Palo Alto Networks PCNSA Palo Alto Networks Certified Network Security Administrator Exam Practice Test

Page: 1 / 14
Total 362 questions
Question 1

Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?



Answer : B

The Policy Optimizer is a feature in the PAN-OS GUI that allows an administrator to monitor the rule usage for a specified period of time, as well as optimize the security policies based on the traffic logs and recommendations. The Policy Optimizer can help the administrator to improve the security posture, reduce the attack surface, and simplify the policy management. The Policy Optimizer can be accessed from Policies > Policy Optimizer in the PAN-OS GUI.Reference:Policy Optimizer,View Policy Rule Usage,Updated Certifications for PAN-OS 10.1


Question 2

Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose two.)



Question 3

Which order of steps is the correct way to create a static route?



Question 4

An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.

What object is best suited for this configuration?



Answer : A


Question 5

A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.

To which two types of traffic will the rule apply? (Choose two.)



Answer : A, B

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTHCA0


Question 6

Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?



Answer : B

URL filtering technology protects users from web-based threats by providing granular control over user access and interaction with content on the Internet. You can develop a URL filtering policy that limits access to sites based on URL categories, users, and groups. For example, you can block access to sites known to host malware and prevent end users from entering corporate credentials to sites in certain categories.


Question 7

Which situation is recorded as a system log?



Answer : B


Page:    1 / 14   
Total 362 questions