Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Paloalto Networks PCNSA Practice Exam with Questions & Answers | Set: 10

Questions 91

In a File Blocking profile, which two actions should be taken to allow file types that support critical apps? (Choose two.)

Options:
A.

Clone and edit the Strict profile.

B.

Use URL filtering to limit categories in which users can transfer files.

C.

Set the action to Continue.

D.

Edit the Strict profile.

Paloalto Networks PCNSA Premium Access
Questions 92

What action will inform end users when their access to Internet content is being restricted?

Options:
A.

Create a custom 'URL Category' object with notifications enabled.

B.

Publish monitoring data for Security policy deny logs.

C.

Ensure that the 'site access" setting for all URL sites is set to 'alert'.

D.

Enable 'Response Pages' on the interface providing Internet access.

Questions 93

Why does a company need an Antivirus profile?

Options:
A.

To prevent command-and-control traffic

B.

To protect against viruses, worms, and trojans

C.

To prevent known exploits

D.

To prevent access to malicious web content

Questions 94

At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?

PCNSA Question 94

Options:
A.

delivery

B.

command and control

C.

explotation

D.

reinsurance

E.

installation

Questions 95

Which type security policy rule would match traffic flowing between the inside zone and outside zone within the inside zone and within the outside zone?

Options:
A.

global

B.

universal

C.

intrazone

D.

interzone

Questions 96

Files are sent to the WildFire cloud service via the WildFire Analysis Profile. How are these files used?

Options:
A.

WildFire signature updates

B.

Malware analysis

C.

Domain Generation Algorithm (DGA) learning

D.

Spyware analysis

Questions 97

Which statement best describes a common use of Policy Optimizer?

Options:
A.

Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications.

B.

Policy Optimizer can add or change a Log Forwarding profile for each Security policy selected.

C.

Policy Optimizer can display which Security policies have not been used in the last 90 days.

D.

Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App-ID Security policy for every Layer 4 policy that exists. Admins can then manually enable policies they want to keep and delete ones they want to remove.

Questions 98

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application

Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

Options:
A.

Data Filtering Profile applied to outbound Security policy rules

B.

Antivirus Profile applied to outbound Security policy rules

C.

Data Filtering Profile applied to inbound Security policy rules

D.

Vulnerability Profile applied to inbound Security policy rules

Questions 99

When a security rule is configured as Intrazone, which field cannot be changed?

Options:
A.

Actions

B.

Source Zone

C.

Application

D.

Destination Zone

Questions 100

What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?

Options:
A.

Increase the backup capacity for configuration backups per firewall

B.

Increase the per-firewall capacity for address and service objects

C.

Reduce the configuration and session synchronization time between HA pairs

D.

Reduce the number of objects pushed to a firewall