100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
PCNSA Exam Questions with Correct Answers $12.49   Add to cart

Exam (elaborations)

PCNSA Exam Questions with Correct Answers

 6 views  0 purchase
  • Course
  • Institution

PCNSA Exam Questions with Correct Answers Which two actions are available for antivirus security profiles? (Choose two.) A. continue B. allow C. block IP D. alert - Answer-B. allow D. alert Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) A. User�...

[Show more]

Preview 3 out of 23  pages

  • May 27, 2024
  • 23
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
PCNSA Exam Questions
with Correct Answers
Which two actions are available for antivirus security profiles? (Choose two.)
A. continue
B. allow
C. block IP
D. alert - Answer-B. allow
D. alert

Which two HTTP Header Logging options are within a URL filtering profile? (Choose
two.)
A. User‐Agent
B. Safe Search
C. URL redirection
D. X‐Forward‐For - Answer-A. User‐Agent
D. X‐Forward‐For

What are the two components of Denial‐of‐Service Protection? (Choose two.)
A. zone protection profile
B. DoS protection profile and policy rules
C. flood protection
D. reconnaissance protection - Answer-A. zone protection profile
B. DoS protection profile and policy rules

Which two types of attacks does the PAN‐DB prevent? (Choose two.)
A. phishing sites
B. HTTP based command‐and‐control
C. infected JavaScript
D. flood attacks - Answer-A. phishing sites
B. HTTP based command‐and‐control

Which two valid URLs can be used in a custom URL category? (Choose two.)
A. ww.youtube.**
B. www.**.com
C. www.youtube.com
D. *.youtube.com - Answer-C. www.youtube.com
D. *.youtube.com

,What are three methods of mapping usernames to IP addresses? (Choose three.)
A. Server Monitoring
B. Traps
C. Minemeld
D. syslog
E. AutoFocus
F. port mapping - Answer-A. Server Monitoring
D. syslog
F. port mapping

Which type of server profile is used to create group mappings?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP - Answer-D. LDAP

The Server Monitoring user mapping method can monitor which three types of
servers? (Choose three.)
A. RADIUS
B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers - Answer-B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers

The Port Mapping user mapping method can monitor which two types of
environments? (Choose two.)
A. Citrix
B. Microsoft terminal servers
C. Exchange Servers
D. Linux servers - Answer-A. Citrix
B. Microsoft terminal servers

The Windows User‐ID Agent can be installed on which two operating systems?
(Choose two.)
A. Linux
B. Server 2016
C. XP
D. Server 2008 - Answer-B. Server 2016
D. Server 2008

A Heatmap provides an adoption rate for which three features? (Choose three.)
A. WildFire
B. Traps
C. File Blocking

, D. User‐ID
E. SSL certificates
F. authentication profiles - Answer-A. WildFire
C. File Blocking
D. User‐ID

What are three Best Practice Assessment tool primary categories? (Choose
three.)
A. User‐ID
B. Logging
C. Vulnerability Protection
D. Security
E. Decryption
F. DoS Protection - Answer-D. Security
E. Decryption
F. DoS Protection

Which two security features normally do not achieve an adoption rate of 100%?
(Choose two.)
A. URL Filtering
B. App‐ID
C. Logging
D. DNS Sinkhole - Answer-D. DNS Sinkhole
A. URL Filtering

Which type of file is used to generate the Heatmap report and the BPA report?
A. Technical Support
B. Configuration
C. Statistics
D. XML - Answer-A. Technical Support

What are two components of the BPA tool? (Choose two.)
A. Security Policy Adoption Heatmap
B. BPA
C. XML
D. Security Policy - Answer-A. Security Policy Adoption Heatmap
B. BPA

The Palo Alto Networks Security Operating Platform is designed for which three
purposes? (Choose three.)
A. consume innovations quickly
B. ensure compliance
C. focus on what matters
D. prevent successful cyberattacks - Answer-A. consume innovations quickly
C. focus on what matters
D. prevent successful cyberattacks

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

74735 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart