AQA • PCNSA
Latest uploads for PCNSA at AQA. Looking for PCNSA notes at AQA? We have lots of notes, study guides and study notes available for PCNSA at AQA.
-
23
- 0
-
1
Courses PCNSA at AQA
Notes available for the following courses of PCNSA at AQA
-
PCNSA 23
Latest notes & summaries AQA • PCNSA
Which two actions are available for antivirus security profiles? (Choose two.) 
A. continue 
B. allow 
C. block IP 
D. alert - B. allow 
D. alert 
Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) 
A. User‐Agent 
B. Safe Search 
C. URL redirection 
D. X‐Forward‐For - A. User‐Agent 
D. X‐Forward‐For 
What are the two components of Denial‐of‐Service Protection? (Choose two.) 
A. zone protection profile 
B. DoS protection profile and policy rule...
- Exam (elaborations)
- • 39 pages's •
-
AQA•PCNSA
Preview 4 out of 39 pages
Which two actions are available for antivirus security profiles? (Choose two.) 
A. continue 
B. allow 
C. block IP 
D. alert - B. allow 
D. alert 
Which two HTTP Header Logging options are within a URL filtering profile? (Choose two.) 
A. User‐Agent 
B. Safe Search 
C. URL redirection 
D. X‐Forward‐For - A. User‐Agent 
D. X‐Forward‐For 
What are the two components of Denial‐of‐Service Protection? (Choose two.) 
A. zone protection profile 
B. DoS protection profile and policy rule...
security zone - group networks that contain particular types of traffic that are contained within 
defined security classifications 
Intrazone traffic - allows traffic to flow between interfaces that exist in the same zone 
Interzone traffic - denies traffic from flowing between interfaces that exist in different zones 
Security policy rules - are applied to zones (not interfaces) to allow or deny traffic, apply QoS, 
perform NAT, apply security profiles, or set logging parameters. 
primary zone...
- Package deal
- Exam (elaborations)
- • 8 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 2 out of 8 pages
security zone - group networks that contain particular types of traffic that are contained within 
defined security classifications 
Intrazone traffic - allows traffic to flow between interfaces that exist in the same zone 
Interzone traffic - denies traffic from flowing between interfaces that exist in different zones 
Security policy rules - are applied to zones (not interfaces) to allow or deny traffic, apply QoS, 
perform NAT, apply security profiles, or set logging parameters. 
primary zone...
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by 
inspecting traffic deployment as internet gateways? - Global Protect 
Which statement is true regarding a Prevention Posture Assessment? - It provides a set of 
questionnaires that help uncover security risk prevention gaps across all areas of network and security 
architecture. 
Which fiver Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated 
approach to preve...
- Package deal
- Exam (elaborations)
- • 3 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 1 out of 3 pages
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by 
inspecting traffic deployment as internet gateways? - Global Protect 
Which statement is true regarding a Prevention Posture Assessment? - It provides a set of 
questionnaires that help uncover security risk prevention gaps across all areas of network and security 
architecture. 
Which fiver Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated 
approach to preve...
Palo Alto Networks Security Operating Platform Components - Network Security 
Advanced Endpoint Protection 
Cloud Security 
Cloud-Delivered Security Services 
Application Framework and Logging Service 
Palo Alto Networks Apps, Third-Party Apps and Customer Apps 
Next Gen Firewall Availability - Physical appliances 
Virtualized appliances 
Cloud-delivered services/GlobalProtect 
Detection - Detect known and unknown attacks 
Attacks in encrypted traffic 
Use intelligence from customer deployments ...
- Package deal
- Exam (elaborations)
- • 2 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 1 out of 2 pages
Palo Alto Networks Security Operating Platform Components - Network Security 
Advanced Endpoint Protection 
Cloud Security 
Cloud-Delivered Security Services 
Application Framework and Logging Service 
Palo Alto Networks Apps, Third-Party Apps and Customer Apps 
Next Gen Firewall Availability - Physical appliances 
Virtualized appliances 
Cloud-delivered services/GlobalProtect 
Detection - Detect known and unknown attacks 
Attacks in encrypted traffic 
Use intelligence from customer deployments ...
Palo Alto Networks Security Operating Platform Components - Network Security 
Advanced Endpoint Protection 
Cloud Security 
Cloud-Delivered Security Services 
Application Framework and Logging Service 
Palo Alto Networks Apps, Third-Party Apps and Customer Apps 
Next Gen Firewall Availability - Physical appliances 
Virtualized appliances 
Cloud-delivered services/GlobalProtect 
Detection - Detect known and unknown attacks 
Attacks in encrypted traffic 
Use intelligence from customer deployments ...
- Package deal
- Exam (elaborations)
- • 2 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 1 out of 2 pages
Palo Alto Networks Security Operating Platform Components - Network Security 
Advanced Endpoint Protection 
Cloud Security 
Cloud-Delivered Security Services 
Application Framework and Logging Service 
Palo Alto Networks Apps, Third-Party Apps and Customer Apps 
Next Gen Firewall Availability - Physical appliances 
Virtualized appliances 
Cloud-delivered services/GlobalProtect 
Detection - Detect known and unknown attacks 
Attacks in encrypted traffic 
Use intelligence from customer deployments ...
The Palo Alto Networks Security Operating Platform is designed for which three purposes? (Choose 
three.) 
A. consume innovations quickly 
B. ensure compliance 
C. focus on what matters 
D. prevent successful cyberattacks - A. consume innovations quickly 
C. focus on what matters 
D. prevent successful cyberattacks 
Which item is not one of the six primary components of the Palo Alto Networks Security Operating 
Platform 
A. Applications (Palo Alto Networks apps, third-party apps, customer apps)...
- Package deal
- Exam (elaborations)
- • 7 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 2 out of 7 pages
The Palo Alto Networks Security Operating Platform is designed for which three purposes? (Choose 
three.) 
A. consume innovations quickly 
B. ensure compliance 
C. focus on what matters 
D. prevent successful cyberattacks - A. consume innovations quickly 
C. focus on what matters 
D. prevent successful cyberattacks 
Which item is not one of the six primary components of the Palo Alto Networks Security Operating 
Platform 
A. Applications (Palo Alto Networks apps, third-party apps, customer apps)...
What will be the result of one or more occurrences of shadowing? - A warning 
Which column in the Applications and Threats screen includes the options Review Apps and Review 
Policies? - Action 
Which link can you select in the web interface to minimize the risk of installing new App-ID updates? - 
Disable new apps in content update. 
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose 
two.) - Web-browsing 
SSL 
What are the two default (predefined...
- Package deal
- Exam (elaborations)
- • 2 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 1 out of 2 pages
What will be the result of one or more occurrences of shadowing? - A warning 
Which column in the Applications and Threats screen includes the options Review Apps and Review 
Policies? - Action 
Which link can you select in the web interface to minimize the risk of installing new App-ID updates? - 
Disable new apps in content update. 
Which two protocols are implicitly allowed when you select the facebook-base application? (Choose 
two.) - Web-browsing 
SSL 
What are the two default (predefined...
Recently changes were made to the firewall to optimize the policies and the security team wants to see 
if those changes are helping. What is the quickest way to reset the hit counter to zero in all the security 
policy rules? 
A. At the CLI enter the command reset rules and press Enter 
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule 
C. Reboot the firewall 
D. Use the Reset Rule Hit Counter>All Rules option - D. Use the Reset Rule Hit Counter > Al...
- Package deal
- Exam (elaborations)
- • 18 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 3 out of 18 pages
Recently changes were made to the firewall to optimize the policies and the security team wants to see 
if those changes are helping. What is the quickest way to reset the hit counter to zero in all the security 
policy rules? 
A. At the CLI enter the command reset rules and press Enter 
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule 
C. Reboot the firewall 
D. Use the Reset Rule Hit Counter>All Rules option - D. Use the Reset Rule Hit Counter > Al...
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
- Package deal
- Exam (elaborations)
- • 13 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 2 out of 13 pages
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...
- Package deal
- Exam (elaborations)
- • 13 pages's •
-
AQA•PCNSA
-
PCNSA Exam• By jessyqueen
Preview 2 out of 13 pages
Default Antivirus Profile protocols - -smtp 
-smb 
-ftp 
-imap 
-pop3 
-http/2 
Antivirus profile actions - -allow 
-allert (Default) 
-drop 
-reset client 
-reset server 
-reset both 
Rule Usage tab in Security Policy Rule displays the rule's usage, what four important information you will 
find in Rule Usage tab? - -Basics 
-Applications 
-Activity 
-Traffic 
A Virtual Wire object is capable of blocking or allowing traffic based on? - 802.1Q VLAN tag values 
When new applications are added to...