
PCNSC question 21 to 40
Authored by Juan Juan
Engineering
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
CATEGORIZE QUESTION
3 mins • 1 pt
Match the command with the appropriate scenario for its use
Groups:
(a) Management plane resource
,
(b) Data plane resources
,
(c) State of various processes
,
(d) Authentication log
show system resources
tail follow yes dp.log authd.log
debug dataplane packet-diag
tail follow yes mp.log authd.log
show running resource-monitor
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your customer is setting up an IPsec VPN tunnel with a third party. The third-party device only supports policy-based IPsec VPN tunnels.
What must be set up on the IPsec tunnel on the Palo Alto Networks Next-Generation Firewall to support policy-based tunnels?
policy-based forwarding
static route
Proxy-ID
DNS proxy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which category of Vulnerability Signatures is most likely to trigger false positive alerts?
info-leak
code-execution
phishing
brute-force
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What information is required in order to plan the deployment of a perimeter firewall?
the management IP of the DSL device provided by the ISP
The operating system and browser version of the management client
the link type and speed of the surrounding devices
the name of the Internet provider and the cost of the link
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A customer uses an application on the network that shows unknown-tcp application in the traffic logs.
Which two actions can the administrator take to make the application display this information? (Choose two.)
Create a custom application by using fingerprinting applications
Submit a request for a new App-ID on the Application & Threat Research Center
Create a customer application by using signatures
Submit a request for new App-ID with Unit-42
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when a packet from an existing session is received by a firewall that is not the owner in an HA active/active configuration?
The firewall requests the sender to resend the packet
The firewall forwards the packet to the peer firewall over the HA3 link.
The firewall takes ownership of the session from the peer firewall
The firewall drops the packet to prevent any L3 loops.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You have just completed a firewall migration project in Expedition. Expedition is not directly connected to a firewall. You decide to export the configuration.
What two file types will be available to you in the download options? (Choose two.)
a tech support file for the target firewall
the README file describing how to use the XML file
a TXT file with SET commands
an XML file to upload to the Palo Alto Networks device
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?