Jessybrown
On this page, you find all documents, package deals, and flashcards offered by seller jessybrown.
- 2350
- 0
- 36
Community
- Followers
- Following
2386 items
PCNSA Questions 2
The control plane provides which two managment feature of the firewall? - reporting 
firewall configuration 
A virtual wire interface that receives a frame or packet ignores any Layer 2 or layer 3 addresses for 
switching or routing purposes? - True 
how often are new anti-virus signatures published? - daily 
what does palo alto networks use to regularly post updates for application detection, threat protection, 
and GlobalProtect data files? - dynamic updates 
which layer 2 interfaces used to s...
- Exam (elaborations)
- • 5 pages •
The control plane provides which two managment feature of the firewall? - reporting 
firewall configuration 
A virtual wire interface that receives a frame or packet ignores any Layer 2 or layer 3 addresses for 
switching or routing purposes? - True 
how often are new anti-virus signatures published? - daily 
what does palo alto networks use to regularly post updates for application detection, threat protection, 
and GlobalProtect data files? - dynamic updates 
which layer 2 interfaces used to s...
PCNSA Questions 2
The control plane provides which two managment feature of the firewall? - reporting 
firewall configuration 
A virtual wire interface that receives a frame or packet ignores any Layer 2 or layer 3 addresses for 
switching or routing purposes? - True 
how often are new anti-virus signatures published? - daily 
what does palo alto networks use to regularly post updates for application detection, threat protection, 
and GlobalProtect data files? - dynamic updates 
which layer 2 interfaces used to s...
- Exam (elaborations)
- • 5 pages •
The control plane provides which two managment feature of the firewall? - reporting 
firewall configuration 
A virtual wire interface that receives a frame or packet ignores any Layer 2 or layer 3 addresses for 
switching or routing purposes? - True 
how often are new anti-virus signatures published? - daily 
what does palo alto networks use to regularly post updates for application detection, threat protection, 
and GlobalProtect data files? - dynamic updates 
which layer 2 interfaces used to s...
PCNSA QUESTIONS AND ANSWER 100% PASSED
Threat Intelligence Cloud - Identifies and inspects all traffic to block known threats. 
Next Generation Firewall - Gathers, analyzes, correlates, and disseminates threats to and from 
network endpoints 
Advanced Endpoint Detection - Inspects processes and files to prevent known and unknown 
exploits 
Which firewall plane provides configuration, logging, and reporting functions on a separate processor? 
A. control 
B. network processing 
C. data 
D. security processing - A. Control 
A security a...
- Exam (elaborations)
- • 16 pages •
Threat Intelligence Cloud - Identifies and inspects all traffic to block known threats. 
Next Generation Firewall - Gathers, analyzes, correlates, and disseminates threats to and from 
network endpoints 
Advanced Endpoint Detection - Inspects processes and files to prevent known and unknown 
exploits 
Which firewall plane provides configuration, logging, and reporting functions on a separate processor? 
A. control 
B. network processing 
C. data 
D. security processing - A. Control 
A security a...
PCNSA QUESTIONS AND ANSWERS RATED A+
What are two firewall management methods? - CLI 
XML API 
Which two devices are used to connect a computer to the firewall for management purposes? - 
Serial cable 
RJ-45 Ethernet cable 
What is the default IP address assigned to the MGT interfaces of a Palo Alto Networks firewall? - 
192.168.1.1 
What are the two default services that are available on the MGT interface? - HTTPS 
SSH 
True or false? Service route traffic has Security policy rules applied against it - True 
Service routes may b...
- Exam (elaborations)
- • 8 pages •
What are two firewall management methods? - CLI 
XML API 
Which two devices are used to connect a computer to the firewall for management purposes? - 
Serial cable 
RJ-45 Ethernet cable 
What is the default IP address assigned to the MGT interfaces of a Palo Alto Networks firewall? - 
192.168.1.1 
What are the two default services that are available on the MGT interface? - HTTPS 
SSH 
True or false? Service route traffic has Security policy rules applied against it - True 
Service routes may b...
PCNSA EXAMS 100% PASSED
Content-ID feature - includes a threat prevention engine and policies to inspect and control content 
traversing the firewall 
Security Profiles - objects that are added to security policy rules configured with an action of 
"allow"... represent additional security checks to be performed on allowed network traffic 
Antivirus Profile - Detects infected files being transferred with the application 
Anti-spyware profile - detects spyware downloads and traffic from already installed spyware 
Vulne...
- Exam (elaborations)
- • 5 pages •
Content-ID feature - includes a threat prevention engine and policies to inspect and control content 
traversing the firewall 
Security Profiles - objects that are added to security policy rules configured with an action of 
"allow"... represent additional security checks to be performed on allowed network traffic 
Antivirus Profile - Detects infected files being transferred with the application 
Anti-spyware profile - detects spyware downloads and traffic from already installed spyware 
Vulne...
PCNSA RATED A+
The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? - 
Securing the operations response 
Securing the enterprise 
Securing the cloud 
What are four components of the Palo Alto Networks Cybersecurity Portfolio? - WildFire 
Cortex XDR 
Prisma Access 
AutoFocus 
Which cloud-delivered security service provides instant access to community-based threat data? - 
AutoFocus 
Which cloud-delivered security service provides security and connectivity for branches ...
- Exam (elaborations)
- • 26 pages •
The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? - 
Securing the operations response 
Securing the enterprise 
Securing the cloud 
What are four components of the Palo Alto Networks Cybersecurity Portfolio? - WildFire 
Cortex XDR 
Prisma Access 
AutoFocus 
Which cloud-delivered security service provides instant access to community-based threat data? - 
AutoFocus 
Which cloud-delivered security service provides security and connectivity for branches ...
PCNSA Set 3 ALREADY PASSED
Which type of administrator account cannot be used to authenticate user traffic flowing through the 
firewall's data plane? - SAML user 
Starting with PAN-OS version 9.1 which new type of object is supported for use within the User field of a 
Security policy rule? - Dynamic user group 
Which link in the web interface enables a security administrator to view the Security policy rules that 
match new application signatures? - Review Apps 
Which type of firewall configuration contains in-progress...
- Exam (elaborations)
- • 2 pages •
Which type of administrator account cannot be used to authenticate user traffic flowing through the 
firewall's data plane? - SAML user 
Starting with PAN-OS version 9.1 which new type of object is supported for use within the User field of a 
Security policy rule? - Dynamic user group 
Which link in the web interface enables a security administrator to view the Security policy rules that 
match new application signatures? - Review Apps 
Which type of firewall configuration contains in-progress...
PCNSA Study Guide Questions
The Palo Alto Networks Security Operating Platform is designed for which three 
purposes? (Choose three.) 
A. consume innovations quickly 
B. ensure compliance 
C. focus on what matters 
D. prevent successful cyberattacks - A. consume innovations quickly 
D. prevent successful cyberattacks 
Which item is not one of the six primary components of the Palo Alto Networks 
Security Operating Platform? 
A. Applications (Palo Alto Networks apps, third‐party apps, customer apps) 
B. Cloud‐Delivered ...
- Exam (elaborations)
- • 6 pages •
The Palo Alto Networks Security Operating Platform is designed for which three 
purposes? (Choose three.) 
A. consume innovations quickly 
B. ensure compliance 
C. focus on what matters 
D. prevent successful cyberattacks - A. consume innovations quickly 
D. prevent successful cyberattacks 
Which item is not one of the six primary components of the Palo Alto Networks 
Security Operating Platform? 
A. Applications (Palo Alto Networks apps, third‐party apps, customer apps) 
B. Cloud‐Delivered ...
PCNSA Study Guide Sample Questions - All Domains
Q1. Which two statements are true about a Role Based Admin Role Profile role? (Choose two.) - It 
can be used for CLI commands. 
It can be used for XML API. 
Q2. The management console supports which two authentication types? (Choose two.) - RADIUS 
TACACS+ 
Q3. Which two Dynamic Admin Role types are available on the PAN-OS software? (Choose two.) - 
superuser 
device administrator (read-only) 
Q4. Which type of profile does an authentication sequence include? - Authentication 
Q5. An Authentic...
- Exam (elaborations)
- • 8 pages •
Q1. Which two statements are true about a Role Based Admin Role Profile role? (Choose two.) - It 
can be used for CLI commands. 
It can be used for XML API. 
Q2. The management console supports which two authentication types? (Choose two.) - RADIUS 
TACACS+ 
Q3. Which two Dynamic Admin Role types are available on the PAN-OS software? (Choose two.) - 
superuser 
device administrator (read-only) 
Q4. Which type of profile does an authentication sequence include? - Authentication 
Q5. An Authentic...
PCNSA
A client downloads a malicious file from the internet. The Palo Alto firewall has a valid WildFire 
subscription. The Security policy rule shown above matches the client HTTP session: Which three actions 
take place when the firewall's Content-ID engine detects a virus in the file and the decoder action is set 
to "block"? (Choose three.) - A threat log entry is generated. 
The file download is terminated. 
The client receives a block page. 
A company has a pair of PA-3050s running PAN-OS 6.0...
- Exam (elaborations)
- • 10 pages •
A client downloads a malicious file from the internet. The Palo Alto firewall has a valid WildFire 
subscription. The Security policy rule shown above matches the client HTTP session: Which three actions 
take place when the firewall's Content-ID engine detects a virus in the file and the decoder action is set 
to "block"? (Choose three.) - A threat log entry is generated. 
The file download is terminated. 
The client receives a block page. 
A company has a pair of PA-3050s running PAN-OS 6.0...