100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCNSA – Questions And Answers (Graded A+)

Beoordeling
-
Verkocht
-
Pagina's
11
Cijfer
A+
Geüpload op
13-01-2024
Geschreven in
2023/2024

PCNSA – Questions And Answers (Graded A+)

Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
13 januari 2024
Aantal pagina's
11
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

PCNSA – Questions And Answers (Graded A+)

A client downloads a malicious file from the internet. The Palo Alto firewall
has a valid WildFire subscription. The Security policy rule shown above
matches the client HTTP session: Which three actions take place when the
firewall's Content-ID engine detects a virus in the file and the decoder
action is set to "block"? (Choose three.) Correct Ans - A threat log
entry is generated.

The file download is terminated.

The client receives a block page.

A company has a pair of PA-3050s running PAN-OS 6.0.4. Antivirus, Threat
Prevention, and URL Filtering Profiles are in place and properly configured
on both inbound and outbound policies. A Security Operation Center (SOC)
engineer starts his shift and faces the traffic logs presented in the
screenshot shown above. He notices that the traffic is being allowed
outbound. Which actions should the SOC engineer take to safely allow
known but not yet qualified applications, without disrupting the remaining
traffic policies? Correct Ans - Create Application Override policies
after a packet capture to identify the applications that are triggering the
"unknown-tcp". Then create new custom applications for those policies,
and add these new policies above the current policy that allows the traffic.

A company has a Palo Alto Networks firewall configured with the following
three zones: Internet DMZ Inside. All users are located on the Inside zone
and are using public DNS servers for name resolution. The company hosts a
publicly accessible web application on a server in the DMZ zone. Which
NAT rule configuration will allow users on the Inside zone to access the
web application using its public IP address? Correct Ans - Three
zone U-turn NAT

A company has a Palo Alto Networks firewall configured with the following
three zones: Untrust-L3 DMZ Trust-L3. The company hosts a publicly
accessible web application on a server that resides in the Trust-L3 zone.
The web server is associated with the following IP addresses: Web Server
Public IP: 2.2.2.1/24 , Web Server Private IP: 192.168.1.10/24 . The
security administrator configures the following two-zone U-Turn NAT rule

, to allow users using 10.10.1.0/24 on the "Trust-L3" zone to access the web
server using its public IP address in the Untrust-L3 zone: Which statement
is true in this situation? Correct Ans - The traffic will be considered
intra-zone based on the translated destination zone.

A company is deploying a pair of PA-5060 firewalls in an environment
requiring support for asymmetric routing. Which High Availability (HA)
mode best supports this design requirement? Correct Ans - Active-
Active mode

A company policy dictates that logs must be retained in their original
format for a period of time that would exceed the space limitations of the
Palo Alto Networks firewall's internal storage. Which two options will
allow the company to meet this requirement? (Choose two.) Correct
Ans - Palo Alto Networks Log Collector

Panorama Virtual Machine with NFS storage

A company uses Active Directory and RADIUS to capture User-ID
information and implement user-based policies to control web access.
Many Linux and Mac computers in the environment that do not have IP-
address-to-user mappings. What is the best way to collect user information
for those systems? Correct Ans - Use Captive Portal to capture user
information

A company wants to run their pair of PA-200 firewalls in a High Availability
active/passive mode and will be using HA-Lite. Which capability can be
used in this situation? Correct Ans - Configuration Sync

A Management Profile to allow SSH access has been created and applied to
interface ethernet1/1. A security rule with the action "deny" is applied to
packets from "any" source zone to "any" destination zone. What will
happen when someone attempts to initiate an SSH connection to
ethernet1/1? Correct Ans - SSH access to the interface will be
denied because intra-zone traffic is denied.

A network administrator needs to view the default action for a specific
spyware signature. The administrator follows the tabs and menus through
Objects > Security Profiles > Anti-Spyware, and selects the default Profile.
$10.99
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
StudyHall Chamberlain School Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1293
Lid sinds
2 jaar
Aantal volgers
825
Documenten
16346
Laatst verkocht
5 dagen geleden
The Study Hall Shop ~ "Where learning meets success"

Dear Stuvia Community, As a passionate and dedicated learner, I believe that knowledge is most powerful when shared. With this mindset, I’m thrilled to introduce my Stuvia account, where I aim to provide valuable, high-quality study resources that empower students like you to excel in your academic journey. Whether you’re looking for detailed notes, comprehensive study guides, or insightful exam preparation materials, I am committed to making your study experience more efficient and effective. My goal is to simplify complex topics, break them down into digestible content, and offer fresh perspectives that will help you gain deeper understanding and achieve academic success. I firmly believe that learning should be engaging, accessible, and rewarding. That’s why I’ve worked hard to craft resources that are not only informative but also easy to follow and enjoyable. As a fellow student, I understand the challenges that come with studying, and I’m here to make that process a little bit easier for you. Let’s make learning a journey, not a chore. Explore my collection of notes, exams and study materials, and feel free to reach out if you need anything more. Together, we can achieve greatness! Thank you for considering my contributions to your academic success. Best Wishes! :)

Lees meer Lees minder
3.8

215 beoordelingen

5
99
4
40
3
37
2
9
1
30

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen