Jessypeace
Sur cette page, vous trouverez tous les documents, offres groupées et cartes mémoire flash proposés par le vendeur Jessypeace.
- 899
- 0
- 10
Community
- Abonnés
- Abbonements
909 éléments
PCNSA EXAMS 100% PASSED
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
- Examen
- • 13 pages •
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
PCNSA EXAMS ALREADY PASSED
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values
- Examen
- • 13 pages •
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values
Pcnsa EXAMS GRADED A+
VM-Series firewalls starting with PAN-OS version 8.0, the MGT port is configured with? - IP address 
DHCP 
What configuration is the actual configuration which controls the firewall operation? 
Service 
XML 
Candidate 
Running - Running 
A network engineer clicks "Save candidate configuration" to save the configuration to memory to finish 
the configuration later. 
After the engineer continues editing and click "Save candidate configuration" again, the 
configuration that is saved in memory ...
- Examen
- • 38 pages •
VM-Series firewalls starting with PAN-OS version 8.0, the MGT port is configured with? - IP address 
DHCP 
What configuration is the actual configuration which controls the firewall operation? 
Service 
XML 
Candidate 
Running - Running 
A network engineer clicks "Save candidate configuration" to save the configuration to memory to finish 
the configuration later. 
After the engineer continues editing and click "Save candidate configuration" again, the 
configuration that is saved in memory ...
PCNSA Flash Cards
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? 
(Choose three.) 
A. securing operations response 
B. securing the enterprise 
C. securing third-party application access 
D. securing the cloud 
E. securing the internet of things - ABD 
2. What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) 
A. Cortex DynamicDNS 
B. Wildfire 
C. Cortex XDR 
D. OpenConnect 
E. Prisma Access 
F. Autofocus - BCEF 
3. Which cloud-...
- Examen
- • 31 pages •
1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? 
(Choose three.) 
A. securing operations response 
B. securing the enterprise 
C. securing third-party application access 
D. securing the cloud 
E. securing the internet of things - ABD 
2. What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) 
A. Cortex DynamicDNS 
B. Wildfire 
C. Cortex XDR 
D. OpenConnect 
E. Prisma Access 
F. Autofocus - BCEF 
3. Which cloud-...
PCNSA Personal
What is an "application shift?" 
1. an application change during the lifetime of a session 
2. a session change during the lifetime of an application 
3. a packet change during the lifetime of a session 
4. application dependency - an application change during the lifetime of a session 
What is the default metric value of static routes? 
+1 
1 
2 
10 
20 - 10 
How often are new antivirus signatures published? 
hourly 
weekly 
daily 
monthly - Daily 
Which interface type can be used to switch t...
- Examen
- • 42 pages •
What is an "application shift?" 
1. an application change during the lifetime of a session 
2. a session change during the lifetime of an application 
3. a packet change during the lifetime of a session 
4. application dependency - an application change during the lifetime of a session 
What is the default metric value of static routes? 
+1 
1 
2 
10 
20 - 10 
How often are new antivirus signatures published? 
hourly 
weekly 
daily 
monthly - Daily 
Which interface type can be used to switch t...
PCNSA QUESTIONS WITH CERTIFIED ANSWERS 100% PASSED
Palo Alto NGFWs enable you to adopt security best practices to minimize opportunities for attack by 
using the following *three* policy types... - Application, User, and Content based policies. 
T/F: 
Palo Alto NGFWs allow you to automate workflows via integration with administrative tools such as 
ticketing services, or any system with a RESTful API. - True 
What are the *three* families of Palo Alto NGFWs? - 1) VM Series 
2) Prisma Access (Cloud Firewall SaaS) 
3) Physical Firewalls 
Name at l...
- Examen
- • 27 pages •
Palo Alto NGFWs enable you to adopt security best practices to minimize opportunities for attack by 
using the following *three* policy types... - Application, User, and Content based policies. 
T/F: 
Palo Alto NGFWs allow you to automate workflows via integration with administrative tools such as 
ticketing services, or any system with a RESTful API. - True 
What are the *three* families of Palo Alto NGFWs? - 1) VM Series 
2) Prisma Access (Cloud Firewall SaaS) 
3) Physical Firewalls 
Name at l...
PCNSA Questions 2
The control plane provides which two managment feature of the firewall? - reporting 
firewall configuration 
A virtual wire interface that receives a frame or packet ignores any Layer 2 or layer 3 addresses for 
switching or routing purposes? - True 
how often are new anti-virus signatures published? - daily 
what does palo alto networks use to regularly post updates for application detection, threat protection, 
and GlobalProtect data files? - dynamic updates 
which layer 2 interfaces used to s...
- Examen
- • 5 pages •
The control plane provides which two managment feature of the firewall? - reporting 
firewall configuration 
A virtual wire interface that receives a frame or packet ignores any Layer 2 or layer 3 addresses for 
switching or routing purposes? - True 
how often are new anti-virus signatures published? - daily 
what does palo alto networks use to regularly post updates for application detection, threat protection, 
and GlobalProtect data files? - dynamic updates 
which layer 2 interfaces used to s...
PCNSA QUESTIONS AND ANSWER 100% PASSED
Threat Intelligence Cloud - Identifies and inspects all traffic to block known threats. 
Next Generation Firewall - Gathers, analyzes, correlates, and disseminates threats to and from 
network endpoints 
Advanced Endpoint Detection - Inspects processes and files to prevent known and unknown 
exploits 
Which firewall plane provides configuration, logging, and reporting functions on a separate processor? 
A. control 
B. network processing 
C. data 
D. security processing - A. Control 
A security a...
- Examen
- • 16 pages •
Threat Intelligence Cloud - Identifies and inspects all traffic to block known threats. 
Next Generation Firewall - Gathers, analyzes, correlates, and disseminates threats to and from 
network endpoints 
Advanced Endpoint Detection - Inspects processes and files to prevent known and unknown 
exploits 
Which firewall plane provides configuration, logging, and reporting functions on a separate processor? 
A. control 
B. network processing 
C. data 
D. security processing - A. Control 
A security a...
PCNSA QUESTIONS AND ANSWERS RATED A+
What are two firewall management methods? - CLI 
XML API 
Which two devices are used to connect a computer to the firewall for management purposes? - 
Serial cable 
RJ-45 Ethernet cable 
What is the default IP address assigned to the MGT interfaces of a Palo Alto Networks firewall? - 
192.168.1.1 
What are the two default services that are available on the MGT interface? - HTTPS 
SSH 
True or false? Service route traffic has Security policy rules applied against it - True 
Service routes may b...
- Examen
- • 8 pages •
What are two firewall management methods? - CLI 
XML API 
Which two devices are used to connect a computer to the firewall for management purposes? - 
Serial cable 
RJ-45 Ethernet cable 
What is the default IP address assigned to the MGT interfaces of a Palo Alto Networks firewall? - 
192.168.1.1 
What are the two default services that are available on the MGT interface? - HTTPS 
SSH 
True or false? Service route traffic has Security policy rules applied against it - True 
Service routes may b...
PCNSA EXAMS 100% PASSED
Content-ID feature - includes a threat prevention engine and policies to inspect and control content 
traversing the firewall 
Security Profiles - objects that are added to security policy rules configured with an action of 
"allow"... represent additional security checks to be performed on allowed network traffic 
Antivirus Profile - Detects infected files being transferred with the application 
Anti-spyware profile - detects spyware downloads and traffic from already installed spyware 
Vulne...
- Examen
- • 5 pages •
Content-ID feature - includes a threat prevention engine and policies to inspect and control content 
traversing the firewall 
Security Profiles - objects that are added to security policy rules configured with an action of 
"allow"... represent additional security checks to be performed on allowed network traffic 
Antivirus Profile - Detects infected files being transferred with the application 
Anti-spyware profile - detects spyware downloads and traffic from already installed spyware 
Vulne...