100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PCNSA graded A+

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
02-02-2024
Written in
2023/2024

Which two actions are available for antivirus security profiles? (Choose two.) A. continue B. allow C. block IP D. alert - B. allow D. alert Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) A. User‐Agent B. Safe Search C. URL redirection D. X‐Forward‐For - A. User‐Agent D. X‐Forward‐For What are the two components of Denial‐of‐Service Protection? (Choose two.) A. zone protection profile B. DoS protection profile and policy rules C. flood protection D. reconnaissance protection - A. zone protection profile B. DoS protection profile and policy rules Which two types of attacks does the PAN‐DB prevent? (Choose two.) A. phishing sites B. HTTP based command‐and‐control C. infected JavaScript D. flood attacks - A. phishing sites B. HTTP based command‐and‐control Which two valid URLs can be used in a custom URL category? (Choose two.) A. be.** B. www.**.com C. D. *. - C. D. *. What are three methods of mapping usernames to IP addresses? (Choose three.) A. Server Monitoring B. Traps C. Minemeld D. syslog E. AutoFocus F. port mapping - A. Server Monitoring D. syslog F. port mapping Which type of server profile is used to create group mappings?

Show more Read less
Institution
AQA
Module
PCNSA











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 2, 2024
Number of pages
39
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

PCNSA
Which two actions are available for antivirus security profiles? (Choose two.)

A. continue

B. allow

C. block IP

D. alert - ✔✔B. allow

D. alert



Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.)

A. User‐Agent

B. Safe Search

C. URL redirection

D. X‐Forward‐For - ✔✔A. User‐Agent

D. X‐Forward‐For



What are the two components of Denial‐of‐Service Protection? (Choose two.)

A. zone protection profile

B. DoS protection profile and policy rules

C. flood protection

D. reconnaissance protection - ✔✔A. zone protection profile

B. DoS protection profile and policy rules

,Which two types of attacks does the PAN‐DB prevent? (Choose two.)

A. phishing sites

B. HTTP based command‐and‐control

C. infected JavaScript

D. flood attacks - ✔✔A. phishing sites

B. HTTP based command‐and‐control



Which two valid URLs can be used in a custom URL category? (Choose two.)

A. ww.youtube.**

B. www.**.com

C. www.youtube.com

D. *.youtube.com - ✔✔C. www.youtube.com

D. *.youtube.com



What are three methods of mapping usernames to IP addresses? (Choose three.)

A. Server Monitoring

B. Traps

C. Minemeld

D. syslog

E. AutoFocus

F. port mapping - ✔✔A. Server Monitoring

D. syslog

F. port mapping



Which type of server profile is used to create group mappings?

,A. RADIUS

B. TACACS+

C. Kerberos

D. LDAP - ✔✔D. LDAP



The Server Monitoring user mapping method can monitor which three types of

servers? (Choose three.)

A. RADIUS

B. Microsoft Domain Controllers

C. Exchange Servers

D. Novell eDirectory Servers - ✔✔B. Microsoft Domain Controllers

C. Exchange Servers

D. Novell eDirectory Servers



The Port Mapping user mapping method can monitor which two types of

environments? (Choose two.)

A. Citrix

B. Microsoft terminal servers

C. Exchange Servers

D. Linux servers - ✔✔A. Citrix

B. Microsoft terminal servers



The Windows User‐ID Agent can be installed on which two operating systems?

(Choose two.)

A. Linux

, B. Server 2016

C. XP

D. Server 2008 - ✔✔B. Server 2016

D. Server 2008



A Heatmap provides an adoption rate for which three features? (Choose three.)

A. WildFire

B. Traps

C. File Blocking

D. User‐ID

E. SSL certificates

F. authentication profiles - ✔✔A. WildFire

C. File Blocking

D. User‐ID



What are three Best Practice Assessment tool primary categories? (Choose

three.)

A. User‐ID

B. Logging

C. Vulnerability Protection

D. Security

E. Decryption

F. DoS Protection - ✔✔D. Security

E. Decryption

F. DoS Protection
£11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
jessyqueen

Get to know the seller

Seller avatar
jessyqueen London School of Economics
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
805
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions