Palo Alto Networks PCNSA Exam Practice Questions (P. 2)
- Full Access (420 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which User-ID mapping method should be used for an environment with users that do not authenticate to Active Directory?
- AWindows session monitoring
- Bpassive server monitoring using the Windows-based agent
- CCaptive PortalMost Voted
- Dpassive server monitoring using a PAN-OS integrated User-ID agent
Correct Answer:
C
C

The correct approach when dealing with environments where users do not authenticate to Active Directory is using the Captive Portal. The Captive Portal mandates that all users, regardless of their operating system or domain status, authenticate to access network resources. This method ensures that even users on non-domain systems, like Linux, are accounted for and can securely access the necessary applications and data.
send
light_mode
delete
Question #12
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
- ACreate an Application Filter and name it Office Programs, then filter it on the business-systems category, office-programs subcategoryMost Voted
- BCreate an Application Group and add business-systems to it
- CCreate an Application Filter and name it Office Programs, then filter it on the business-systems category
- DCreate an Application Group and add Office 365, Evernote, Google Docs, and Libre Office
Correct Answer:
A
A

Absolutely, option A is spot on for flexibility in a dynamic environment. An Application Filter, unlike a group, allows for the dynamic inclusion of applications as they match predefined categories and subcategories. By setting up a filter for the "office-programs" subcategory under the "business-systems" category, you ensure that any current and future office applications fitting this criteria are automatically covered without the need for manual updates. This setup is ideal for environments where new applications might be incorporated frequently. This approach provides a powerful way to manage changing application usage securely and efficiently.
send
light_mode
delete
Question #13
Which statement is true regarding a Best Practice Assessment?
- AThe BPA tool can be run only on firewalls
- BIt provides a percentage of adoption for each assessment areaMost Voted
- CThe assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention activities
- DIt provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
Correct Answer:
B
Reference:
https://docs.paloaltonetworks.com/best-practices/8-1/data-center-best-practices/data-center-best-practice-security-policy/use-palo-alto-networks- assessment-and-review-tools
B
Reference:
https://docs.paloaltonetworks.com/best-practices/8-1/data-center-best-practices/data-center-best-practice-security-policy/use-palo-alto-networks- assessment-and-review-tools
send
light_mode
delete
Question #14
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?


- Aintrazone-default
- BDeny Google
- Callowed-security services
- Dinterzone-defaultMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #15
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
- Aon either the data place or the management plane.
- Bafter it is matched by a security policy rule that allows traffic.Most Voted
- Cbefore it is matched to a Security policy rule.
- Dafter it is matched by a security policy rule that allows or blocks traffic.
Correct Answer:
D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy.html
D
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy.html
send
light_mode
delete
Question #16
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?


send
light_mode
delete
Question #17
Which interface does not require a MAC or IP address?
- AVirtual WireMost Voted
- BLayer3
- CLayer2
- DLoopback
Correct Answer:
A
A

Absolutely spot-on! In a Virtual Wire setup, neither MAC nor IP addresses are essential because these interfaces act as a transparent bridge, allowing traffic to pass without any alterations or routing decisions. This feature distinctly sets it apart from Layer 3 and Layer 2 interfaces, which rely on MAC and IP addresses for routing and switching operations respectively.
send
light_mode
delete
Question #18
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?
- ARule Usage Filter > No App Specified
- BRule Usage Filter >Hit Count > Unused in 30 days
- CRule Usage Filter > Unused Apps
- DRule Usage Filter > Hit Count > Unused in 90 daysMost Voted
Correct Answer:
D
D

The correct utility for identifying out-of-date or unused rules in a recently upgraded Palo Alto Networks NGFW is found under Policies > Policy Optimizer > Unused in 90 days. This functionality is designed to identify rules that have not triggered for a specified period of time, helping in optimizing the ruleset by removing outdated or unnecessary rules. However, considering that the firewall installation is relatively new (60 days old), selecting a period exceeding this installation duration (like 90 days) would not yield any results because the firewall has not been in operation long enough to meet this criterion. Thus, a shorter duration such as 30 days would be more practical in this specific scenario.
send
light_mode
delete
Question #19
DRAG DROP -
Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
Select and Place:

Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
Select and Place:

send
light_mode
delete
Question #20
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
- AAn implicit dependency does not require the dependent application to be added in the security policyMost Voted
- BAn implicit dependency requires the dependent application to be added in the security policy
- CAn explicit dependency does not require the dependent application to be added in the security policy
- DAn explicit dependency requires the dependent application to be added in the security policyMost Voted
Correct Answer:
AD
AD

In App-ID, implicit dependencies mean that the application identified as dependent does not need to be explicitly listed in the security policy for the main application to function correctly. On the other hand, explicit dependencies require that dependent applications be explicitly defined and added to the security policy to ensure proper functioning. This distinction is crucial when configuring and managing security policies in Palo Alto Networks firewalls.
send
light_mode
delete
All Pages