Palo Alto Networks PCNSA Übungsprüfungen
Zuletzt aktualisiert am 15.07.2025- Prüfungscode: PCNSA
- Prüfungsname: Palo Alto Networks Certified Network Security Administrator
- Zertifizierungsanbieter: Palo Alto Networks
- Zuletzt aktualisiert am: 15.07.2025
Which profile must be applied to the Security policy rule to block spyware on compromised hosts from trying to phone-home or beacon out to external command-and-control (C2) servers?
- A . Anti-spyware
- B . File blocking
- C . WildFire
- D . URL filtering
Which three types of authentication services can be used to authenticate user traffic flowing through the firewall’s data plane? (Choose three.)
- A . SAML 2.0
- B . Kerberos
- C . TACACS
- D . TACACS+
- E . SAML 1.0
Where does a user assign a tag group to a policy rule in the policy creation window?
- A . General tab
- B . Usage tab
- C . Application tab
- D . Actions tab
The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.
Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)
- A . Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to allow.
- B . Manually remove powerball.com from the gambling URL category.
- C . Add *.powerball.com to the allow list
- D . Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?
- A . Review Policies
- B . Review Apps
- C . Pre-analyze
- D . Review App Matches
What do you configure if you want to set up a group of objects based on their ports alone?
- A . address groups
- B . custom objects
- C . application groups
- D . service groups
Config logs display entries for which kind of firewall changes?
- A . configuration
- B . system logs
- C . debugs
- D . resets
How many zones can an interface be assigned with a Palo Alto Networks firewall?
- A . two
- B . three
- C . four
- D . one
Which three factors can be used to create malware based on domain generation algorithms?
(Choose three.)
- A . Time of day
- B . URL custom categories
- C . Other unique values
- D . Cryptographic keys
- E . IP address
Which three factors can be used to create malware based on domain generation algorithms?
(Choose three.)
- A . Time of day
- B . URL custom categories
- C . Other unique values
- D . Cryptographic keys
- E . IP address