Jessybrown
On this page, you find all documents, package deals, and flashcards offered by seller jessybrown.
- 2350
- 0
- 36
Community
- Followers
- Following
2386 items
PCNSA Domain 1 Questions
The Palo Alto Networks Security Operating Platform is designed for which three purposes? (Choose 
three.) 
A. consume innovations quickly 
B. ensure compliance 
C. focus on what matters 
D. prevent successful cyberattacks - A. consume innovations quickly 
C. focus on what matters 
D. prevent successful cyberattacks 
Which item is not one of the six primary components of the Palo Alto Networks Security Operating 
Platform 
A. Applications (Palo Alto Networks apps, third-party apps, customer apps)...
- Exam (elaborations)
- • 7 pages •
The Palo Alto Networks Security Operating Platform is designed for which three purposes? (Choose 
three.) 
A. consume innovations quickly 
B. ensure compliance 
C. focus on what matters 
D. prevent successful cyberattacks - A. consume innovations quickly 
C. focus on what matters 
D. prevent successful cyberattacks 
Which item is not one of the six primary components of the Palo Alto Networks Security Operating 
Platform 
A. Applications (Palo Alto Networks apps, third-party apps, customer apps)...
PCNSA Domain 3 Q/A
What will be the result of one or more occurrences of shadowing? - A warning 
Which column in the Applications and Threats screen includes the options Review Apps and Review 
Policies? - Action 
Which link can you select in the web interface to minimize the risk of installing new App-ID updates? - 
Disable new apps in content update. 
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose 
two.) - Web-browsing 
SSL 
What are the two default (predefined...
- Exam (elaborations)
- • 2 pages •
What will be the result of one or more occurrences of shadowing? - A warning 
Which column in the Applications and Threats screen includes the options Review Apps and Review 
Policies? - Action 
Which link can you select in the web interface to minimize the risk of installing new App-ID updates? - 
Disable new apps in content update. 
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose 
two.) - Web-browsing 
SSL 
What are the two default (predefined...
PCNSA Domain 3 Q/A
What will be the result of one or more occurrences of shadowing? - A warning 
Which column in the Applications and Threats screen includes the options Review Apps and Review 
Policies? - Action 
Which link can you select in the web interface to minimize the risk of installing new App-ID updates? - 
Disable new apps in content update. 
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose 
two.) - Web-browsing 
SSL 
What are the two default (predefined...
- Exam (elaborations)
- • 2 pages •
What will be the result of one or more occurrences of shadowing? - A warning 
Which column in the Applications and Threats screen includes the options Review Apps and Review 
Policies? - Action 
Which link can you select in the web interface to minimize the risk of installing new App-ID updates? - 
Disable new apps in content update. 
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose 
two.) - Web-browsing 
SSL 
What are the two default (predefined...
PCNSA Exam
Recently changes were made to the firewall to optimize the policies and the security team wants to see 
if those changes are helping. What is the quickest way to reset the hit counter to zero in all the security 
policy rules? 
A. At the CLI enter the command reset rules and press Enter 
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule 
C. Reboot the firewall 
D. Use the Reset Rule Hit Counter>All Rules option - D. Use the Reset Rule Hit Counter > Al...
- Exam (elaborations)
- • 18 pages •
Recently changes were made to the firewall to optimize the policies and the security team wants to see 
if those changes are helping. What is the quickest way to reset the hit counter to zero in all the security 
policy rules? 
A. At the CLI enter the command reset rules and press Enter 
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule 
C. Reboot the firewall 
D. Use the Reset Rule Hit Counter>All Rules option - D. Use the Reset Rule Hit Counter > Al...
PCNSA EXAMS 100% PASSED
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
- Exam (elaborations)
- • 13 pages •
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
PCNSA EXAMS ALREADY PASSED
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values
- Exam (elaborations)
- • 13 pages •
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values
Pcnsa EXAMS GRADED A+
VM-Series firewalls starting with PAN-OS version 8.0, the MGT port is configured with? - IP address 
DHCP 
What configuration is the actual configuration which controls the firewall operation? 
Service 
XML 
Candidate 
Running - Running 
A network engineer clicks "Save candidate configuration" to save the configuration to memory to finish 
the configuration later. 
After the engineer continues editing and click "Save candidate configuration" again, the 
configuration that is saved in memory ...
- Exam (elaborations)
- • 38 pages •
VM-Series firewalls starting with PAN-OS version 8.0, the MGT port is configured with? - IP address 
DHCP 
What configuration is the actual configuration which controls the firewall operation? 
Service 
XML 
Candidate 
Running - Running 
A network engineer clicks "Save candidate configuration" to save the configuration to memory to finish 
the configuration later. 
After the engineer continues editing and click "Save candidate configuration" again, the 
configuration that is saved in memory ...
PCNSA Flash Cards
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? 
(Choose three.) 
A. securing operations response 
B. securing the enterprise 
C. securing third-party application access 
D. securing the cloud 
E. securing the internet of things - ABD 
2. What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) 
A. Cortex DynamicDNS 
B. Wildfire 
C. Cortex XDR 
D. OpenConnect 
E. Prisma Access 
F. Autofocus - BCEF 
3. Which cloud-...
- Exam (elaborations)
- • 31 pages •
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? 
(Choose three.) 
A. securing operations response 
B. securing the enterprise 
C. securing third-party application access 
D. securing the cloud 
E. securing the internet of things - ABD 
2. What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) 
A. Cortex DynamicDNS 
B. Wildfire 
C. Cortex XDR 
D. OpenConnect 
E. Prisma Access 
F. Autofocus - BCEF 
3. Which cloud-...
PCNSA Personal
What is an "application shift?" 
1. an application change during the lifetime of a session 
2. a session change during the lifetime of an application 
3. a packet change during the lifetime of a session 
4. application dependency - an application change during the lifetime of a session 
What is the default metric value of static routes? 
+1 
1 
2 
10 
20 - 10 
How often are new antivirus signatures published? 
hourly 
weekly 
daily 
monthly - Daily 
Which interface type can be used to switch t...
- Exam (elaborations)
- • 42 pages •
What is an "application shift?" 
1. an application change during the lifetime of a session 
2. a session change during the lifetime of an application 
3. a packet change during the lifetime of a session 
4. application dependency - an application change during the lifetime of a session 
What is the default metric value of static routes? 
+1 
1 
2 
10 
20 - 10 
How often are new antivirus signatures published? 
hourly 
weekly 
daily 
monthly - Daily 
Which interface type can be used to switch t...
PCNSA QUESTIONS WITH CERTIFIED ANSWERS 100% PASSED
Palo Alto NGFWs enable you to adopt security best practices to minimize opportunities for attack by 
using the following *three* policy types... - Application, User, and Content based policies. 
T/F: 
Palo Alto NGFWs allow you to automate workflows via integration with administrative tools such as 
ticketing services, or any system with a RESTful API. - True 
What are the *three* families of Palo Alto NGFWs? - 1) VM Series 
2) Prisma Access (Cloud Firewall SaaS) 
3) Physical Firewalls 
Name at l...
- Exam (elaborations)
- • 27 pages •
Palo Alto NGFWs enable you to adopt security best practices to minimize opportunities for attack by 
using the following *three* policy types... - Application, User, and Content based policies. 
T/F: 
Palo Alto NGFWs allow you to automate workflows via integration with administrative tools such as 
ticketing services, or any system with a RESTful API. - True 
What are the *three* families of Palo Alto NGFWs? - 1) VM Series 
2) Prisma Access (Cloud Firewall SaaS) 
3) Physical Firewalls 
Name at l...