Lab Exercises Security Profiles

Lab Exercises Security Profiles

1st - 3rd Grade

15 Qs

quiz-placeholder

Similar activities

Coach Review

Coach Review

KG - Professional Development

10 Qs

Quizziz Spoofing

Quizziz Spoofing

1st - 3rd Grade

15 Qs

Day-03 Network Fundamentals

Day-03 Network Fundamentals

1st Grade

10 Qs

AIJ XII TKJ

AIJ XII TKJ

KG - Professional Development

20 Qs

Slowness

Slowness

1st Grade

10 Qs

YCISCQ Non Academic Quiz

YCISCQ Non Academic Quiz

KG - Professional Development

10 Qs

Job Analysis

Job Analysis

2nd Grade

10 Qs

model ISO OSI.Warstwa aplikacji

model ISO OSI.Warstwa aplikacji

1st - 3rd Grade

20 Qs

Lab Exercises Security Profiles

Lab Exercises Security Profiles

Assessment

Quiz

Professional Development

1st - 3rd Grade

Easy

Created by

Steve Brusas

Used 32+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A "Continue" action can be configured on the following Security Profiles:

URL Filtering, File Blocking, and Data Filtering

URL Filtering

URL Filtering and Antivirus

URL Filtering and File Blocking

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user's browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log?

override

continue

block

alert

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three statements describe the operation of Security policy rules and Security Profiles? (Choose three.)

Security Profiles are attached to Security policy rules.

Security policy rules inspect but do not block traffic.

Security Profiles should be used only on allowed traffic.

Security policy rules can block or allow traffic.

Security policy rules are attached to Security Profiles.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An administrator has been asked to configure a Palo Alto Networks NGFW to provide protection against worms and trojans.

Which Security Profile type will protect against worms and trojans?

Anti-Spyware

Instruction Prevention

File Blocking

Antivirus

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall's signature database has been updated?

antivirus profile applied to outbound security policies

data filtering profile applied to inbound security policies

data filtering profile applied to outbound security policies

vulnerability profile applied to inbound security policies

Answer explanation

Media Image

PCNSA Study Guide pg. 41

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two security profile types can be attached to a security policy? (Choose two.)

antivirus

DDoS protection

threat

vulnerability protection

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop. The malware contacted a known command- and-control server, which caused the infected laptop to begin exfiltrating corporate data.

Which security profile feature could have been used to prevent the communication with the command-and-control server?

Create an anti-spyware profile and enable DNS Sinkhole feature.

Create an antivirus profile and enable its DNS Sinkhole feature.

Create a URL filtering profile and block the DNS Sinkhole URL category

Create a Data Filtering Profiles and enable its DNS Sinkhole feature.

Answer explanation

Media Image

PCNSA Study Guide pg. 140

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?