Mock P C N S A Exam4

Mock P C N S A Exam4

1st - 5th Grade

60 Qs

quiz-placeholder

Similar activities

WL-PT3

WL-PT3

1st Grade

65 Qs

'B' Coy Mock Test 1 (ASM Part 1 & 7)

'B' Coy Mock Test 1 (ASM Part 1 & 7)

KG - Professional Development

55 Qs

MDS Placement Test (Bahasa Version)

MDS Placement Test (Bahasa Version)

3rd Grade

60 Qs

Admin Test 1

Admin Test 1

1st Grade

64 Qs

Front Office Midterm Exam

Front Office Midterm Exam

KG - Professional Development

55 Qs

level 3 heating

level 3 heating

1st Grade

60 Qs

Workplace English Vocabulary Quiz

Workplace English Vocabulary Quiz

KG - 12th Grade

59 Qs

Microsoft Azure Fundamentals (AZ-900) - Practice Exam - 9

Microsoft Azure Fundamentals (AZ-900) - Practice Exam - 9

1st Grade

55 Qs

Mock P C N S A Exam4

Mock P C N S A Exam4

Assessment

Quiz

Professional Development

1st - 5th Grade

Medium

Created by

Steve Brusas

Used 22+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company is highly concerned with their intellectual property being accessed by unauthorized resources. There is a mature process to store and include metadata tags for all confidential documents.

Which Security profile can further ensure that these documents do not exit the corporate network?

File Blocking

Data Filtering

Anti-Spyware

URL Filtering

Answer explanation

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-web-interface-help/objects/objects-security-profiles-data-filtering

Data filtering enables the firewall to detect sensitive information—such as credit card or social security numbers or internal corporate documents—and prevent this data from leaving a secure network. Before you enable data filtering, select Objects > Custom Objects > Data Patterns to define the type of data you want to filter (such as social security numbers or document titles that contain the word “confidential”). You can add several data pattern objects to a single Data Filtering profile and, when attached to a Security policy rule, the firewall scans allowed traffic for each data pattern and blocks matching traffic based on the data filtering profile settings.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.

Which Security policy rule will allow traffic to flow to the web server?

Untrust (any) to DMZ (10.1.1.100), web browsing - Allow

Untrust (any) to Untrust (1.1.1.100), web browsing - Allow

Untrust (any) to Untrust (10.1.1.100), web browsing - Allow

Untrust (any) to DMZ (1.1.1.100), web browsing - Allow

Answer explanation

the key in this question is Security policy rule, the traffic will flow through the firewall within two rules, Nat rule policy+Security rule policy.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known Malicious IP

Addresses list?

destination address

source address

destination zone

source zone

Answer explanation

Predefined IP Address—A predefined IP address list is a type of IP address list that refers to the built-in, dynamic IP lists with fixed or “predefined” contents. These Built-In External Dynamic Lists—for bulletproof hosting providers, known malicious, and high-risk IP addresses—are automatically added to your firewall if you have an active Threat Prevention license. A predefined IP address list can also refer to an EDL that uses one of the built-in lists as a source. Because you can’t modify the contents of a predefined list, you can use a predefined list as a source for a different EDL if you want to add or exclude list entries.

https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content whose services are frequently used by attackers to distribute illegal or unethical material?

Palo Alto Networks C&G IP Addresses

Palo Alto Networks High Risk IP Addresses

Palo Alto Networks Known Malicious IP Addresses

Palo Alto Networks Bulletproof IP Addresses

Answer explanation

Palo Alto Networks Bulletproof IP Addresses—Contains IP addresses provided by bulletproof hosting providers. Because bulletproof hosting providers place few, if any, restrictions on content, attackers frequently use these services to host and distribute malicious, illegal, and unethical material.

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PM0pCAG

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An administrator is reviewing the Security policy rules shown in the screenshot below.

Which statement is correct about the information displayed?

Highlight Unused Rules is checked.

There are seven Security policy rules on this firewall.

The view Rulebase as Groups is checked.

Eleven rules use the “Infrastructure” tag.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to fulfill the corporate requirement to backup the configuration of Panorama and the Panorama-managed firewalls securely, which protocol should you select when adding a new scheduled config export?

HTTPS

SMB v3

SCP

FTP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must be considered with regards to content updates deployed from Panorama?

Content update schedulers need to be configured separately per device group.

Panorama can only install up to five content versions of the same type for potential rollback scenarios.

A PAN-OS upgrade resets all scheduler configurations for content updates.

Panorama can only download one content update at a time for content updates of the same type.

Answer explanation

Panorama can download only one update at a time for updates of the same type. If you schedule multiple updates of the same type to download during the same time Recurrence, only the first download succeeds.

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/upgrade-panorama/deploy-updates-to-firewalls-log-collectors-and-wildfire-appliances-using-panorama/schedule-a-content-update-using-panorama

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?