Palo Alto Networks PCNSA Übungsprüfungen
Zuletzt aktualisiert am 17.06.2025- Prüfungscode: PCNSA
- Prüfungsname: Palo Alto Networks Certified Network Security Administrator
- Zertifizierungsanbieter: Palo Alto Networks
- Zuletzt aktualisiert am: 17.06.2025
What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?
- A . Increase the per-firewall capacity for address and service objects
- B . Reduce the configuration and session synchronization time between HA pairs
- C . Increase the backup capacity for configuration backups per firewall
- D . Reduce the number of objects pushed to a firewall
An internal host wants to connect to servers of the internet through using source NAT.
Which policy is required to enable source NAT on the firewall?
- A . NAT policy with source zone and destination zone specified
- B . post-NAT policy with external source and any destination address
- C . NAT policy with no source of destination zone selected
- D . pre-NAT policy with external source and any destination address
What is a function of application tags?
- A . creation of new zones
- B . application prioritization
- C . automated referenced applications in a policy
- D . IP address allocations in DHCP
What is a function of application tags?
- A . creation of new zones
- B . application prioritization
- C . automated referenced applications in a policy
- D . IP address allocations in DHCP
How often does WildFire release dynamic updates?
- A . every 5 minutes
- B . every 15 minutes
- C . every 60 minutes
- D . every 30 minutes
An administrator wants to prevent users from unintentionally accessing malicious domains where data can be exfiltrated through established connections to remote systems.
From the Pre-defined Categories tab within the URL Filtering profile, what is the right configuration to prevent such connections?
- A . Set the hacking category to continue.
- B . Set the phishing category to override.
- C . Set the malware category to block.
- D . Set the Command and Control category to block.
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?
- A . control
- B . network processing
- C . data
- D . security processing
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?
- A . control
- B . network processing
- C . data
- D . security processing
Which three statements describe the operation of Security policy rules and Security Profiles?
(Choose three.)
- A . Security policy rules inspect but do not block traffic.
- B . Security Profile should be used only on allowed traffic.
- C . Security Profile are attached to security policy rules.
- D . Security Policy rules are attached to Security Profiles.
- E . Security Policy rules can block or allow traffic.
Which three statements describe the operation of Security policy rules and Security Profiles?
(Choose three.)
- A . Security policy rules inspect but do not block traffic.
- B . Security Profile should be used only on allowed traffic.
- C . Security Profile are attached to security policy rules.
- D . Security Policy rules are attached to Security Profiles.
- E . Security Policy rules can block or allow traffic.