PCNSA Flash Cards verified answers 2023 (UPDATED)PCNSA Flash Cards verified answers 2023
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? (Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party applicat...
PCNSA Flash Cards verified answers 2023
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? (Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party application access
D. securing the cloud
E. securing the internet of things - correct answer ABD
2. What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.)
A. Cortex DynamicDNS
B. Wildfire
C. Cortex XDR
D. OpenConnect
E. Prisma Access
F. Autofocus - correct answer BCEF
3. Which cloud-delivered security service provides instant access to community-based threat data?
A. Prisma Saas
B. Autofocus
C. Unit 42
D. Cortex XOR - correct answer B
4. Which cloud-delivered security service provides security and connectivity for branches and mobile users?
A. Cortex XSOAR
B. Cortex XOR
C. AutoFocus
D. Prisma Access - correct answer D
5. Which Palo Alto Networks Cybersecurity Portfolio product provides access to applications from Palo Alto Networks, third parties, and customers?
A. WildFire
B. Cortex Data Lake
C. Network Security
D. Prisma Access - correct answer B
6. Which Palo Alto Networks firewall feature provides all the following abilities? • Stops malware, exploits, and ransomware before they can compromise endpoints
• Provides protection while endpoints are online and offline, on network and off
• Coordinates enforcement with network and cloud security to prevent successful attacks
• Detects threats and automates containment to minimize impact
• Creates zero-day malware signatures with cloud-based threat analysis
• Integrates with Palo Alto Networks Cortex Data Lake
A. Cortex XDR
B. Prisma Saas
C. WildFire
D. AutoFocus - correct answer A
7. Which three management features does the Control Plane provide? (Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing - correct answer BCD
8. Which three data processing features does the data plane provide? (Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing - correct answer AEF
9. What are three components of the Network Processing module? (Choose three.)
A. QoS
B. NAT
C. App-ID
D. flow control
E. URL match
F. spyware - correct answer ABD
10. Which approach most accurately defines the Palo Alto Networks SP3 architecture?
A. prioritize first
B. sequential processing
C. scan it all, scan it once
D. Zero Trust segmentation platform - correct answer C
11. What is the result of using a stream-based architectural design?
A. superior performance
B. increased latency C. detailed logging
D. increased functionality - correct answer A
12. Which security model does Palo Alto Networks recommend that you deploy?
A. separation-of-trust
B. Zero Trust
C. trust-then-verify
D. never trust - correct answer B
13. The Zero Trust model is implemented to specifically inspect which type of traffic?
A. east-west
B. north-south
C. left-right
D. up-down - correct answer A
14. What are the three main concepts of Zero Trust? (Choose three.)
A. All resources are accessed in a secure manner, regardless of location.
B. Access control is on a "need-to-know" basis and is strictly enforced.
C. Credentials need to be verified.
D. All traffic is logged and inspected.
E. Internal users are trusted implicitly .
F. External users are trusted explicit ly. - correct answer ABD
15. Which two statements are true about the Zero Trust model? (Choose two.)
A. Traffic is inspected laterally.
B. Traffic is inspected east-west.
C. Internal traffic is implicitly trusted.
D. External traffic is implicitly trusted. - correct answer AB
16. Which three Palo Alto Networks products secure your network? (Choose three.)
A. MineMerge
B. Prisma Saas
C. URL filtering D. Containers
E. TrapContent
F. Wildfire - correct answer BCF
Page 33
17. True or false: Blockage of just one stage in the cyberattack lifecycle will protect a company's network from attack.
A. true
B. false - correct answer A
18. What are two stages of the cyberattack lifecycle? (Choose two.)
A. weaponization and delivery
B. manipulation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Carzola98. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.