1
PCNSA Questions and Correct Answers
Question: 1. The Palo Alto Networks Cybersecurity Portfolio focuses on
which three principle technologies? (Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party application access
D. securing the cloud
E. securing the internet of things
Answer: ABD
Question: 2. What are four components of the Palo Alto Networks
Cybersecurity Portfolio? (Choose four.)
A. Cortex DynamicDNS
B. Wildfire
C. Cortex XDR
D. OpenConnect
E. Prisma Access
F. Autofocus
Answer: BCEF
Question: 3. Which cloud-delivered security service provides instant
access to community-based threat data?
A. Prisma Saas
B. Autofocus
C. Unit 42
D. Cortex XOR
Answer: B
Pretest - Stuvia US
,2
Question: 4. Which cloud-delivered security service provides security
and connectivity for branches and mobile users?
A. Cortex XSOAR
B. Cortex XOR
C. AutoFocus
D. Prisma Access
Answer: D
Question: 5. Which Palo Alto Networks Cybersecurity Portfolio product
provides access to applications from Palo Alto Networks, third parties, and
customers?
A. WildFire
B. Cortex Data Lake
C. Network Security
D. Prisma Access
Answer: B
Question: 6. Which Palo Alto Networks firewall feature provides all the
following abilities?
• Stops malware, exploits, and ransomware before they can compromise
endpoints
• Provides protection while endpoints are online and offline, on network
and off
• Coordinates enforcement with network and cloud security to prevent
successful attacks
• Detects threats and automates containment to minimize impact
• Creates zero-day malware signatures with cloud-based threat analysis
• Integrates with Palo Alto Networks Cortex Data Lake
A. Cortex XDR
B. Prisma Saas
C. WildFire
D. AutoFocus
Pretest - Stuvia US
,3
Answer: A
Question: 7. Which three management features does the Control Plane
provide? (Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing
Answer: BCD
Question: 8. Which three data processing features does the data plane
provide? (Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing
Answer: AEF
Question: 9. What are three components of the Network Processing
module? (Choose three.)
A. QoS
B. NAT
C. App-ID
D. flow control
E. URL match
F. spyware
Answer: ABD
Pretest - Stuvia US
, 4
Question: 10. Which approach most accurately defines the Palo Alto
Networks SP3 architecture?
A. prioritize first
B. sequential processing
C. scan it all, scan it once
D. Zero Trust segmentation platform
Answer: C
Question: 11. What is the result of using a stream-based architectural
design?
A. superior performance
B. increased latency
C. detailed logging
D. increased functionality
Answer: A
Question: 12. Which security model does Palo Alto Networks
recommend that you deploy?
A. separation-of-trust
B. Zero Trust
C. trust-then-verify
D. never trust
Answer: B
Question: 13. The Zero Trust model is implemented to specifically
inspect which type of traffic?
A. east-west
B. north-south
C. left-right
D. up-down
Answer: A
Pretest - Stuvia US
PCNSA Questions and Correct Answers
Question: 1. The Palo Alto Networks Cybersecurity Portfolio focuses on
which three principle technologies? (Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party application access
D. securing the cloud
E. securing the internet of things
Answer: ABD
Question: 2. What are four components of the Palo Alto Networks
Cybersecurity Portfolio? (Choose four.)
A. Cortex DynamicDNS
B. Wildfire
C. Cortex XDR
D. OpenConnect
E. Prisma Access
F. Autofocus
Answer: BCEF
Question: 3. Which cloud-delivered security service provides instant
access to community-based threat data?
A. Prisma Saas
B. Autofocus
C. Unit 42
D. Cortex XOR
Answer: B
Pretest - Stuvia US
,2
Question: 4. Which cloud-delivered security service provides security
and connectivity for branches and mobile users?
A. Cortex XSOAR
B. Cortex XOR
C. AutoFocus
D. Prisma Access
Answer: D
Question: 5. Which Palo Alto Networks Cybersecurity Portfolio product
provides access to applications from Palo Alto Networks, third parties, and
customers?
A. WildFire
B. Cortex Data Lake
C. Network Security
D. Prisma Access
Answer: B
Question: 6. Which Palo Alto Networks firewall feature provides all the
following abilities?
• Stops malware, exploits, and ransomware before they can compromise
endpoints
• Provides protection while endpoints are online and offline, on network
and off
• Coordinates enforcement with network and cloud security to prevent
successful attacks
• Detects threats and automates containment to minimize impact
• Creates zero-day malware signatures with cloud-based threat analysis
• Integrates with Palo Alto Networks Cortex Data Lake
A. Cortex XDR
B. Prisma Saas
C. WildFire
D. AutoFocus
Pretest - Stuvia US
,3
Answer: A
Question: 7. Which three management features does the Control Plane
provide? (Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing
Answer: BCD
Question: 8. Which three data processing features does the data plane
provide? (Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing
Answer: AEF
Question: 9. What are three components of the Network Processing
module? (Choose three.)
A. QoS
B. NAT
C. App-ID
D. flow control
E. URL match
F. spyware
Answer: ABD
Pretest - Stuvia US
, 4
Question: 10. Which approach most accurately defines the Palo Alto
Networks SP3 architecture?
A. prioritize first
B. sequential processing
C. scan it all, scan it once
D. Zero Trust segmentation platform
Answer: C
Question: 11. What is the result of using a stream-based architectural
design?
A. superior performance
B. increased latency
C. detailed logging
D. increased functionality
Answer: A
Question: 12. Which security model does Palo Alto Networks
recommend that you deploy?
A. separation-of-trust
B. Zero Trust
C. trust-then-verify
D. never trust
Answer: B
Question: 13. The Zero Trust model is implemented to specifically
inspect which type of traffic?
A. east-west
B. north-south
C. left-right
D. up-down
Answer: A
Pretest - Stuvia US