Search Header Logo

PCNSC question 21 to 40

Authored by Juan Juan

Engineering

Professional Development

PCNSC question 21 to 40
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

CATEGORIZE QUESTION

3 mins • 1 pt

​ ​ ​

​ ​ ​ Match the command with the appropriate scenario for its use

Groups:

(a) Management plane resource

,

(b) Data plane resources

,

(c) State of various processes

,

(d) Authentication log

show system resources

tail follow yes dp.log authd.log

debug dataplane packet-diag

tail follow yes mp.log authd.log

show running resource-monitor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your customer is setting up an IPsec VPN tunnel with a third party. The third-party device only supports policy-based IPsec VPN tunnels.
What must be set up on the IPsec tunnel on the Palo Alto Networks Next-Generation Firewall to support policy-based tunnels?

policy-based forwarding

static route

Proxy-ID

DNS proxy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which category of Vulnerability Signatures is most likely to trigger false positive alerts?

info-leak

code-execution

phishing

brute-force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information is required in order to plan the deployment of a perimeter firewall?

the management IP of the DSL device provided by the ISP

The operating system and browser version of the management client

the link type and speed of the surrounding devices

the name of the Internet provider and the cost of the link

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A customer uses an application on the network that shows unknown-tcp application in the traffic logs.
Which two actions can the administrator take to make the application display this information? (Choose two.)

Create a custom application by using fingerprinting applications

Submit a request for a new App-ID on the Application & Threat Research Center

Create a customer application by using signatures

Submit a request for new App-ID with Unit-42

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when a packet from an existing session is received by a firewall that is not the owner in an HA active/active configuration?

The firewall requests the sender to resend the packet

The firewall forwards the packet to the peer firewall over the HA3 link.

The firewall takes ownership of the session from the peer firewall

The firewall drops the packet to prevent any L3 loops.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have just completed a firewall migration project in Expedition. Expedition is not directly connected to a firewall. You decide to export the configuration.
What two file types will be available to you in the download options? (Choose two.)

a tech support file for the target firewall

the README file describing how to use the XML file

a TXT file with SET commands

an XML file to upload to the Palo Alto Networks device

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?