Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?
A. DoS protection
B. URL filtering
C. packet buffering
D. anti-spyware
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?
A. Option A
B. Option B
C. Option C
D. Option D
An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.
Which security policy action causes this?
A. Reset server
B. Reset both
C. Deny
D. Drop
What allows a security administrator to preview the Security policy rules that match new application signatures?
A. Review Release Notes
B. Dynamic Updates-Review Policies
C. Dynamic Updates-Review App
D. Policy Optimizer-New App Viewer
You need to allow users to access the office-suite application of their choice. How should you configure the firewall to allow access to any office-suite application?
A. Create an Application Group and add Office 365, Evernote Google Docs and Libre Office
B. Create an Application Group and add business-systems to it.
C. Create an Application Filter and name it Office Programs, then filter it on the office programs subcategory.
D. Create an Application Filter and name it Office Programs then filter on the business- systems category.
Which tab would an administrator click to create an address object?
A. Device
B. Policies
C. Monitor
D. Objects
Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?
A. Root
B. Dynamic
C. Role-based
D. Superuser
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
A. It defines the SSUTLS encryption strength used to protect the management interface.
B. It defines the CA certificate used to verify the client's browser.
C. It defines the certificate to send to the client's browser from the management interface.
D. It defines the firewall's global SSL/TLS timeout values.
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
A. any supported Palo Alto Networks firewall or Prisma Access firewall
B. an additional subscription free of charge
C. a firewall device running with a minimum version of PAN-OS 10.1
D. an additional paid subscription
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications Which policy achieves the desired results?
A. Option A
B. Option B
C. Option C
D. Option D
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Palo Alto Networks exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PCNSA exam preparations and Palo Alto Networks certification application, do not hesitate to visit our Vcedump.com to find your solutions here.