Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Paloalto Networks PCNSC Palo Alto Networks Certified Network Security Consultant Exam Practice Test

Page: 1 / 8
Total 75 questions

Palo Alto Networks Certified Network Security Consultant Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What should an administrator consider when planning to revert Panorama to a pre-PAN-OS 8.1 version?

Options:

A.

When Panorama is reverted to an earlier PAN-OS release, variable used in template stacks will be removed authentically.

B.

Panorama cannot be reverted to an earlier PAN-OS release if variables are used in templates or stacks.

C.

An administrator must use the Expedition tool to adapt the configuration to the pre-pan-OS 8.1 state.

D.

Administrators need to manually update variable characters to those to used in pre-PAN-OS 8.1.

Question 2

An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 3

If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will be detected as credential theft?

Options:

A.

Using the name user's corporate username and password.

B.

First four lettersof the username matching any valid corporate username.

C.

Matching any valid corporate username.

D.

Mapping to the IP address of the logged-in user.

Question 4

An administrator pushes a new configuration from panorama to a pair of firewalls that are configured as active/passive HA pair.

Which NGFW receives the configuration from panorama?

Options:

A.

the active firewall, which then synchronizes to the passive firewall

B.

the passive firewall, which then synchronizes to the active firewall

C.

both the active and passive firewalls independently, with no synchronization afterward

D.

both the active and passive firewalls, which then synchronizes with each other

Question 5

Which option would an administration choose to define the certificate and protect that Panorama and its managed devices uses for SSL/ITS services?

Options:

A.

Set Up SSL/TLS under Policies > Service/URL Category > Service.

B.

Configure on SSL/TLS Profile.

C.

Configure a Decryption Profile and select SSL/TLS services.

D.

Set up Security policy rule to allow SSL communication.

Question 6

A Palo Alto Networks NGFW just submitted a file lo WildFire tor analysis Assume a 5-minute window for analysis. The firewall is configured to check for verdicts every 5 minutes.

How quickly will the firewall receive back a verdict?

Options:

A.

10 to 15 minutes

B.

5 to 10 minutes

C.

More than 15 minutes

D.

5 minutes

Question 7

An administrator is using Panorama and multiple Palo Alto NetworksNGFWs. After upgrading all devices to the latest PAN-OSĀ® software, the administrator enables logs forwarding from the firewalls to panorama Pre-existing logs from the firewall are not appearing in Panorama.

Which action would enables the firewalls to sendtheir preexisting logs to Panorama?

Options:

A.

A CLI command will forward the pre-existing logs to Panorama.

B.

Use the import option to pull logs panorama.

C.

Use the ACC to consolidate pre-existing logs.

D.

The- log database will need to be exported from thefirewall and manually imported into Panorama.

Question 8

An administrator using an enterprise PKI needs to establish a unique chain of trust to ensure mutual authentication between panorama and the managed firewall and Log Collectors. How would the administrator establish the chain of trust?

Options:

A.

Configure strong password

B.

Set up multiple-factor authentication.

C.

Use custom certificates.

D.

Enable LDAP or RADIUS integration.

Question 9

Which virtual router feature determines if a specific destination IP address is reachable'?

Options:

A.

Ping-Path

B.

Path Monitoring

C.

Failover

D.

Heartbeat Monitoring

Question 10

When is the content inspection performed in the packet flowprocess?

Options:

A.

after the SSL Proxy re-encrypts the packet

B.

before the packet forwarding process

C.

after the application has been identified

D.

before session lookup

Question 11

An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port. Which log entry can the administrator use to verify that sessions are being decrypted?

Options:

A.

Decryption tag

B.

In the details of the Threat log entries

C.

In the details of the Traffic log entries

D.

Data filtering log

Page: 1 / 8
Total 75 questions