PCNSA Dumps

PCNSA Free Practice Test

Paloalto-Networks PCNSA: Palo Alto Networks Certified Network Security Administrator

QUESTION 51

You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application
Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

Correct Answer: B

QUESTION 52

After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

Correct Answer: C

QUESTION 53

Which stage of the cyber-attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and risky websites?

Correct Answer: B
Weaponization and Delivery: Attackers will then determine which methods to use in order to deliver malicious payloads. Some of the methods they might utilize are automated tools, such as exploit kits, spear phishing attacks with malicious links, or attachments and malvertizing.
PCNSA dumps exhibit Gain full visibility into all traffic, including SSL, and block high-risk applications. Extend those protections to remote and mobile devices.
PCNSA dumps exhibit Protect against perimeter breaches by blocking malicious or risky websites through URL filtering.
PCNSA dumps exhibit Block known exploits, malware and inbound command-and-control communications using multiple threat prevention disciplines, including IPS, anti-malware, anti-CnC, DNS monitoring and sinkholing, and file and content blocking.
PCNSA dumps exhibit Detect unknown malware and automatically deliver protections globally to thwart new attacks.
PCNSA dumps exhibit Provide ongoing education to users on spear phishing links, unknown emails, risky websites, etc.
https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle

QUESTION 54

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone. Complete the security policy to ensure only Telnet is allowed.
Security Policy: Source Zone: Internal to DMZ Zone services “Application defaults”, and action = Allow

Correct Answer: B

QUESTION 55

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

Correct Answer: C