Curious about Actual Palo Alto Networks Certified Network Security Administrator (PCNSA) Exam Questions?

Here are sample Palo Alto Networks Certified Network Security Administrator (PCNSA) Exam questions from real exam. You can get more Palo Alto Networks Certified Network Security Administrator (PCNSA) Exam premium practice questions at TestInsights.

Page: 1 /
Total 362 questions
Question 1

In which two types of NAT can oversubscription be used? (Choose two.)


Correct : C, D

Oversubscription is a feature that allows you to use more private IP addresses than public IP addresses for NAT. This means that multiple private IP addresses can share the same public IP address, as long as they use different ports. Oversubscription can be used in two types of NAT: Dynamic IP and Port (DIPP) and Dynamic IP. DIPP NAT translates both the source IP address and the source port number of the outgoing packets, and can have an oversubscription rate greater than 1. Dynamic IP NAT translates only the source IP address of the outgoing packets, and can have an oversubscription rate of 1 or less. Static IP and Destination NAT do not support oversubscription, as they require a one-to-one mapping between the private and public IP addresses.Reference:Source NAT,Configure NAT,NAT


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

Which security profile should be used to classify malicious web content?


Correct : A

URL Filtering is a security profile that allows you to classify web content based on the URL category and reputation of the website. URL Filtering can help you block access to malicious web content, such as phishing, malware, or command and control sites, as well as enforce acceptable use policies for web browsing. URL Filtering uses the PAN-DB cloud service to provide up-to-date information on the URL categories and reputations of millions of websites. You can configure URL Filtering policies to allow, block, alert, continue, or override web requests based on the URL category and reputation, as well as customize the response pages and exceptions for different user groups.Reference:URL Filtering,Set Up a Basic Security Policy,Updated Certifications for PAN-OS 10.1


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

In order to attach an Antivirus, Anti-Spyware and Vulnerability Protection security profile to your Security Policy rules, which setting must be selected?


Correct : C

To enable the firewall to scan the traffic that it allows based on a Security policy rule, you must also attach Security Profiles ---including URL Filtering, Antivirus, Anti-Spyware, File Blocking, and WildFire Analysis---to each rule. To attach a Security Profile to a Security policy rule, you must select Profiles as the Profile Type in the Actions tab of the rule. This allows you to choose from the predefined or custom Security Profiles that you have configured. Group-Profiles, Default-Profiles, and Tagged-Profiles are not valid options for attaching Security Profiles to Security policy rules.Reference:Set Up a Basic Security Policy,Security Profiles,Updated Certifications for PAN-OS 10.1


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?


Correct : D

A WildFire Analysis Profile allows you to specify which files or email links to forward for WildFire analysis based on the application, file type, and transmission direction (upload or download) of the traffic. The direction match criteria determines whether the file or email link was sent from the source zone to the destination zone (upload) or from the destination zone to the source zone (download). You can also select both directions to forward files or email links regardless of the direction of the traffic.Reference:Security Profile: Wildfire Analysis,Objects > Security Profiles > WildFire Analysis


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Which two options does the firewall use to dynamically populate address group members? (Choose two.)


Correct : B, D

A dynamic address group populates its members dynamically using look ups for tags and tag-based filters. Tags are metadata elements or attribute-value pairs that are registered for each IP address. Tag-based filters use logical and and or operators to match the tags and determine the membership of the dynamic address group. For example, you can create a dynamic address group that includes all IP addresses that have the tags ''web-server'' and ''linux''. You can also use static tags as part of the filter criteria.Reference:Policy Object: Address Groups,Use Dynamic Address Groups in Policy,Statics vs. Dynamic Address Objects Groups


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 73   
Total 362 questions