
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 113/157
Question: 270
What are three valid information sources that can be used when tagging users to dynamic user
groups? (Choose three.)
om
Answer: B, C, E
.c
Explanation:
ps
Question: 271
m
What is the maximum volume of concurrent administrative account sessions?
A. Unlimited
du
am
B. 2
C. 10
ex
D. 1
id
Answer: C
al
Explanation:
.v
Question: 272
w
w
In a File Blocking profile, which two actions should be taken to allow file types that support critical
w
Answer: A, D
Explanation:
Question: 273
Where within the firewall GUI can all existing tags be viewed?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 114/157
Answer: C
Explanation:
Question: 274
Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
A. Anti-Spyware
om
B. Antivirus
C. Vulnerability Protection
.c
D. URL Filtering
ps
Answer: D
m
Explanation:
du
Question: 275
am
Which Security profile would you apply to identify infected hosts on the protected network uwall
user database?
ex
id
A. Anti-spyware
B. Vulnerability protection
al
C. URL filtering
.v
D. Antivirus
w
Answer: A
w
Explanation:
// w
Question: 276
s:
tp
What can be achieved by disabling the Share Unused Address and Service Objects with Devices
setting on Panorama?
ht
Answer: D
Explanation:
Question: 277
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 115/157
The NetSec Manager asked to create a new firewall Local Administrator profile with customized
privileges named NewAdmin. This new administrator has to authenticate without inserting any
username or password to access the WebUI.
What steps should the administrator follow to create the New_Admin Administrator profile?
A.
1. Select the "Use only client certificate authentication" check box.
2. Set Role to Role Based.
3. Issue to the Client a Certificate with Common Name = NewAdmin
B.
1. Select the "Use only client certificate authentication" check box.
2. Set Role to Dynamic.
om
3. Issue to the Client a Certificate with Certificate Name = NewAdmin
C.
.c
1. Set the Authentication profile to Local.
ps
2. Select the "Use only client certificate authentication" check box.
3. Set Role to Role Based.
m
D.
1. Select the "Use only client certificate authentication" check box.
du
2. Set Role to Dynamic.
3. Issue to the Client a Certificate with Common Name = New Admin
am
Answer: B
ex
Explanation:
id
Question: 278
al
.v
Answer: B
Explanation:
ht
Question: 279
Which firewall feature do you need to configure to query Palo Alto Networks service updates over a
data-plane interface instead of the management interface?
A. Data redistribution
B. Dynamic updates
C. SNMP setup
D. Service route
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 116/157
Answer: D
Explanation:
Question: 280
An administrator is trying to enforce policy on some (but not all) of the entries in an external
dynamic list. What is the maximum number of entries that they can be exclude?
A. 50
B. 100
C. 200
om
D. 1,000
.c
Answer: B
ps
Explanation:
m
Question: 281
du
To what must an interface be assigned before it can process traffic?
am
A. Security Zone
B. Security policy
ex
C. Security Protection
id
D. Security profile
al
Answer: A
.v
Explanation:
w
Question: 282
w
w
Which User Credential Detection method should be applied within a URL Filtering Security profile to
//
check for the submission of a valid corporate username and the associated password?
s:
tp
A. Domain Credential
B. IP User
ht
C. Group Mapping
D. Valid Username Detected Log Severity
Answer: C
Explanation:
Question: 283
Which interface type requires no routing or switching but applies Security or NAT policy rules before
passing allowed traffic?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 117/157
A. Layer 3
B. Virtual Wire
C. Tap
D. Layer 2
Answer: A
Explanation:
Question: 284
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a
om
Security policy with App-ID be configured?
A)
.c
ps
m
B)
du
am
ex
C)
id
al
.v
w
D)
w
// w
s:
tp
A. Option A
B. Option B
ht
C. Option C
D. Option D
Answer: D
Explanation:
Question: 285
All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 118/157
Complete the empty field in the Security policy using an application object to permit only this type of
access.
Service: application-default -
Action: allow
om
A. Application = "any"
B. Application = "web-browsing"
.c
C. Application = "ssl"
ps
D. Application = "http"
m
Answer: B
du
Explanation: am
Question: 286
ex
A network administrator created an intrazone Security policy rule on the firewall. The source zones
id
Which two types of traffic will the rule apply to? (Choose two)
.v
w
Answer: CD
tp
Explanation:
ht
Question: 287
Which three filter columns are available when setting up an Application Filter? (Choose three.)
A. Parent App
B. Category
C. Risk
D. Standard Ports
E. Subcategory
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 119/157
Answer: BCE
Explanation:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-
application-filters
Question: 288
What are three ways application characteristics are used? (Choose three.)
om
.c
A. As an attribute to define an application group
ps
B. As a setting to define a new custom application
m
C. As an Object to define Security policies
Answer: ABD
id
Explanation:
al
Question: 289
.v
w
Files are sent to the WildFire cloud service via the WildFire Analysis Profile. How are these files
w
used?
// w
B. Malware analysis
ht
D. Spyware analysis
Answer: B
Explanation:
Question: 290
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 120/157
A. Policies
B. Network
C. Objects
D. Device
Answer: C
om
Explanation:
.c
An administrator can configure URL Filtering profiles in the Objects section of the PAN-OS GUI. A URL
ps
Filtering profile is a collection of URL filtering controls that you can apply to individual Security policy
rules that allow access to the internet1. You can set site access for URL categories, allow or disallow
m
user credential submissions, enable safe search enforcement, and various other settings1.
du
To create a URL Filtering profile, go to Objects > Security Profiles > URL Filtering and click Add. You
can then specify the profile name, description, and settings for each URL category and action2. You
am
can also configure other options such as User Credential Detection, HTTP Header Insertion, and URL
Filtering Inline ML2. After creating the profile, you can attach it to a Security policy rule that allows
web traffic2.
ex
id
Question: 291
al
By default, what is the maximum number of templates that can be added to a template stack?
.v
w
A. 6
B. 8
w
C. 10
w
D. 12
//
s:
Answer: B
tp
Explanation:
ht
By default, the maximum number of templates that can be added to a template stack is 8. This is the
recommended limit for performance reasons, as adding more templates may result in sluggish
responses on the user interface. However, starting from PAN-OS 8.1.10 and 9.0.4, you can use a
debug command to increase the maximum number of templates per stack to 16. This command
requires a commit operation to take effect.
A template stack is a collection of templates that you can use to push common settings to multiple
firewalls or Panorama managed collectors. A template contains the network and device settings that
you want to share across devices, such as interfaces, zones, virtual routers, DNS, NTP, and login
banners. You can create multiple templates for different device groups or locations and add them to
a template stack in a hierarchical order. The settings in the lower templates override the settings in
the higher templates if there are any conflicts. You can then assign a template stack to one or more
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 121/157
Question: 292
Within an Anti-Spyware security profile, which tab is used to enable machine learning based
engines?
om
B. Signature Exceptions
.c
C. Machine Learning Policies
ps
D. Signature Policies
m
du
Answer: A
Explanation:
am
An Anti-Spyware security profile is a set of rules that defines how the firewall detects and prevents
ex
spyware from compromising hosts on the network. Spyware is a type of malware that collects
information from the infected system, such as keystrokes, browsing history, or personal data, and
id
The Signature Policies tab allows you to configure the actions and log settings for each spyware
w
signature category, such as adware, botnet, keylogger, phishing, or worm. You can also enable DNS
Security to block malicious DNS queries and responses1.
w
The Signature Exceptions tab allows you to create exceptions for specific spyware signatures that you
w
want to override the default action or log settings. For example, you can allow a signature that is
//
normally blocked by the profile, or block a signature that is normally alerted by the profile1.
s:
The Machine Learning Policies tab allows you to configure the actions and log settings for machine
learning based signatures that detect unknown spyware variants. You can also enable WildFire
tp
The Inline Cloud Analysis tab allows you to enable machine learning based engines that detect
unknown spyware variants in real time. These engines use cloud-based models to analyze the
behavior and characteristics of network traffic and identify malicious patterns. You can enable inline
cloud analysis for HTTP/HTTPS traffic, SMTP/SMTPS traffic, or IMAP/IMAPS traffic1.
Therefore, the tab that is used to enable machine learning based engines is the Inline Cloud Analysis
tab.
References:
1: Security Profile: Anti-Spyware - Palo Alto Networks
Question: 293
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 122/157
Which two DNS policy actions in the anti-spyware security profile can prevent hacking attacks
through DNS queries to malicious domains? (Choose two.)
A. Deny
B. Sinkhole
C. Override
D. Block
om
Answer: BD
.c
Explanation:
ps
A DNS policy action is a setting in an Anti-Spyware security profile that defines how the firewall
m
handles DNS queries to malicious domains. A malicious domain is a domain name that is associated
du
with a known threat, such as malware, phishing, or botnet1.
There are four possible DNS policy actions: alert, allow, block, and sinkhole1.
am
The alert action logs the DNS query and allows it to proceed to the intended destination. This action
does not prevent hacking attacks, but only notifies the administrator of the potential threat1.
The allow action allows the DNS query to proceed to the intended destination without logging it. This
ex
action does not prevent hacking attacks, but only bypasses the DNS security inspection2.
id
The block action blocks the DNS query and sends a response to the client with an NXDOMAIN (non-
existent domain) error code. This action prevents hacking attacks by preventing the client from
al
The sinkhole action redirects the DNS query to a predefined IP address (the sinkhole IP address) that
is under the control of the administrator. This action prevents hacking attacks by isolating the client
w
from the malicious domain and allowing the administrator to monitor and remediate the infected
w
host1.
w
The override action is not a valid DNS policy action, but a setting in an Anti-Spyware security profile
that allows the administrator to create exceptions for specific spyware signatures that they want to
//
Therefore, the two DNS policy actions that can prevent hacking attacks through DNS queries to
tp
1: Enable DNS Security - Palo Alto Networks 2: How To Disable the DNS Security Feature from an
Anti-Spyware Profile - Palo Alto Networks 3: Security Profile: Anti-Spyware - Palo Alto Networks
Question: 294
A. WildFire analysis
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 123/157
B. Vulnerability profile
C. Content-ID
Answer: A
Explanation:
A profile is a set of rules or settings that defines how the firewall performs a specific function, such as
detecting and preventing threats, filtering URLs, or decrypting traffic1.
om
There are different types of profiles that can be applied to different types of traffic or scenarios, such
as Antivirus, Anti-Spyware, Vulnerability Protection, URL Filtering, File Blocking, Data Filtering,
Decryption, or WildFire Analysis1.
.c
The WildFire Analysis profile is a profile that enables the firewall to submit unknown files or email
ps
links to the cloud-based WildFire service for analysis and verdict determination2. WildFire is the
industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and
m
malware3. WildFire uses a variety of malware detection techniques, such as static analysis, dynamic
du
analysis, machine learning, and intelligent run-time memory analysis, to identify and protect against
unknown threats34.
am
The Vulnerability Protection profile is a profile that protects the network from exploits that target
known software vulnerabilities. It allows the administrator to configure the actions and log settings
for each vulnerability severity level, such as critical, high, medium, low, or informational5.
ex
Content-ID is not a profile, but a feature of the firewall that performs multiple functions to identify
id
and control applications, users, content, and threats on the network. Content-ID consists of four
components: App-ID, User-ID, Content Inspection, and Threat Prevention.
al
Advanced Threat Prevention is not a profile, but a term that refers to the comprehensive approach of
.v
Palo Alto Networks to prevent sophisticated and unknown threats. Advanced Threat Prevention
includes WildFire, but also other products and services, such as DNS Security, Cortex XDR, Cortex
w
Therefore, the profile that should be used to obtain a verdict regarding analyzed files is the WildFire
w
Analysis profile.
References:
//
1: Security Profiles - Palo Alto Networks 2: WildFire Analysis Profile - Palo Alto Networks 3: WildFire -
s:
Palo Alto Networks 4: Advanced Wildfire as an ICAP Alternative | Palo Alto Networks 5: Vulnerability
tp
Protection Profile - Palo Alto Networks : [Content-ID - Palo Alto Networks] : [Advanced Threat
Prevention - Palo Alto Networks]
ht
Question: 295
How can a complete overview of the logs be displayed to an administrator who has permission in the
system to view them?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 124/157
Answer: A
Explanation:
The best way to view a complete overview of the logs is to select the unified log entry in the side
menu. The unified log is a single view that displays all the logs generated by the firewall, such as
traffic, threat, URL filtering, data filtering, and WildFire logs1. The unified log allows the
om
administrator to filter, sort, and export the logs based on various criteria, such as time range,
severity, source, destination, application, or action1.
Modifying the number of columns visible on the page or the number of logs visible on each page
.c
does not provide a complete overview of the logs, but only changes the display settings of the
ps
current log view. Selecting the system logs entry in the side menu does not show all the logs
generated by the firewall, but only shows the logs related to system events, such as configuration
m
changes, system alerts, or HA status2.
du
References:
am
1: View Logs - Palo Alto Networks 2: View and Manage Logs - Palo Alto Networks
Question: 296
ex
id
A. By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered
in the network
w
w
B. To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks
//
external services
s:
C. For routing, because they are the shortest path selected by the BGP routing protocol
tp
ht
D. To route management plane services through data interfaces rather than the management
interface
Answer: D
Explanation:
Service routes are a feature of PAN-OS that allows the administrator to customize the interface that
the firewall uses to send requests to external services, such as DNS, email, Palo Alto Networks
updates, User-ID agent, syslog, Panorama, dynamic updates, URL updates, licenses, and AutoFocus1.
By default, the firewall uses the management interface for all service routes, unless the packet
destination IP address matches the configured destination service route, in which case the source IP
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 125/157
om
Therefore, service routes are used to route management plane services through data interfaces
rather than the management interface.
.c
References:
ps
1: Configure Service Routes - Palo Alto Networks 2: Setting a Service Route for Services to Use a
Dataplane’s Interface - Palo Alto Networks 3: How to Perform Updates when Management Interface
m
does not have Public Internet Access - Palo Alto Networks
Question: 297 du
am
What is the default action for the SYN Flood option within the DoS Protection profile?
ex
id
A. Alert
B. Random Early Drop
al
C. Reset-client
.v
D. Sinkhole
w
Answer: B
w
Explanation:
// w
Random Early Drop —The firewall uses an algorithm to progressively start dropping that type of
s:
packet. If the attack continues, the higher the incoming cps rate (above the Activate Rate) gets, the
more packets the firewall drops. .. (https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-
tp
admin/zone-protection-and-dos-protection/dos-protection-against-flooding-of-new-
ht
sessions/configure-dos-protection-against-flooding-of-new-sessions)
Question: 298
Which Security policy set should be used to ensure that a policy is applied first?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 126/157
Answer: B
Explanation:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/panorama-web-
interface/defining-policies-on-panorama
Question: 299
Which type of DNS signatures are used by the firewall to identify malicious and command-and-
control domains?
om
A. DNS Malicious signatures
B. DNS Malware signatures
.c
C. DNS Block signatures
D. DNS Security signatures
ps
Answer: D
m
Explanation:
du
https://docs.paloaltonetworks.com/dns-security/administration/configure-dns-security/enable-dns-
am
security#tabs-id066476b2-c4dd-4fc0-b7e4-f4ba32e19f60
ex
Question: 300
id
Which three types of entries can be excluded from an external dynamic list (EDL)? (Choose three.)
al
.v
A. IP addresses
B. Domains
w
C. User-ID
w
D. URLs
w
E. Applications
//
s:
Answer: ABD
Explanation:
tp
ht
Three types of entries that can be excluded from an external dynamic list (EDL) are IP addresses,
domains, and URLs. An EDL is a text file that is hosted on an external web server and contains a list of
objects, such as IP addresses, URLs, domains, International Mobile Equipment Identities (IMEIs), or
International Mobile Subscriber Identities (IMSIs) that the firewall can import and use in policy rules.
You can exclude entries from an EDL to prevent the firewall from enforcing policy on those
entries. For example, you can exclude benign domains that applications use for background traffic
from Authentication policy1. To exclude entries from an EDL, you need to:
Select the EDL on the firewall and click Manual Exceptions.
Add the entries that you want to exclude in the Manual Exceptions list. The entries must match the
type and format of the EDL. For example, if the EDL contains IP addresses, you can only exclude IP
addresses.
Click OK to save the changes. The firewall will not enforce policy on the excluded entries.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 127/157
Reference: Exclude Entries from an External Dynamic List, External Dynamic List, Certifications - Palo
Alto Networks, Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) or Palo
Alto Networks Certified Network Security Administrator (PAN-OS 10.0).
Question: 301
The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication
Sequence SYS01," and the authentication sequence SYS01 has a profile list with four authentication
profiles:
• Auth Profile LDAP
• Auth Profile Radius
om
• Auth Profile Local
• Auth Profile TACACS
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable
.c
but has lost the "SYS01 Admin" username and password.
ps
What is the "SYS01 Admin" login capability after the outage?
m
A. Auth KO because RADIUS server lost user and password for SYS01 Admin
du
B. Auth KO because LDAP server is not reachable
C. Auth OK because of the Auth Profile Local
am
D. Auth OK because of the Auth Profile TACACS -
Answer: C
ex
Explanation:
id
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-an-
al
authentication-profile-and-sequence
.v
w
Question: 302
w
In which two Security Profiles can an action equal to the block IP feature be configured? (Choose
w
two.)
//
s:
A. Antivirus
tp
B. URL Filtering
C. Vulnerability Protection
ht
D. Anti-spyware
Answer: CD
Explanation:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-security-
profiles/actions-in-security-profiles
Question: 303
What are two valid selections within an Anti-Spyware profile? (Choose two.)
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 128/157
A. Default
B. Deny
C. Random early drop
D. Drop
Answer: AD
Explanation:
Deny is a policy action, random early drop is part of the inner workings of DoS protection
om
Question: 304
.c
When is an event displayed under threat logs?
ps
A. When traffic matches a corresponding Security Profile
B. When traffic matches any Security policy
m
C. Every time a session is blocked
du
D. Every time the firewall drops a connection
am
Answer: A
Explanation:
ex
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/monitoring/view-and-manage-
id
logs/log-types-and-severity-levels/threat-
al
logs#:~:text=Threat%20logs%20display%20entries%20when,security%20rule%20on%20the%20firew
all.
.v
w
Question: 305
w
w
Which Security profile should be applied in order to protect against illegal code execution?
//
Answer: A
Explanation:
The Security profile that should be applied in order to protect against illegal code execution is the
Vulnerability Protection profile on allowed traffic. The Vulnerability Protection profile defines the
actions that the firewall takes to protect against exploits and vulnerabilities in applications and
protocols. The firewall can block or alert on traffic that matches a specific threat signature or a group
of threats. The Vulnerability Protection profile can prevent illegal code execution by detecting and
blocking attempts to exploit buffer overflows, format string vulnerabilities, or other code injection
techniques1. To apply the Vulnerability Protection profile on allowed traffic, you need to:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 129/157
Create or modify a Vulnerability Protection profile on the firewall or Panorama and configure the
rules and exceptions for the threats that you want to protect against2.
Attach the Vulnerability Protection profile to a Security policy rule that allows traffic that you want to
scan for vulnerabilities3.
Commit the changes to the firewall or Panorama and the managed firewalls.
Reference: Vulnerability Protection Profile, Create a Vulnerability Protection Profile, Attach a
Vulnerability Protection Profile to a Security Policy Rule, Certifications - Palo Alto Networks, Palo Alto
Networks Certified Network Security Administrator (PAN-OS 10.0) or [Palo Alto Networks Certified
Network Security Administrator (PAN-OS 10.0)].
Question: 306
om
Which three types of Source NAT are available to users inside a NGFW? (Choose three.)
.c
A. Dynamic IP and Port (DIPP)
ps
B. Static IP
C. Static Port
m
D. Dynamic IP
du
E. Static IP and Port (SIPP) am
Answer: ABE
Explanation:
ex
Question: 307
id
al
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 130/157
om
.c
ps
m
du
am
ex
id
al
.v
Based on the network diagram provided, which two statements apply to traffic between the User
w
C. Traffic restrictions are not possible, because the networks are in the same zone.
s:
Answer: AB
ht
Explanation:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail? id=kA10g000000ClTHCA0&lang=es
Question: 308
Which two types of profiles are needed to create an authentication sequence? (Choose two.)
A. Server profile
B. Authentication profile
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 131/157
C. Security profile
D. Interface Management profile
Answer: AB
Explanation:
In the FW you define an Auth sequence which specifies the Auth Profile. If you click add on an Auth
Profile and define one named TACACS for example, the Auth Profile calls in the TACACS+ Server
Profile.
Question: 309
om
Which setting is available to edit when a tag is created on the local firewall?
.c
A. Location
ps
B. Color
C. Order
m
D. Priority
du Answer: B
am
Explanation:
ex
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-
tags/create-tags
id
al
Question: 310
.v
What is the best-practice approach to logging traffic that traverses the firewall?
w
w
Answer: C
ht
Explanation:
The best-practice approach to logging traffic that traverses the firewall is to enable log at session end
only. This option allows the firewall to generate a log entry only when a session ends, which reduces
the load on the firewall and the log storage. The log entry contains information such as the source
and destination IP addresses, ports, zones, application, user, bytes, packets, and duration of the
session. The log at session end option also provides more accurate information about the session,
such as the final application and user, the total bytes and packets, and the session end reason1. To
enable log at session end only, you need to:
Create or modify a Security policy rule that matches the traffic that you want to log.
Select the Actions tab in the policy rule and check the Log at Session End option.
Commit the changes to the firewall or Panorama and the managed firewalls.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 132/157
Reference: View and Manage Logs, Log at Session End, Certifications - Palo Alto Networks, [Palo Alto
Networks Certified Network Security Administrator (PAN-OS 10.0)] or [Palo Alto Networks Certified
Network Security Administrator (PAN-OS 10.0)].
Question: 311
A. Shared
B. Templates
C. Device Groups
om
D. Panorama tab
Answer: B
.c
Explanation:
ps
https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-firewalls/use-case-
m
configure-firewalls-using-panorama/set-up-your-centralized-configuration-and-policies/use-
du
templates-to-administer-a-base-configuration
am
Question: 312
ex
Based on the image provided, which two statements apply to the Security policy rules? (Choose
two.)
id
al
.v
w
w
// w
s:
Answer: AC
Explanation:
Question: 313
How would a Security policy need to be written to allow outbound traffic using Secure Shell (SSH) to
destination ports tcp/22 and tcp/4422?
A. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 133/157
The admin then creates a Security policy allowing application "ssh" and service "tcp-4422".
B. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service
"application-default".
C. The admin creates a Security policy allowing application "ssh" and service "application-default".
D. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin also creates a custom service object named "tcp-22" with port tcp/22.
The admin then creates a Security policy allowing application "ssh", service "tcp-4422". and service
"tcp-22".
Answer: D
om
Explanation:
Question: 314
.c
ps
Which feature must be configured to enable a data plane interface to submit DNS queries originated
from the firewall on behalf of the control plane?
m
du
A. Service route
B. Admin role profile
am
C. DNS proxy
D. Virtual router
ex
Answer: A
id
Explanation:
al
By default, the firewall uses the management (MGT) interface to access external services, such as
.v
DNS servers, external authentication servers, Palo Alto Netw orks services such as soft ware, URL
w
updates, licenses, and AutoFocus. An alternative to using the MGT interface is configuring a data port
w
(a standard interface) to access these services. The path from the interface to th e service on a server
is aservice route. [Palo Alto Networks]
// w
PAN-OS 10 -> Device -> Setup -> Services -> Service Features -> Service Route Configuration
s:
tp
Question: 315
ht
An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ
zones. The administrator does not change the rule type from its default value.
What type of Security policy rule is created?
A. Tagged
B. Intrazone
C. Universal
D. Interzone
Answer: C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 134/157
Question: 316
When HTTPS for management and GlobalProtect are enabled on the same data plane interface,
which TCP port is used for management access?
A. 80
B. 443
C. 4443
D. 8443
om
Answer: C
Explanation:
.c
The GlobalProtect Portal can be accessed by going to the IP address of the designated interface using
ps
https on port 443. The WebUI on the same interface can be accessed by going to the interface's IP
address using https on port 4443. The port for WebUI management is changed because the tcp/443
m
socket used by GlobalProtect takes precedence
Question: 317 du
am
An administrator manages a network with 300 addresses that require translation. The administrator
ex
configured NAT with an address pool of 240 addresses and found that connections from addresses
that needed new translations were being dropped.
id
A. Static IP
.v
B. Dynamic IP
w
C. Destination NAT
w
Answer: B
//
Explanation:
s:
tp
The size of the NAT pool should be equal to the number of internal hosts that require address
ht
translations. By default, if the source address pool is larger than the NAT address pool and eventually
all of the NAT addresses are allocated, new connections that need address translation are dropped.
To override this default behavior, use Advanced (Dynamic IP/Port Fallback) to enable the use of DIPP
addresses when necessary
Question: 318
What are the two main reasons a custom application is created? (Choose two.)
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 135/157
Answer: AD
Explanation:
https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/app-id/use-application-objects-in-
policy/create-a-custom-application
Question: 319
What Policy Optimizer policy view differ from the Security policy do?
om
A. It shows rules that are missing Security profile configurations.
.c
B. It indicates rules with App-ID that are not configured as port-based.
C. It shows rules with the same Source Zones and Destination Zones.
ps
D. It indicates that a broader rule matching the criteria is configured above a more specific rule.
m
Answer: B
du
Explanation:
am
Policy Optimizer policy view differs from the Security policy view in several ways. One of them is that
it indicates rules with App-ID that are not configured as port-based. These are rules that have the
ex
application set to “any” instead of a specific application or group of applications. These rules are
overly permissive and can introduce security gaps, as they allow any application traffic on the
id
specified ports. Policy Optimizer helps you convert these rules to application-based rules that follow
al
the principle of least privilege access12. You can use Policy Optimizer to discover and convert port-
based rules to application-based rules, and also to remove unused applications, eliminate unused
.v
rules, and discover new applications that match your policy criteria3. Reference:
w
Question: 320
s:
tp
How does the Policy Optimizer policy view differ from the Security policy view?
ht
Answer: A
Explanation:
You can’t filter or sort rules in PoliciesSecurity because that would change the order of the policy
rules in the rulebase. Filtering and sorting PoliciesSecurityPolicy OptimizerNo App Specified,
PoliciesSecurityPolicy OptimizerUnused Apps, and PoliciesSecurityPolicy OptimizerNew App Viewer
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 136/157
(if you have a SaaS Inline Security subscription) does not change the order of the rules in the
rulebase. https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/app-id/security-policy-
rule-optimization/policy-optimizer-concepts/sorting-and-filtering-security-policy-rules
Question: 321
Which System log severity level would be displayed as a result of a user password change?
A. High
B. Critical
C. Medium
om
D. Low
Answer: D
.c
Explanation:
ps
System logs display entries for each system event on the firewall.
m
1. Critical - Hardware failures, including high availability (HA) failover and link failures.
du
2. High - Serious issues, including dropped connections with external devices, such as LDAP and
RADIUS servers.
am
3. Medium - Mid-level notifications, such as antivirus package upgrades.
4. Low - Minor severity notifications, such as user password changes.
ex
5. Informational - Log in/log off, administrator name or password change, any configuration change,
and all other events not covered by the other severity levels.
id
https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/view-and-manage-
al
logs/log-types-and-severity-levels/system-logs#id8edbfdae-ed92-4d8e-ab76-6a38f96e8cb1
.v
w
Question: 322
w
C. A file that has been analyzed is potentially dangerous for the system.
D. A new asset has been discovered on the network.
ht
Answer: B
Explanation:
Question: 323
Where within the URL Filtering security profile must a user configure the action to prevent credential
submissions?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 137/157
Answer: B
Explanation:
URL filtering technology protects users from web-based threats by providing granular control over
user access and interaction with content on the Internet. You can develop a URL filtering policy that
limits access to sites based on URL categories, users, and groups. For example, you can block access
to sites known to host malware and prevent end users from entering corporate credentials to sites in
certain categories.
om
Question: 324
.c
Which two features implement one-to-one translation of a source IP address while allowing the
ps
source port to change? (Choose two.)
m
A. Static IP
du
B. Dynamic IP / Port Fallback
C. Dynamic IP
am
D. Dynamic IP and Port (DIPP)
ex
Answer: AD
Explanation:
id
al
Static IP and Dynamic IP and Port (DIPP) are two features that implement one-to-one translation of a
source IP address while allowing the source port to change. Static IP translates a single source
.v
address to a specific public address, and allows the source port to change dynamically1. Dynamic IP
w
and Port (DIPP) translates the source IP address or range to a single IP address, and uses the source
w
port to differentiate between multiple source IPs that share the same translated address2. Both of
these features provide a one-to-one translation of IP addresses, but do not restrict the source
w
port. Reference:
//
Question: 325
ht
A network administrator creates an intrazone security policy rule on a NGFW. The source zones are
set to IT. Finance, and HR.
To which two types of traffic will the rule apply? (Choose two.)
A. Within zone HR
B. Within zone IT
C. Between zone IT and zone HR
D. Between zone IT and zone Finance
Answer: AB
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 138/157
Explanation:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTHCA0
Question: 326
An organization has some applications that are restricted for access by the Human Resources
Department only, and other applications that are available for any known user in the organization.
What object is best suited for this configuration?
A. Application Group
om
B. Tag
C. External Dynamic List
D. Application Filter
.c
ps
Answer: A
Explanation:
m
du
Question: 327
am
Which order of steps is the correct way to create a static route?
ex
A.
1) Enter the route and netmask
id
3) Specify the outgoing interface for packets to use to go to the next hop
4) Add an IPv4 or IPv6 route by name
.v
B.
w
2) Specify the outgoing interface for packets to use to go to the next hop
3) Enter the IP address for the specific next hop
w
C.
s:
4) Specify the outgoing interface for packets to use to go to the next hop
D.
1) Enter the IP address for the specific next hop
2) Add an IPv4 or IPv6 route by name
3) Enter the route and netmask
4) Specify the outgoing interface for packets to use to go to the next hop
Answer: A
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 139/157
Question: 328
om
Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose
two.)
.c
ps
A. Obtain a Threat Prevention subscription.
B. Enable Dynamic Updates.
m
C. Move within the WildFire public cloud region.
du
D. Obtain a WildFire subscription. am
Answer: BD
Explanation:
ex
https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-
id
100/wildfire-real-time-signature-updates
al
Question: 329
.v
w
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using
w
Panorama?
w
A. Panorama > Device Deployment > Dynamic Updates > Schedules > Add
//
B. Panorama > Device Deployment > Content Updates > Schedules > Add
s:
C. Panorama > Dynamic Updates > Device Deployment > Schedules > Add
tp
D. Panorama > Content Updates > Device Deployment > Schedules > Add
ht
Answer: A
Explanation:
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/upgrade-panorama/deploy-
updates-to-firewalls-log-collectors-and-wildfire-appliances-using-panorama/schedule-a-content-
update-using-panorama
Question: 330
Which Security policy action will message a user's browser that their web session has been
terminated?
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 140/157
A. Drop
B. Deny
C. Reset client
D. Reset server
Answer: C
Explanation:
Sending a reset only to the client would ensure, for example, internal hosts receive a notification the
session was reset and the browser is not left spinning or the application can close the established
om
session while the remote server is left unaware.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClltCAC
.c
Question: 331
ps
Which two addresses should be reserved to enable DNS sinkholing? (Choose two.)
m
du
A. IPv6
B. Email
am
C. IPv4
D. MAC
ex
Answer: AC
id
Explanation:
al
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0
.v
w
Question: 332
w
w
Which feature enables an administrator to review the Security policy rule base for unused rules?
//
s:
B. Policy Optimizer
Answer: B
Explanation:
Policy Optimizer provides a simple workflow to migrate your legacy Security policy rulebase to an
App-ID based rulebase, which improves your security by reducing the attack surface and gaining
visibility into applications so you can safely enable them. Policy Optimizer can also identify unused
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 141/157
rules, duplicate rules, and rules that can be merged or reordered to optimize your rulebase. You can
use Policy Optimizer to review the usage statistics of your rules and take actions to clean up or
modify your rulebase as needed1. Reference: Security Policy Rule Optimization, Updated
Certifications for PAN-OS 10.1, Free PCNSE Questions for Palo Alto Networks PCNSE Exam
Question: 333
A systems administrator momentarily loses track of which is the test environment firewall and which
is the production firewall. The administrator makes changes to the candidate configuration of the
production firewall, but does not commit the changes. In addition, the configuration was not saved
om
prior to
making the changes.
.c
Which action will allow the administrator to undo the changes?
ps
A. Load configuration version, and choose the first item on the list.
m
du
B. Load named configuration snapshot, and choose the first item on the list.
am
C. Revert to last saved configuration.
Answer: D
Explanation:
al
.v
Reverting to the running configuration will undo the changes made to the candidate configuration
w
since the last commit. This operation will replace the settings in the current candidate configuration
with the settings from the running configuration. The firewall provides the option to revert all the
w
Question: 334
ht
A. Policy Optimizer
B. App-ID
C. Security profile
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 142/157
D. Policy-based forwarding
Answer: A
Explanation:
Question: 335
What is a default setting for NAT Translated Packets when the destination NAT translation is selected
as Dynamic IP (with session distribution)?
om
A. IP Hash
.c
B. Source IP Hash
ps
C. Round Robin
m
D. Least Sessions
du Answer: C
am
Explanation:
ex
When the destination NAT translation is selected as Dynamic IP (with session distribution), the
firewall uses a round-robin algorithm to distribute sessions among the available IP addresses that are
id
resolved from the FQDN. This option allows you to load-balance traffic to multiple servers that have
al
dynamic IP addresses1. Reference: Destination NAT, NAT, Getting Started: Network Address
Translation (NAT).
.v
w
Question: 336
w
w
Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on
//
Panorama?
s:
tp
Answer: A
Explanation:
The NAT Target tab is a table that allows you to specify the target firewalls or device groups for each
NAT policy rule on Panorama. This tab is available only on Panorama and not on individual firewalls.
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 143/157
The NAT Target tab enables you to create a single NAT policy rulebase on Panorama and then
selectively push the rules to the firewalls or device groups that require them. This reduces the
complexity and duplication of managing NAT policies across multiple firewalls1. Reference: NAT
Target Tab, NAT Policy Overview, NPTv6 Overview, Updated Certifications for PAN-OS 10.1.
Question: 337
Which three Ethernet interface types are configurable on the Palo Alto Networks firewall? (Choose
three.)
om
A. Virtual Wire
B. Tap
.c
ps
C. Dynamic
m
D. Layer 3
du
E. Static
am
Answer: ABD
ex
Explanation:
id
Palo Alto Networks firewalls support three types of Ethernet interfaces that can be configured on the
firewall: virtual wire, tap, and layer 31. These interface types determine how the firewall processes
al
traffic and applies security policies. Some of the characteristics of these interface types are:
.v
Virtual Wire: A virtual wire interface allows the firewall to transparently pass traffic between two
w
network segments without modifying the packets or affecting the routing. The firewall can still apply
security policies and inspect the traffic based on the source and destination zones of the virtual
w
wire2.
w
Tap: A tap interface allows the firewall to passively monitor traffic from a network switch or router
//
without affecting the traffic flow. The firewall can only receive traffic from a tap interface and cannot
s:
send traffic out of it. The firewall can apply security policies and inspect the traffic based on the
source and destination zones of the tap interface3.
tp
Layer 3: A layer 3 interface allows the firewall to act as a router and participate in the network
ht
routing. The firewall can send and receive traffic from a layer 3 interface and apply security policies
and inspect the traffic based on the source and destination IP addresses and zones of the interface4.
Reference: Ethernet Interface Types, Virtual Wire Interfaces, Tap Interfaces, Layer 3
Interfaces, Updated Certifications for PAN-OS 10.1, [Palo Alto Networks Certified Network Security
Administrator (PAN-OS 10.0)] or [Palo Alto Networks Certified Network Security Administrator (PAN-
OS 10.0)].
Question: 338
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 144/157
Answer: D
om
Explanation:
.c
When grouping rules by group tags, the action that can be performed is to tag selected rule(s). This
ps
action allows you to assign one or more tags to the selected rules, which will group them together
and display them under the corresponding tag group. You can use tags to organize and visually
m
distinguish your rules based on different criteria, such as function, location, or
du
priority1. Reference: View Rules by Tag Group, Use Tags to Group and Visually Distinguish
Objects, Certifications - Palo Alto Networks, Palo Alto Networks Certified Network Security
am
Administrator (PAN-OS 10.0) or [Palo Alto Networks Certified Network Security Administrator (PAN-
OS 10.0)].
ex
Question: 339
id
al
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security
.v
policy?
w
Answer: C
Explanation:
To see how new and modified App-IDs impact your Security policy, you need to follow the path
Device > Dynamic Updates > Review App-IDs on PAN-OS 11.x. This option allows you to perform a
content update policy review for both downloaded and installed content. You can view the list of
new and modified App-IDs and their descriptions, and see which Security policy rules are affected by
them. You can also modify the rules or create new ones to adjust your Security policy as
needed1. Reference: See How New and Modified App-IDs Impact Your Security Policy, Updated
Certifications for PAN-OS 10.1, Palo Alto Networks Certified Network Security Administrator (PAN-OS
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 145/157
10.0) or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].
Question: 340
Which object should the administrator create to use as a match condition for the security policy rule
that allows access to www.paloaltonetworks.com?
om
A. Application group
B. Address ab
.c
ps
C. URL category
m
D. Service
du Answer: C
am
Explanation:
ex
A URL category object is the object that the administrator should create to use as a match condition
for the security policy rule that allows access to www.paloaltonetworks.com while denying access to
id
all other sites in the same category. A URL category object allows the administrator to define a
custom list of URLs that belong to a specific category, such as Business and Economy. The
al
administrator can then use this object in a security policy rule to allow or deny access to the URLs
.v
based on the category1. For example, the administrator can create a URL category object that
w
contains www.paloaltonetworks.com and assign it to the Business and Economy category. Then, the
administrator can create a security policy rule that allows access to this URL category object and
w
denies access to the predefined Business and Economy category2. Reference: Create a Custom URL
w
Category, Create a Security Policy Rule to Allow or Deny Access to a Custom URL
//
Category, Certifications - Palo Alto Networks, Palo Alto Networks Certified Network Security
s:
Administrator (PAN-OS 10.0) or [Palo Alto Networks Certified Network Security Administrator (PAN-
OS 10.0)].
tp
ht
Question: 341
A. Actions
B. Source Zone
C. Application
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 146/157
D. Destination Zone
Answer: D
Explanation:
When a security rule is configured as Intrazone, the destination zone field cannot be changed. This is
because an intrazone rule applies to traffic that originates and terminates in the same zone. The
destination zone is automatically set to the same value as the source zone and cannot be
modified1. An intrazone rule allows you to control and inspect traffic within a zone, such as applying
om
security profiles or logging options2. Reference: What are Universal, Intrazone and Interzone
Rules?, Security Policy, Updated Certifications for PAN-OS 10.1, Palo Alto Networks Certified Network
Security Administrator (PAN-OS 10.0) or [Palo Alto Networks Certified Network Security
.c
Administrator (PAN-OS 10.0)].
ps
Question: 342
m
du
In which two Security Profiles can an action equal to the block IP feature be configured? (Choose
am
two.)
ex
A. URL Filtering
id
B. Vulnerability Protection
al
C. Antivirus b
.v
w
D. Anti-spyware
w
Answer: BD
w
Explanation:
//
s:
The block IP feature can be configured in two Security Profiles: Vulnerability Protection and Anti-
tp
spyware. The block IP feature allows the firewall to block traffic from a source IP address for a
specified period of time after detecting a threat. This feature can help prevent further attacks from
ht
the same source and reduce the load on the firewall1. The block IP feature can be enabled in the
following Security Profiles:
Vulnerability Protection: A Vulnerability Protection profile defines the actions that the firewall takes
to protect against exploits and vulnerabilities in applications and protocols. You can configure a rule
in the Vulnerability Protection profile to block IP connections for a specific threat or a group of
threats2.
Anti-spyware: An Anti-spyware profile defines the actions that the firewall takes to protect against
spyware and command-and-control (C2) traffic. You can configure a rule in the Anti-spyware profile
to block IP addresses for a specific spyware or C2 signature.
Reference: Monitor Blocked IP Addresses, Block IP Addresses, Vulnerability Protection Profile, [Anti-
Spyware Profile], Certifications - Palo Alto Networks, [Palo Alto Networks Certified Network Security
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 147/157
Administrator (PAN-OS 10.0)] or [Palo Alto Networks Certified Network Security Administrator (PAN-
OS 10.0)].
Question: 343
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
A. Network ab
B. Policies
om
C. Objects
.c
D. Device
ps
Answer: C
m
Explanation:
du
URL Filtering profiles are configured in the Objects section of the PAN-OS GUI. A URL Filtering profile
am
defines the actions that the firewall takes for different URL categories, such as allow, block, alert,
continue, or override. You can also configure settings for credential phishing prevention, URL filtering
ex
inline machine learning, and safe search enforcement in a URL Filtering profile1. To create or modify
a URL Filtering profile, you need to go to Objects > Security Profiles > URL Filtering2. Reference: URL
id
Filtering Profile, Create a URL Filtering Profile, Updated Certifications for PAN-OS 10.1, Palo Alto
Networks Certified Network Security Administrator (PAN-OS 10.0) or [Palo Alto Networks Certified
al
Question: 344
w
w
What are three valid source or D=destination conditions available as Security policy qualifiers?
//
(Choose three.)
s:
tp
A. Service
ht
B. User
C. Application
D. Address
E. Zone ab
Answer: BCE
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 148/157
Explanation:
Three valid source or destination conditions available as Security policy qualifiers are User,
Application, and Zone. These qualifiers allow you to define the match criteria for a Security policy
rule based on the identity of the user, the application used, and the zone where the traffic originates
or terminates. You can use these qualifiers to enforce granular security policies that control access to
network resources and prevent threats1. Some of the characteristics of these qualifiers are:
User: The User qualifier allows you to specify the source or destination user or user group for a
Security policy rule. The firewall can identify users based on various methods, such as User-ID,
Captive Portal, or GlobalProtect. You can use the User qualifier to apply different security policies for
different users or user groups, such as allowing access to certain applications or resources based on
user roles or privileges2.
om
Application: The Application qualifier allows you to specify the application or application group for a
Security policy rule. The firewall can identify applications based on App-ID, which is a technology that
.c
classifies applications based on multiple attributes, such as signatures, protocol decoders, heuristics,
ps
and SSL decryption. You can use the Application qualifier to allow or deny access to specific
applications or application groups, such as enabling web browsing but blocking social networking or
m
file sharing3.
Zone: The Zone qualifier allows you to specify the source or destination zone for a Security policy
du
rule. A zone is a logical grouping of one or more interfaces that have similar functions or security
requirements. The firewall can apply security policies based on the zones where the traffic originates
am
or terminates, such as intrazone, interzone, or universal. You can use the Zone qualifier to segment
your network and isolate traffic based on different trust levels or network functions4.
ex
Reference: Security Policy, Zones, User-ID, App-ID, Certifications - Palo Alto Networks, [Palo Alto
Networks Certified Network Security Administrator (PAN-OS 10.0)] or [Palo Alto Networks Certified
id
Question: 345
.v
w
w
In which three places on the PAN-OS interface can the application characteristics be found? (Choose
w
three.)
//
Answer: ADE
Explanation:
The application characteristics can be found in three places on the PAN-OS interface: Objects tab >
Application Filters, Objects tab > Application Groups, and Objects tab > Applications. These places
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 149/157
allow you to view and manage the applications and application groups that are used in your Security
policy rules. You can also create custom applications and application filters based on various
attributes, such as category, subcategory, technology, risk, and behavior1. Some of the
characteristics of these places are:
Objects tab > Application Filters: An application filter is a dynamic object that groups applications
based on specific criteria. You can use an application filter to match multiple applications in a
Security policy rule without having to list them individually. For example, you can create an
application filter that includes all applications that have a high risk level or use peer-to-peer
technology.
Objects tab > Application Groups: An application group is a static object that groups applications
based on your custom requirements. You can use an application group to match multiple applications
in a Security policy rule without having to list them individually. For example, you can create an
om
application group that includes all applications that are related to a specific business function or
project.
.c
Objects tab > Applications: An application is an object that identifies and classifies network traffic
ps
based on App-ID, which is a technology that uses multiple attributes to identify applications. You can
use an application to match a specific application in a Security policy rule and control its access and
m
behavior. For example, you can use an application to allow web browsing but block file sharing or
social networking.
du
Reference: Objects, [Application Filters], [Application Groups], [Applications], Updated Certifications
for PAN-OS 10.1, Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) or [Palo
am
Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].
ex
Question: 346
id
al
An administrator wants to reference the same address object in Security policies on 100 Panorama
.v
Which configuration action should the administrator take when creating the address object?
w
w
Answer: A
Explanation:
To reference the same address object in Security policies on 100 Panorama-managed firewalls, across
10 device groups and five templates, the administrator should ensure that the Shared option is
checked when creating the address object. This option allows the administrator to create a shared
address object that is available to all device groups and templates on Panorama. The shared address
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 150/157
object can then be used in multiple firewall policy rules, filters, and other functions1. This reduces
the complexity and duplication of managing address objects across multiple
firewalls2. Reference: Address Objects, Create a Shared Address Object, Certifications - Palo Alto
Networks, Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) or [Palo Alto
Networks Certified Network Security Administrator (PAN-OS 10.0)].
Question: 347
What are three configurable interface types for a data-plane ethernet interface? (Choose three.)
om
A. Layer 3
B. HSCI
.c
C. VWire
ps
D. Layer 2
m
du
E. Management am
Answer: ACD
Explanation:
ex
Three configurable interface types for a data-plane ethernet interface are Layer 3, VWire, and Layer
id
2. These interface types determine how the firewall processes traffic and applies security policies.
Some of the characteristics of these interface types are:
al
Layer 3: A layer 3 interface allows the firewall to act as a router and participate in the network
.v
routing. The firewall can send and receive traffic from a layer 3 interface and apply security policies
w
and inspect the traffic based on the source and destination IP addresses and zones of the interface1.
VWire: A virtual wire interface allows the firewall to transparently pass traffic between two network
w
segments without modifying the packets or affecting the routing. The firewall can still apply security
w
policies and inspect the traffic based on the source and destination zones of the virtual wire2.
//
Layer 2: A layer 2 interface allows the firewall to act as a switch and forward traffic based on MAC
s:
addresses. The firewall can send and receive traffic from a layer 2 interface and apply security
policies and inspect the traffic based on the source and destination zones of the interface3.
tp
Reference: Ethernet Interface Types, Virtual Wire Interfaces, Layer 2 Interfaces, Layer 3 Interfaces,
ht
[Certifications - Palo Alto Networks], [Palo Alto Networks Certified Network Security Administrator
(PAN-OS 10.0)] or [Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)].
Question: 348
Where does a user assign a tag group to a policy rule in the policy creation window?
A. Application tab
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 151/157
B. General tab
C. Actions tab
D. Usage tab
Answer: B
Explanation:
om
A user can assign a tag group to a policy rule in the policy creation window by selecting the General
tab. A tag group is a collection of tags that can be used to identify and filter policy rules based on
.c
different criteria, such as function, location, or priority. A user can create a tag group on Panorama
ps
and assign it to a policy rule to apply the same set of tags to multiple firewalls or device groups1. To
assign a tag group to a policy rule, the user needs to:
m
Select the General tab in the policy creation window.
du
Click the Tag Group drop-down menu and select the tag group that the user wants to assign to the
policy rule.
am
Click OK to save the changes. The policy rule will inherit the tags from the tag group and display them
in the Tag column.
Reference: Assign a Tag Group to a Policy Rule, Policy, Certifications - Palo Alto Networks, Palo Alto
ex
Networks Certified Network Security Administrator (PAN-OS 10.0) or [Palo Alto Networks Certified
id
Question: 349
.v
w
Which policy set should be used to ensure that a policy is applied just before the default security
w
rules?
// w
D. Shared post-rulebase
Answer: D
Explanation:
The policy set that should be used to ensure that a policy is applied just before the default security
rules is the shared post-rulebase. The shared post-rulebase is a set of Security policy rules that are
defined on Panorama and apply to all firewalls or device groups. The shared post-rulebase is
evaluated after the local firewall policy and the child device-group post-rulebase, but before the
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 152/157
default security rules. The shared post-rulebase can be used to enforce common security policies
across multiple firewalls or device groups, such as blocking high-risk applications or
traffic1. Reference: Security Policy Rule Hierarchy, Security Policy Rulebase, Certifications - Palo Alto
Networks, Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) or [Palo Alto
Networks Certified Network Security Administrator (PAN-OS 10.0)].
Question: 350
om
In which two types of NAT can oversubscription be used? (Choose two.)
A. Static IP
.c
B. Destination NAT
ps
C. Dynamic IP and Port (DIPP)
D. Dynamic IP
m
du
Answer: CD
Explanation:
am
Oversubscription is a feature that allows you to use more private IP addresses than public IP
ex
addresses for NAT. This means that multiple private IP addresses can share the same public IP
address, as long as they use different ports. Oversubscription can be used in two types of NAT:
id
Dynamic IP and Port (DIPP) and Dynamic IP. DIPP NAT translates both the source IP address and the
source port number of the outgoing packets, and can have an oversubscription rate greater than 1.
al
Dynamic IP NAT translates only the source IP address of the outgoing packets, and can have an
.v
oversubscription rate of 1 or less. Static IP and Destination NAT do not support oversubscription, as
w
they require a one-to-one mapping between the private and public IP addresses. Reference: Source
NAT, Configure NAT, NAT
w
w
Question: 351
//
s:
tp
Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
ht
Answer: B
Explanation:
The Policy Optimizer is a feature in the PAN-OS GUI that allows an administrator to monitor the rule
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 153/157
usage for a specified period of time, as well as optimize the security policies based on the traffic logs
and recommendations. The Policy Optimizer can help the administrator to improve the security
posture, reduce the attack surface, and simplify the policy management. The Policy Optimizer can be
accessed from Policies > Policy Optimizer in the PAN-OS GUI. Reference: Policy Optimizer, View Policy
Rule Usage, Updated Certifications for PAN-OS 10.1
Question: 352
om
A. URL Filtering
B. Antivirus
.c
ps
C. Web Content
m
D. Vulnerability Protection
du Answer: A
am
Explanation:
ex
URL Filtering is a security profile that allows you to classify web content based on the URL category
and reputation of the website. URL Filtering can help you block access to malicious web content,
id
such as phishing, malware, or command and control sites, as well as enforce acceptable use policies
for web browsing. URL Filtering uses the PAN-DB cloud service to provide up-to-date information on
al
the URL categories and reputations of millions of websites. You can configure URL Filtering policies to
.v
allow, block, alert, continue, or override web requests based on the URL category and reputation, as
w
well as customize the response pages and exceptions for different user groups. Reference: URL
Filtering, Set Up a Basic Security Policy, Updated Certifications for PAN-OS 10.1
w
// w
s:
Question: 353
tp
ht
In order to attach an Antivirus, Anti-Spyware and Vulnerability Protection security profile to your
Security Policy rules, which setting must be selected?
A. Policies > Security > Actions Tab > Select Group-Profiles as Profile Type
B. Policies > Security > Actions Tab > Select Default-Profiles as Profile Type
C. Policies > Security > Actions Tab > Select Profiles as Profile Type
D. Policies > Security > Actions Tab > Select Tagged-Profiles as Profile Type
Answer: C
Explanation:
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 154/157
To enable the firewall to scan the traffic that it allows based on a Security policy rule, you must also
attach Security Profiles —including URL Filtering, Antivirus, Anti-Spyware, File Blocking, and WildFire
Analysis—to each rule. To attach a Security Profile to a Security policy rule, you must select Profiles
as the Profile Type in the Actions tab of the rule. This allows you to choose from the predefined or
custom Security Profiles that you have configured. Group-Profiles, Default-Profiles, and Tagged-
Profiles are not valid options for attaching Security Profiles to Security policy rules. Reference: Set Up
a Basic Security Policy, Security Profiles, Updated Certifications for PAN-OS 10.1
Question: 354
om
Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for
analysis?
.c
A. Application Category
ps
B. Source
C. File Size
m
D. Direction
du Answer: D
am
Explanation:
ex
A WildFire Analysis Profile allows you to specify which files or email links to forward for WildFire
analysis based on the application, file type, and transmission direction (upload or download) of the
id
traffic. The direction match criteria determines whether the file or email link was sent from the
source zone to the destination zone (upload) or from the destination zone to the source zone
al
(download). You can also select both directions to forward files or email links regardless of the
.v
direction of the traffic. Reference: Security Profile: Wildfire Analysis, Objects > Security Profiles >
w
WildFire Analysis
w
Question: 355
// w
s:
What must first be created on the firewall for SAML authentication to be configured?
tp
A. Server Policy
ht
B. Server Profile
C. Server Location
D. Server Group
Answer: B
Explanation:
A server profile identifies the external authentication service and instructs the firewall on how to
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 155/157
connect to that authentication service and access the authentication credentials for your users. To
configure SAML authentication, you must create a server profile and register the firewall and the
identity provider (IdP) with each other. You can import a SAML metadata file from the IdP to
automatically create a server profile and populate the connection, registration, and IdP certificate
information. Reference: Configure SAML Authentication, Set Up SAML Authentication, Introduction
to SAML
Question: 356
Which two options does the firewall use to dynamically populate address group members? (Choose
om
two.)
A. IP Addresses
.c
ps
B. Tags
m
C. MAC Addresses
du
D. Tag-based filters
am
Answer: BD
ex
Explanation:
id
A dynamic address group populates its members dynamically using look ups for tags and tag-based
filters. Tags are metadata elements or attribute-value pairs that are registered for each IP address.
al
Tag-based filters use logical and and or operators to match the tags and determine the membership
.v
of the dynamic address group. For example, you can create a dynamic address group that includes all
w
IP addresses that have the tags “web-server” and “linux”. You can also use static tags as part of the
filter criteria. Reference: Policy Object: Address Groups, Use Dynamic Address Groups in
w
Question: 357
s:
tp
What two actions can be taken when implementing an exception to an External Dynamic List?
ht
(Choose two.)
Answer: AB
Explanation:
Question: 358
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 156/157
Which feature enables an administrator to review the Security policy rule base for unused rules?
Answer: D
Explanation:
om
The Policy Optimizer feature enables an administrator to review the Security policy rule base for
unused rules, unused applications, and shadowed rules. The Policy Optimizer provides information
.c
and recommendations to help optimize the Security policy rules and reduce the attack surface. The
ps
Policy Optimizer can also identify rules that can be converted to use App-ID instead of port-based
criteria12. Reference: Policy Optimizer, Tips & Tricks: How to Identify Unused Policies on a Palo Alto
m
Networks Device
Question: 359
du
am
An administrator should filter NGFW traffic logs by which attribute column to determine if the entry
ex
A. Receive Time
B. Type
al
C. Destination
.v
D. Source
w
Answer: B
w
Explanation:
// w
The Type attribute column in the NGFW traffic logs indicates whether the log entry is for the start or
s:
end of the session. The possible values are START, END, DROP, DENY, and INVALID. The START value
tp
means that the log entry is for the start of the session, and the END value means that the log entry is
for the end of the session. The other values indicate that the session was terminated by the firewall
ht
for various reasons12. Reference: Traffic Log Fields, Session Log Best Practices
https://www.validexamdumps.com/PCNSA.html
Questions and Answers PDF 157/157
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
https://www.validexamdumps.com/PCNSA.html