PCNSA Study Questions and answers 2023- Latest solutio n
pack Pass 90%
Which two actions are available for antivirus security profiles? (Choose two.)
A. continues
B. allow
C. block IP
D. alert
B. allow
D. alert
Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.)
A. User‐Agent
B. Safe Search
C. URL redirection
D. X‐Forward‐For
A. User‐Agent
D. X‐Forward‐For
What are the two components of Denial‐of‐Service Protection? (Choose two.)
A. zone protection profile
B. DoS protection profile and policy rules
C. flood protection
D. reconnaissance protection
A. zone protection profile
B. DoS protection profile and policy rules
Which two types of attacks does the PAN‐DB prevent? (Choose two.)
A. phishing sites
B. HTTP based command‐and‐control
C. infected JavaScript
D. flood attacks
A. phishing sites
B. HTTP based command‐and‐control
Which two valid URLs can be used in a custom URL category? (Choose two.)
A. ww.youtube.**
B. www.**.com
C. www.youtube.com
D. *.youtube.com
,C. www.youtube.com
D. *.youtube.com
What are three methods of mapping usernames to IP addresses? (Choose three.)
A. Server Monitoring
B. Traps
C. Minemeld
D. syslog
E. AutoFocus
F. port mapping
A. Server Monitoring
D. syslog
F. port mapping
Which type of server profile is used to create group mappings?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
D. LDAP
The Server Monitoring user mapping method can monitor which three types of
servers? (Choose three.)
A. RADIUS
B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers
B. Microsoft Domain Controllers
C. Exchange Servers
D. Novell eDirectory Servers
The Port Mapping user mapping method can monitor which two types of
environments? (Choose two.)
A. Citrix
B. Microsoft terminal servers
C. Exchange Servers
D. Linux servers
A. Citrix
B. Microsoft terminal servers
, The Windows User‐ID Agent can be installed on which two operating systems?
(Choose two.)
A. Linux
B. Server 2016
C. XP
D. Server 2008
B. Server 2016
D. Server 2008
A Heatmap provides an adoption rate for which three features? (Choose three.)
A. WildFire
B. Traps
C. File Blocking
D. User‐ID
E. SSL certificates
F. authentication profiles
A. WildFire
C. File Blocking
D. User‐ID
What are three Best Practice Assessment tool primary categories? (Choose
three.)
A. User‐ID
B. Logging
C. Vulnerability Protection
D. Security
E. Decryption
F. DoS Protection
D. Security
E. Decryption
F. DoS Protection
Which two security features normally do not achieve an adoption rate of 100%?
(Choose two.)
A. URL Filtering
B. App‐ID
C. Logging
D. DNS Sinkhole
D. DNS Sinkhole
A. URL Filtering
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller kishe. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R244,58. You're not tied to anything after your purchase.