Free PCNSA Exam Braindumps (page: 4)

Page 4 of 98

DRAG DROP (Drag and Drop is not supported)
Match the Cyber-Attack Lifecycle stage to its correct description.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Which two statements are correct about App-ID content updates? (Choose two.)

  1. Updated application content might change how Security policy rules are enforced.
  2. After an application content update, new applications must be manually classified prior to use.
  3. Existing security policy rules are not affected by application content updates.
  4. After an application content update, new applications are automatically identified and classified.

Answer(s): C,D



Which User-ID mapping method should be used for an environment with users that do not authenticate to Active Directory?

  1. Windows session monitoring
  2. passive server monitoring using the Windows-based agent
  3. Captive Portal
  4. passive server monitoring using a PAN-OS integrated User-ID agent

Answer(s): C



An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?

  1. Create an Application Filter and name it Office Programs, then filter it on the business-systems category, office-programs subcategory
  2. Create an Application Group and add business-systems to it
  3. Create an Application Filter and name it Office Programs, then filter it on the business-systems category
  4. Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office

Answer(s): A






Post your Comments and Discuss Palo Alto Networks PCNSA exam with other Community members:

PCNSA Exam Discussions & Posts