PCNSC question 21 to 40

PCNSC question 21 to 40

Professional Development

20 Qs

quiz-placeholder

Similar activities

Exploring Semiconductor Devices

Exploring Semiconductor Devices

Professional Development

20 Qs

Topic 1 Question 180 to 200

Topic 1 Question 180 to 200

Professional Development

20 Qs

RME Review - Wye Delta Starters

RME Review - Wye Delta Starters

Professional Development

20 Qs

CISCO PLACEMENT PREPARATION TEST 5 @ 29/3/25 St.JOSEPH'S

CISCO PLACEMENT PREPARATION TEST 5 @ 29/3/25 St.JOSEPH'S

Professional Development

16 Qs

MCQ on Innovation & Creativity

MCQ on Innovation & Creativity

Professional Development

15 Qs

RME Review - DOL Motor Starting

RME Review - DOL Motor Starting

Professional Development

20 Qs

Prueba Analista de Tecnología

Prueba Analista de Tecnología

Professional Development

20 Qs

Quiz Sistem Experion LX

Quiz Sistem Experion LX

Professional Development

20 Qs

PCNSC question 21 to 40

PCNSC question 21 to 40

Assessment

Quiz

Engineering

Professional Development

Hard

Created by

Juan Juan

FREE Resource

20 questions

Show all answers

1.

CLASSIFICATION QUESTION

3 mins • 1 pt

​ ​ ​

​ ​ ​ Match the command with the appropriate scenario for its use

Groups:

(a) Management plane resource

,

(b) Data plane resources

,

(c) State of various processes

,

(d) Authentication log

show system resources

show running resource-monitor

tail follow yes mp.log authd.log

tail follow yes dp.log authd.log

debug dataplane packet-diag

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your customer is setting up an IPsec VPN tunnel with a third party. The third-party device only supports policy-based IPsec VPN tunnels.
What must be set up on the IPsec tunnel on the Palo Alto Networks Next-Generation Firewall to support policy-based tunnels?

policy-based forwarding

static route

Proxy-ID

DNS proxy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which category of Vulnerability Signatures is most likely to trigger false positive alerts?

info-leak

code-execution

phishing

brute-force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information is required in order to plan the deployment of a perimeter firewall?

the management IP of the DSL device provided by the ISP

The operating system and browser version of the management client

the link type and speed of the surrounding devices

the name of the Internet provider and the cost of the link

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A customer uses an application on the network that shows unknown-tcp application in the traffic logs.
Which two actions can the administrator take to make the application display this information? (Choose two.)

Create a custom application by using fingerprinting applications

Submit a request for a new App-ID on the Application & Threat Research Center

Create a customer application by using signatures

Submit a request for new App-ID with Unit-42

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when a packet from an existing session is received by a firewall that is not the owner in an HA active/active configuration?

The firewall requests the sender to resend the packet

The firewall forwards the packet to the peer firewall over the HA3 link.

The firewall takes ownership of the session from the peer firewall

The firewall drops the packet to prevent any L3 loops.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have just completed a firewall migration project in Expedition. Expedition is not directly connected to a firewall. You decide to export the configuration.
What two file types will be available to you in the download options? (Choose two.)

a tech support file for the target firewall

the README file describing how to use the XML file

a TXT file with SET commands

an XML file to upload to the Palo Alto Networks device

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?