Valentine Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PCNSC Exam Dumps - Palo Alto Networks Certified Network Security Consultant

Question # 4

A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the switch it connect.

How would an administrator configure the interface to IGbps?

A.

set deviceconfig system speed-duplex 10Gbps-full-duplex

B.

set deviceconfig interface speed-duplex 1Gbs--full-duplex

C.

set deviceconfig interface speed-duplex 1Gbs--half-duplex

D.

set deviceconfig system speed-duplex 1Gbs--half-duplex.

Full Access
Question # 5

An administrator deploys PA-500 NGFWs as an active/passive high availability pair . Thedevices are not participating in dynamic router and preemption is disabled.

What must be verified to upgrade the firewalls to the most recent version of PAN OS® software?

A.

Antivirus update package

B.

Applications and Threats update package

C.

Wildfire update package

D.

User-ID agent

Full Access
Question # 6

Which two action would be part of an automatic solution that would block sites with untrusted certificates without enabling SSLforward proxy? (Choose two.)

A.

Configure an EDL to pull IP Addresses of known sites resolved from a CRL.

B.

Create a Security Policy rule with vulnerability Security Profile attached.

C.

Create a no-decrypt Decryption Policy rule.

D.

Enable the "Block seasons with untrusted Issuers- setting.

E.

Configure a Dynamic Address Group for untrusted sites.

Full Access
Question # 7

An administrator wants multiple web servers in the DMZ to receive connections from the internet. Traffic destined for 206.15.22.9 port 80/TCP needs to be forwarded to the server at 10 1.22

Based on the information shown in the age, which NAT rule will forward web-browsing traffic correctly?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Which PAN-OS® policy must you configure to force a user to provide additional credential before he is allowed to access an internal application that contains highly sensitive business data?

A.

Authentication policy

B.

Decryption policy

C.

Security policy

D.

Application Override policy

Full Access
Question # 9

A customer wants to combine multiple Ethernet interfaces into a single virtual interface using Link aggregation.

Which two formats are correct for naming aggregate interlaces? (Choose two.)

A.

aggregate.8

B.

ae.8

C.

ae.1

D.

aggregate.1

Full Access
Question # 10

What will be the egress interface if the traffic’s ingress interface is Ethernet 1/6 sourcing form 192.168.11.3 and to the destination 10.46.41.113.during the.

A.

ethernet 1/6

B.

ethernet 1/5

C.

ethernet 1/3

D.

ethernet 1/7

Full Access
Question # 11

A firewall administrator has been asked to configure a Palo Alto Networks NGFW to prevent against compromised hosts trying tophone-number or bacon out to eternal command-and-control (C2) servers.

Which Security Profile type will prevent these behaviors?

A.

Vulnerability Protection

B.

Antivirus

C.

Wildfire

D.

Anti-Spyware

Full Access