PCNSA FINAL EXAM QUESTIONS WITH
CORRECT ANSWERS
Which |two |actions |are |available |for |antivirus |security |profiles? |(Choose |two.)
A. |continue
B. |allow
C. |block |IP
D. |alert |- |ANSWER B. |allow
D. |alert
Which |two |HTTP |Header |Logging |options |are |within |a |URL |filtering |profile? |(Choose |two.)
A. |User‐Agent
B. |Safe |Search
C. |URL |redirection
D. |X‐Forward‐For |- |ANSWER A. |User‐Agent
D. |X‐Forward‐For
What |are |the |two |components |of |Denial‐of‐Service |Protection? |(Choose |two.)
A. |zone |protection |profile
B. |DoS |protection |profile |and |policy |rules
C. |flood |protection
D. |reconnaissance |protection |- |ANSWER A. |zone |protection |profile
B. |DoS |protection |profile |and |policy |rules
Which |two |types |of |attacks |does |the |PAN‐DB |prevent? |(Choose |two.)
A. |phishing |sites
B. |HTTP |based |command‐and‐control
C. |infected |JavaScript
,D. |flood |attacks |- |ANSWER A. |phishing |sites
B. |HTTP |based |command‐and‐control
What |are |three |methods |of |mapping |usernames |to |IP |addresses? |(Choose |three.)
A. Server |Monitoring
B. Traps
C. Minemeld
D. syslog
E. AutoFocus
F. port |mapping |- |ANSWER A. |Server |Monitoring
D. |syslog
F. |port |mapping
Which |type |of |server |profile |is |used |to |create |group |mappings?
A. |RADIUS
B. |TACACS+
C. |Kerberos
D. |LDAP |- |ANSWER D. |LDAP
The |Server |Monitoring |user |mapping |method |can |monitor |which |three |types |of
servers? |(Choose |three.)
|
A. |RADIUS
B. |Microsoft |Domain |Controllers
C. |Exchange |Servers
D. |Novell |eDirectory |Servers |- |ANSWER B. |Microsoft |Domain |Controllers
C. |Exchange |Servers
D. |Novell |eDirectory |Servers
The |Port |Mapping |user |mapping |method |can |monitor |which |two |types |of
,environments? |(Choose |two.)
A. |Citrix
B. |Microsoft |terminal |servers
C. |Exchange |Servers
D. |Linux |servers |- |ANSWER A. |Citrix
B. |Microsoft |terminal |servers
The |Windows |User‐ID |Agent |can |be |installed |on |which |two |operating |systems?
(Choose |two.)
|
A. |Linux
B. |Server |2016
C. |XP
D. |Server |2008 |- |ANSWER B. |Server |2016
D. |Server |2008
A |Heatmap |provides |an |adoption |rate |for |which |three |features? |(Choose |three.)
A. WildFire
B. Traps
C. File |Blocking
D. User‐ID
E. SSL |certificates
F. authentication |profiles |- |ANSWER A. |WildFire
C. |File |Blocking
D. |User‐ID
What |are |three |Best |Practice |Assessment |tool |primary |categories? |(Choose |three.)
A. User‐ID
, B. Logging
C. Vulnerability |Protection
D. Security
E. Decryption
F. DoS |Protection |- |ANSWER D. |Security
E. |Decryption
F. |DoS |Protection
Which |two |security |features |normally |do |not |achieve |an |adoption |rate |of |100%?
(Choose |two.)
|
A. |URL |Filtering
B. |App‐ID
C. |Logging
D. |DNS |Sinkhole |- |ANSWER D. |DNS |Sinkhole
A. URL |Filtering
Which |type |of |file |is |used |to |generate |the |Heatmap |report |and |the |BPA |report?
A. |Technical |Support
B. |Configuration
C. |Statistics
D. |XML |- |ANSWER A. |Technical |Support
What |are |two |components |of |the |BPA |tool? |(Choose |two.)
A. |Security |Policy |Adoption |Heatmap
B. |BPA
C. |XML
D. |Security |Policy |- |ANSWER A. |Security |Policy |Adoption |Heatmap
B. BPA
CORRECT ANSWERS
Which |two |actions |are |available |for |antivirus |security |profiles? |(Choose |two.)
A. |continue
B. |allow
C. |block |IP
D. |alert |- |ANSWER B. |allow
D. |alert
Which |two |HTTP |Header |Logging |options |are |within |a |URL |filtering |profile? |(Choose |two.)
A. |User‐Agent
B. |Safe |Search
C. |URL |redirection
D. |X‐Forward‐For |- |ANSWER A. |User‐Agent
D. |X‐Forward‐For
What |are |the |two |components |of |Denial‐of‐Service |Protection? |(Choose |two.)
A. |zone |protection |profile
B. |DoS |protection |profile |and |policy |rules
C. |flood |protection
D. |reconnaissance |protection |- |ANSWER A. |zone |protection |profile
B. |DoS |protection |profile |and |policy |rules
Which |two |types |of |attacks |does |the |PAN‐DB |prevent? |(Choose |two.)
A. |phishing |sites
B. |HTTP |based |command‐and‐control
C. |infected |JavaScript
,D. |flood |attacks |- |ANSWER A. |phishing |sites
B. |HTTP |based |command‐and‐control
What |are |three |methods |of |mapping |usernames |to |IP |addresses? |(Choose |three.)
A. Server |Monitoring
B. Traps
C. Minemeld
D. syslog
E. AutoFocus
F. port |mapping |- |ANSWER A. |Server |Monitoring
D. |syslog
F. |port |mapping
Which |type |of |server |profile |is |used |to |create |group |mappings?
A. |RADIUS
B. |TACACS+
C. |Kerberos
D. |LDAP |- |ANSWER D. |LDAP
The |Server |Monitoring |user |mapping |method |can |monitor |which |three |types |of
servers? |(Choose |three.)
|
A. |RADIUS
B. |Microsoft |Domain |Controllers
C. |Exchange |Servers
D. |Novell |eDirectory |Servers |- |ANSWER B. |Microsoft |Domain |Controllers
C. |Exchange |Servers
D. |Novell |eDirectory |Servers
The |Port |Mapping |user |mapping |method |can |monitor |which |two |types |of
,environments? |(Choose |two.)
A. |Citrix
B. |Microsoft |terminal |servers
C. |Exchange |Servers
D. |Linux |servers |- |ANSWER A. |Citrix
B. |Microsoft |terminal |servers
The |Windows |User‐ID |Agent |can |be |installed |on |which |two |operating |systems?
(Choose |two.)
|
A. |Linux
B. |Server |2016
C. |XP
D. |Server |2008 |- |ANSWER B. |Server |2016
D. |Server |2008
A |Heatmap |provides |an |adoption |rate |for |which |three |features? |(Choose |three.)
A. WildFire
B. Traps
C. File |Blocking
D. User‐ID
E. SSL |certificates
F. authentication |profiles |- |ANSWER A. |WildFire
C. |File |Blocking
D. |User‐ID
What |are |three |Best |Practice |Assessment |tool |primary |categories? |(Choose |three.)
A. User‐ID
, B. Logging
C. Vulnerability |Protection
D. Security
E. Decryption
F. DoS |Protection |- |ANSWER D. |Security
E. |Decryption
F. |DoS |Protection
Which |two |security |features |normally |do |not |achieve |an |adoption |rate |of |100%?
(Choose |two.)
|
A. |URL |Filtering
B. |App‐ID
C. |Logging
D. |DNS |Sinkhole |- |ANSWER D. |DNS |Sinkhole
A. URL |Filtering
Which |type |of |file |is |used |to |generate |the |Heatmap |report |and |the |BPA |report?
A. |Technical |Support
B. |Configuration
C. |Statistics
D. |XML |- |ANSWER A. |Technical |Support
What |are |two |components |of |the |BPA |tool? |(Choose |two.)
A. |Security |Policy |Adoption |Heatmap
B. |BPA
C. |XML
D. |Security |Policy |- |ANSWER A. |Security |Policy |Adoption |Heatmap
B. BPA