Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PCNSA Exam Dumps - Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0)

Question # 4

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

A.

Translation Type

B.

Interface

C.

Address Type

D.

IP Address

Full Access
Question # 5

An administrator is configuring a NAT rule

At a minimum, which three forms of information are required? (Choose three.)

A.

name

B.

source zone

C.

destination interface

D.

destination address

E.

destination zone

Full Access
Question # 6

Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP –to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.

Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.

A.

syslog

B.

RADIUS

C.

UID redistribution

D.

XFF headers

Full Access
Question # 7

Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)

A.

XML API

B.

log forwarding auto-tagging

C.

GlobalProtect agent

D.

User-ID Windows-based agent

Full Access
Question # 8

Which statements is true regarding a Heatmap report?

A.

When guided by authorized sales engineer, it helps determine te areas of greatest security risk.

B.

It provides a percentage of adoption for each assessment area.

C.

It runs only on firewall.

D.

It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.

Full Access
Question # 9

Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?

A.

NAT Target Tab

B.

NAT Active/Active HA Binding Tab

C.

NAT Translated Packet Tab

D.

NAT Policies General Tab

Full Access
Question # 10

An administrator needs to allow users to use only certain email applications.

How should the administrator configure the firewall to restrict users to specific email applications?

A.

Create an application filter and filter it on the collaboration category, email subcategory.

B.

Create an application group and add the email applications to it.

C.

Create an application filter and filter it on the collaboration category.

D.

Create an application group and add the email category to it.

Full Access
Question # 11

Where does a user assign a tag group to a policy rule in the policy creation window?

A.

Application tab

B.

General tab

C.

Actions tab

D.

Usage tab

Full Access
Question # 12

Which setting is available to edit when a tag is created on the local firewall?

A.

Location

B.

Color

C.

Order

D.

Priority

Full Access
Question # 13

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

A.

GlobalProtect

B.

Panorama

C.

Aperture

D.

AutoFocus

Full Access
Question # 14

Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?

A.

intrazone

B.

interzone

C.

universal

D.

global

Full Access
Question # 15

You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?

A.

Antivirus Profile

B.

Data Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Full Access
Question # 16

How does the Policy Optimizer policy view differ from the Security policy view?

A.

It provides sorting options that do not affect rule order.

B.

It displays rule utilization.

C.

It details associated zones.

D.

It specifies applications seen by rules.

Full Access
Question # 17

Based on the network diagram provided, which two statements apply to traffic between the User and Server networks? (Choose two.)

A.

Traffic is permitted through the default intrazone "allow" rule.

B.

Traffic restrictions are possible by modifying intrazone rules.

C.

Traffic restrictions are not possible, because the networks are in the same zone.

D.

Traffic is permitted through the default interzone "allow" rule.

Full Access
Question # 18

Which definition describes the guiding principle of the zero-trust architecture?

A.

never trust, never connect

B.

always connect and verify

C.

never trust, always verify

D.

trust, but verity

Full Access
Question # 19

An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the rule type from its default value.

What type of Security policy rule is created?

A.

Tagged

B.

Intrazone

C.

Universal

D.

Interzone

Full Access
Question # 20

What do you configure if you want to set up a group of objects based on their ports alone?

A.

Application groups

B.

Service groups

C.

Address groups

D.

Custom objects

Full Access
Question # 21

What is considered best practice with regards to committing configuration changes?

A.

Disable the automatic commit feature that prioritizes content database installations before committing

B.

Validate configuration changes prior to committing

C.

Wait until all running and pending jobs are finished before committing

D.

Export configuration after each single configuration change performed

Full Access
Question # 22

In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns sessions?

A.

Destination IP Hash b

B.

Concurrent Sessions

C.

Max Sessions

D.

IP Modulo

Full Access
Question # 23

How are Application Fillers or Application Groups used in firewall policy?

A.

An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group

B.

An Application Filter is a dynamic way to group applications and can be configured as a nested member of an Application Group

C.

An Application Group is a dynamic way of grouping applications and can be configured as a nested member of an Application Group

D.

An Application Group is a static way of grouping applications and cannot be configured as a nested member of Application Group

Full Access
Question # 24

Which System log severity level would be displayed as a result of a user password change?

A.

High

B.

Critical

C.

Medium

D.

Low

Full Access
Question # 25

Which security profile should be used to classify malicious web content?

A.

URL Filtering

B.

Antivirus

C.

Web Content

D.

Vulnerability Protection

Full Access
Question # 26

Which type of address object is "10 5 1 1/0 127 248 2"?

A.

IP subnet

B.

IP wildcard mask

C.

IP netmask

D.

IP range

Full Access
Question # 27

Which two rule types allow the administrator to modify the destination zone? (Choose two )

A.

interzone

B.

intrazone

C.

universal

D.

shadowed

Full Access
Question # 28

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base.

On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days.

Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

A.

All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer matches the SuperApp-base application

B.

No impact because the apps were automatically downloaded and installed

C.

No impact because the firewall automatically adds the rules to the App-ID interface

D.

All traffic matching the SuperApp_base, SuperApp_chat, and SuperApp_download is denied until the security administrator approves the applications

Full Access
Question # 29

An administrator is reviewing another administrator s Security policy log settings

Which log setting configuration is consistent with best practices tor normal traffic?

A.

Log at Session Start and Log at Session End both enabled

B.

Log at Session Start disabled Log at Session End enabled

C.

Log at Session Start enabled Log at Session End disabled

D.

Log at Session Start and Log at Session End both disabled

Full Access
Question # 30

What are the two default behaviors for the intrazone-default policy? (Choose two.)

A.

Allow

B.

Logging disabled

C.

Log at Session End

D.

Deny

Full Access
Question # 31

View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 32

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

A.

GlobalProtect

B.

AutoFocus

C.

Aperture

D.

Panorama

Full Access
Question # 33

Which type of DNS signatures are used by the firewall to identify malicious and command-and-control domains?

A.

DNS Malicious signatures

B.

DNS Malware signatures

C.

DNS Block signatures

D.

DNS Security signatures

Full Access
Question # 34

Order the steps needed to create a new security zone with a Palo Alto Networks firewall.

Full Access
Question # 35

What is a recommended consideration when deploying content updates to the firewall from Panorama?

A.

Content updates for firewall A/P HA pairs can only be pushed to the active firewall.

B.

Content updates for firewall A/A HA pairs need a defined master device.

C.

Before deploying content updates, always check content release version compatibility.

D.

After deploying content updates, perform a commit and push to Panorama.

Full Access
Question # 36

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?

A.

Prisma SaaS

B.

Panorama

C.

AutoFocus

D.

GlobalProtect

Full Access
Question # 37

An administrator wants to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 device groups and five templates.

Which configuration action should the administrator take when creating the address object?

A.

Ensure that the Shared option is checked.

B.

Ensure that the Shared option is cleared.

C.

Ensure that Disable Override is cleared.

D.

Tag the address object with the Global tag.

Full Access
Question # 38

Based on the security policy rules shown, ssh will be allowed on which port?

A.

any port

B.

same port as ssl and snmpv3

C.

the default port

D.

only ephemeral ports

Full Access
Question # 39

A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to

making the changes.

Which action will allow the administrator to undo the changes?

A.

Load configuration version, and choose the first item on the list.

B.

Load named configuration snapshot, and choose the first item on the list.

C.

Revert to last saved configuration.

D.

Revert to running configuration.

Full Access
Question # 40

By default, which action is assigned to the interzone-default rule?

A.

Reset-client

B.

Reset-server

C.

Deny

D.

Allow

Full Access
Question # 41

When is the content inspection performed in the packet flow process?

A.

after the application has been identified

B.

after the SSL Proxy re-encrypts the packet

C.

before the packet forwarding process

D.

before session lookup

Full Access
Question # 42

What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?

A.

authentication sequence

B.

LDAP server profile

C.

authentication server list

D.

authentication list profile

Full Access
Question # 43

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

A.

on the App Dependency tab in the Commit Status window

B.

on the Policy Optimizer's Rule Usage page

C on the Application tab in the Security Policy Rule creation window

C.

on the Objects > Applications browser pages

Full Access
Question # 44

Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the management interface?

A.

Data redistribution

B.

Dynamic updates

C.

SNMP setup

D.

Service route

Full Access
Question # 45

An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"

Which security policy action causes this?

A.

Drop

B.

Drop, send ICMP Unreachable

C.

Reset both

D.

Reset server

Full Access
Question # 46

Which license is required to use the Palo Alto Networks built-in IP address EDLs?

A.

DNS Security

B.

Threat Prevention

C.

WildFire

D.

SD-Wan

Full Access
Question # 47

Which feature enables an administrator to review the Security policy rule base for unused rules?

A.

Test Policy Match

B.

Policy Optimizer

C.

View Rulebase as Groups

D.

Security policy tags eb

Full Access
Question # 48

Which three filter columns are available when setting up an Application Filter? (Choose three.)

A.

Parent App

B.

Category

C.

Risk

D.

Standard Ports

E.

Subcategory

Full Access
Question # 49

Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall permissions?

A.

SAML

B.

Multi-Factor Authentication

C.

Role-based

D.

Dynamic

Full Access
Question # 50

Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)

A.

Layer-ID

B.

User-ID

C.

QoS-ID

D.

App-ID

Full Access
Question # 51

What is a default setting for NAT Translated Packets when the destination NAT translation is selected as Dynamic IP (with session distribution)?

A.

IP Hash

B.

Source IP Hash

C.

Round Robin

D.

Least Sessions

Full Access
Question # 52

What are the two main reasons a custom application is created? (Choose two.)

A.

To correctly identify an internal application in the traffic log

B.

To change the default categorization of an application

C.

To visually group similar applications

D.

To reduce unidentified traffic on a network

Full Access
Question # 53

A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?

A.

Create a custom-service-object called SERVICE-SSH for destination-port-TCP-22. Create a security-rule between zone USERS and OUTSIDE to allow traffic from any source IP-address to any destination IP-address for SERVICE-SSH

B.

Create a security-rule that allows traffic from zone USERS to OUTSIDE to allow traffic from any source IP-address to any destination IP-address for application SSH

C.

In addition to option a, a custom-service-object called SERVICE-SSH-RETURN that contains source-port-TCP-22 should be created. A second security-rule is required that allows traffic from zone OUTSIDE to USERS for SERVICE-SSH-RETURN for any source-IP-address to any destination-Ip-address

D.

In addition to option c, an additional rule from zone OUTSIDE to USERS for application SSH from any source-IP-address to any destination-IP-address is required to allow the return-traffic from the SSH-servers to reach the server-admin

Full Access
Question # 54

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data.

Which Security profile feature could have been used to prevent the communications with the command-and-control server?

A.

Create a Data Filtering Profile and enable its DNS sinkhole feature.

B.

Create an Antivirus Profile and enable its DNS sinkhole feature.

C.

Create an Anti-Spyware Profile and enable its DNS sinkhole feature.

D.

Create a URL Filtering Profile and block the DNS sinkhole URL category.

Full Access
Question # 55

Access to which feature requires the PAN-OS Filtering license?

A.

PAN-DB database

B.

DNS Security

C.

Custom URL categories

D.

URL external dynamic lists

Full Access
Question # 56

During the packet flow process, which two processes are performed in application identification? (Choose two.)

A.

pattern based application identification

B.

application override policy match

C.

session application identified

D.

application changed from content inspection

Full Access
Question # 57

Review the Screenshot:

Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition, traffic should be permitted from the

SERVER zone to the DMZ on SSH only.

Which rule group enables the required traffic?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 58

How is the hit count reset on a rule?

A.

select a security policy rule, right click Hit Count > Reset

B.

with a dataplane reboot

C.

Device > Setup > Logging and Reporting Settings > Reset Hit Count

D.

in the CLI, type command reset hitcount

Full Access
Question # 59

An administrator wants to enable access to www.paloaltonetworks.com while denying access to all other sites in the same category.

Which object should the administrator create to use as a match condition for the security policy rule that allows access to www.paloaltonetworks.com?

A.

Application group

B.

Address ab

C.

URL category

D.

Service

Full Access
Question # 60

Which path is used to save and load a configuration with a Palo Alto Networks firewall?

A.

Device>Setup>Services

B.

Device>Setup>Management

C.

Device>Setup>Operations

D.

Device>Setup>Interfaces

Full Access
Question # 61

The Palo Alto Networks NGFW was configured with a single virtual router named VR-1 What changes are required on VR-1 to route traffic between two interfaces on the NGFW?

A.

Add zones attached to interfaces to the virtual router

B.

Add interfaces to the virtual router

C.

Enable the redistribution profile to redistribute connected routes

D.

Add a static routes to route between the two interfaces

Full Access
Question # 62

URL categories can be used as match criteria on which two policy types? (Choose two.)

A.

authentication

B.

decryption

C application override

C.

NAT

Full Access
Question # 63

A website is unexpectedly allowed due to miscategorization.

What are two way-s to resolve this issue for a proper response? (Choose two.)

A.

Identify the URL category being assigned to the website.

Edit the active URL Filtering profile and update that category's site access settings to block.

B.

Create a URL category and assign the affected URL.

Update the active URL Filtering profile site access setting for the custom URL category to block.

C.

Review the categorization of the website on https://urlfiltering.paloaltonetworks.com.

Submit for "request change*, identifying the appropriate categorization, and wait for confirmation before testing again.

D.

Create a URL category and assign the affected URL.

Add a Security policy with a URL category qualifier of the custom URL category below the original policy. Set the policy action to Deny.

Full Access
Question # 64

Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?

A.

Application Category

B.

Source

C.

File Size

D.

Direction

Full Access
Question # 65

Which action would an administrator take to ensure that a service object will be available only to the selected device group?

A.

create the service object in the specific template

B.

uncheck the shared option

C.

ensure that disable override is selected

D.

ensure that disable override is cleared

Full Access
Question # 66

Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.

What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?

A.

save named configuration snapshot

B.

export device state

C.

export named configuration snapshot

D.

save candidate config

Full Access
Question # 67

How frequently can wildfire updates be made available to firewalls?

A.

every 15 minutes

B.

every 30 minutes

C.

every 60 minutes

D.

every 5 minutes

Full Access
Question # 68

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

A.

It functions like PAN-DB and requires activation through the app portal.

B.

It removes the 100K limit for DNS entries for the downloaded DNS updates.

C.

IT eliminates the need for dynamic DNS updates.

D.

IT is automatically enabled and configured.

Full Access
Question # 69

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

A.

Policies

B.

Network

C.

Objects

D.

Device

Full Access
Question # 70

Which administrative management services can be configured to access a management interface?

A.

HTTP, CLI, SNMP, HTTPS

B.

HTTPS, SSH telnet SNMP

C.

SSH: telnet HTTP, HTTPS

D.

HTTPS, HTTP. CLI, API

Full Access
Question # 71

What is the main function of Policy Optimizer?

A.

reduce load on the management plane by highlighting combinable security rules

B.

migrate other firewall vendors’ security rules to Palo Alto Networks configuration

C.

eliminate “Log at Session Start” security rules

D.

convert port-based security rules to application-based security rules

Full Access
Question # 72

Which administrator type utilizes predefined roles for a local administrator account?

A.

Superuser

B.

Role-based

C.

Dynamic

D.

Device administrator

Full Access
Question # 73

Which Security profile would you apply to identify infected hosts on the protected network uwall user database?

A.

Anti-spyware

B.

Vulnerability protection

C.

URL filtering

D.

Antivirus

Full Access
Question # 74

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

A.

Windows-based agent deployed on the internal network

B.

PAN-OS integrated agent deployed on the internal network

C.

Citrix terminal server deployed on the internal network

D.

Windows-based agent deployed on each of the WAN Links

Full Access
Question # 75

Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?

A.

Palo Alto Networks C&C IP Addresses

B.

Palo Alto Networks Bulletproof IP Addresses

C.

Palo Alto Networks High-Risk IP Addresses

D.

Palo Alto Networks Known Malicious IP Addresses

Full Access
Question # 76

How are service routes used in PAN-OS?

A.

By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network

B.

To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services

C.

For routing, because they are the shortest path selected by the BGP routing protocol

D.

To route management plane services through data interfaces rather than the management interface

Full Access
Question # 77

Which profile should be used to obtain a verdict regarding analyzed files?

A.

WildFire analysis

B.

Vulnerability profile

C.

Content-ID

D.

Advanced threat prevention

Full Access
Question # 78

Which update option is not available to administrators?

A.

New Spyware Notifications

B.

New URLs

C.

New Application Signatures

D.

New Malicious Domains

E.

New Antivirus Signatures

Full Access
Question # 79

What is the main function of the Test Policy Match function?

A.

verify that policy rules from Expedition are valid

B.

confirm that rules meet or exceed the Best Practice Assessment recommendations

C.

confirm that policy rules in the configuration are allowing/denying the correct traffic

D.

ensure that policy rules are not shadowing other policy rules

Full Access
Question # 80

An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out. Which two fields could help in determining if this is normal? (Choose two.)

A.

Packets sent/received

B.

IP Protocol

C.

Action

D.

Decrypted

Full Access
Question # 81

An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?

A.

branch office traffic

B.

north-south traffic

C.

perimeter traffic

D.

east-west traffic

Full Access
Question # 82

Which Security profile must be added to Security policies to enable DNS Signatures to be checked?

A.

Anti-Spyware

B.

Antivirus

C.

Vulnerability Protection

D.

URL Filtering

Full Access
Question # 83

Which type firewall configuration contains in-progress configuration changes?

A.

backup

B.

running

C.

candidate

D.

committed

Full Access
Question # 84

Selecting the option to revert firewall changes will replace what settings?

A.

The running configuration with settings from the candidate configuration

B.

The candidate configuration with settings from the running configuration

C.

The device state with settings from another configuration

D.

Dynamic update scheduler settings

Full Access
Question # 85

After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.

Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

A.

Import named config snapshot

B.

Load named configuration snapshot

C.

Revert to running configuration

D.

Revert to last saved configuration

Full Access
Question # 86

What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)

A.

Service

B.

User

C.

Application

D.

Address

E.

Zone ab

Full Access
Question # 87

Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?

A.

Panorama > Device Deployment > Dynamic Updates > Schedules > Add

B.

Panorama > Device Deployment > Content Updates > Schedules > Add

C.

Panorama > Dynamic Updates > Device Deployment > Schedules > Add

D.

Panorama > Content Updates > Device Deployment > Schedules > Add

Full Access
Question # 88

Match the network device with the correct User-ID technology.

Full Access
Question # 89

Which two security profile types can be attached to a security policy? (Choose two.)

A.

antivirus

B.

DDoS protection

C.

threat

D.

vulnerability

Full Access
Question # 90

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?

A.

It defines the SSUTLS encryption strength used to protect the management interface.

B.

It defines the CA certificate used to verify the client's browser.

C.

It defines the certificate to send to the client's browser from the management interface.

D.

It defines the firewall's global SSL/TLS timeout values.

Full Access
Question # 91

Which three types of Source NAT are available to users inside a NGFW? (Choose three.)

A.

Dynamic IP and Port (DIPP)

B.

Static IP

C.

Static Port

D.

Dynamic IP

E.

Static IP and Port (SIPP)

Full Access
Question # 92

In which profile should you configure the DNS Security feature?

A.

URL Filtering Profile

B.

Anti-Spyware Profile

C.

Zone Protection Profile

D.

Antivirus Profile

Full Access
Question # 93

What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)

A.

It uses techniques such as DGA.DNS tunneling detection and machine learning.

B.

It requires a valid Threat Prevention license.

C.

It enables users to access real-time protections using advanced predictive analytics.

D.

It requires a valid URL Filtering license.

E.

It requires an active subscription to a third-party DNS Security service.

Full Access
Question # 94

Which User Credential Detection method should be applied within a URL Filtering Security profile to check for the submission of a valid corporate username and the associated password?

A.

Domain Credential

B.

IP User

C.

Group Mapping

D.

Valid Username Detected Log Severity

Full Access
Question # 95

Which information is included in device state other than the local configuration?

A.

uncommitted changes

B.

audit logs to provide information of administrative account changes

C.

system logs to provide information of PAN-OS changes

D.

device group and template settings pushed from Panorama

Full Access
Question # 96

How do you reset the hit count on a security policy rule?

A.

First disable and then re-enable the rule.

B.

Reboot the data-plane.

C.

Select a Security policy rule, and then select Hit Count > Reset.

D.

Type the CLI command reset hitcount .

Full Access
Question # 97

Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?

A.

Objects > Schedules

B.

Policies > Policy Optimizer

C.

Monitor > Packet Capture

D.

Monitor > Reports

Full Access
Question # 98

When creating a custom URL category object, which is a valid type?

A.

domain match

B.

host names

C.

wildcard

D.

category match

Full Access
Question # 99

A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.

Which two types of traffic will the rule apply to? (Choose two)

A.

traffic between zone IT and zone Finance

B.

traffic between zone Finance and zone HR

C.

traffic within zone IT

D.

traffic within zone HR

Full Access
Question # 100

By default, what is the maximum number of templates that can be added to a template stack?

A.

6

B.

8

C.

10

D.

12

Full Access
Question # 101

Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)

A.

QoS profile

B.

DoS Protection profile

C.

Zone Protection profile

D.

DoS Protection policy

Full Access
Question # 102

Which action results in the firewall blocking network traffic with out notifying the sender?

A.

Drop

B.

Deny

C.

Reset Server

D.

Reset Client

Full Access
Question # 103

What is an advantage for using application tags?

A.

They are helpful during the creation of new zones

B.

They help with the design of IP address allocations in DHCP.

C.

They help content updates automate policy updates

D.

They help with the creation of interfaces

Full Access
Question # 104

Which statement is true about Panorama managed devices?

A.

Panorama automatically removes local configuration locks after a commit from Panorama

B.

Local configuration locks prohibit Security policy changes for a Panorama managed device

C.

Security policy rules configured on local firewalls always take precedence

D.

Local configuration locks can be manually unlocked from Panorama

Full Access
Question # 105

An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule, which is set to default configuration.

What should the administrator do?

A.

change the logging action on the rule

B.

review the System Log

C.

refresh the Traffic Log

D.

tune your Traffic Log filter to include the dates

Full Access
Question # 106

Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?

A.

URL filtering

B.

Antivirus

C.

WildFire

D.

Threat Prevention

Full Access
Question # 107

An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones.

Which Security policy rule type should they use?

A.

default

B.

universal

C.

intrazone

D.

interzone

Full Access
Question # 108

Which prevention technique will prevent attacks based on packet count?

A.

zone protection profile

B.

URL filtering profile

C.

antivirus profile

D.

vulnerability profile

Full Access