Palo Alto Networks Certified Network Security Administrator (PAN-OS 10.0) Questions and Answers
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
URL categories can be used as match criteria on which two policy types? (Choose two.)
Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?
What are two valid selections within an Antivirus profile? (Choose two.)
Which System log severity level would be displayed as a result of a user password change?
Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?
What are three Palo Alto Networks best practices when implementing the DNS Security Service? (Choose three.)
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications
Which policy achieves the desired results?
A)
B)
C)
D)
The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access the PowerBall Lottery website for just this week. However, the company does not want employees to access any other websites also listed in the URL filtering “gambling” category.
Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the “gambling” URL category?
Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?
An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within the DMZ zone The administrator does not want to allow traffic between the DMZ and LAN zones.
Which Security policy rule type should they use?
How many zones can an interface be assigned with a Palo Alto Networks firewall?
Which action results in the firewall blocking network traffic without notifying the sender?
A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
In the example security policy shown, which two websites fcked? (Choose two.)
Which two configuration settings shown are not the default? (Choose two.)
Which security profile should be used to classify malicious web content?
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?
What is a prerequisite before enabling an administrative account which relies on a local firewall user database?
Which two security profile types can be attached to a security policy? (Choose two.)
An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets. What are two security policy actions the administrator can select? (Choose two.)
In which two types of NAT can oversubscription be used? (Choose two.)
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
Which attribute can a dynamic address group use as a filtering condition to determine its membership?
Which object would an administrator create to enable access to all applications in the office-programs subcategory?
What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)
Which administrative management services can be configured to access a management interface?
Access to which feature requires the PAN-OS Filtering license?
Which two addresses should be reserved to enable DNS sinkholing? (Choose two.)
A network administrator creates an intrazone security policy rule on a NGFW. The source zones are set to IT. Finance, and HR.
To which two types of traffic will the rule apply? (Choose two.)
Match each feature to the DoS Protection Policy or the DoS Protection Profile.
Where does a user assign a tag group to a policy rule in the policy creation window?
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?
Which object would an administrator create to block access to all high-risk applications?
When a security rule is configured as Intrazone, which field cannot be changed?
Which CLI command will help confirm if FQDN objects are resolved in the event there is a shadow rule?
Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided password?
Access to which feature requires PAN-OS Filtering licens?
Match the Palo Alto Networks Security Operating Platform architecture to its description.
An address object of type IP Wildcard Mask can be referenced in which part of the configuration?
An administrator would like to override the default deny action for a given application and instead would like to block the traffic and send the ICMP code "communication with the destination is administratively prohibited"
Which security policy action causes this?
When creating a custom URL category object, which is a valid type?
An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save the changes, but the OK button is grayed out.
What are two possible reasons the OK button is grayed out? (Choose two.)
Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis Unit 42 research and data gathered from telemetry?
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?
What is the main function of the Test Policy Match function?
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?
Based on the screenshot what is the purpose of the group in User labelled ''it"?
Which definition describes the guiding principle of the zero-trust architecture?
What is the default action for the SYN Flood option within the DoS Protection profile?
For the firewall to use Active Directory to authenticate users, which Server Profile is required in the Authentication Profile?
Which tab would an administrator click to create an address object?
The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;
1. trust for internal networks
2. untrust to the internet
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )
Where within the firewall GUI can all existing tags be viewed?
Which type firewall configuration contains in-progress configuration changes?
Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose two.)
What allows a security administrator to preview the Security policy rules that match new application signatures?
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?
You receive notification about new malware that is being used to attack hosts The malware exploits a software bug in a common application
Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?
A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-admin make?
What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?
Which order of steps is the correct way to create a static route?
An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact a command-and-control (C2) server. Which two security profile components will detect and prevent this threat after the firewall’s signature database has been updated? (Choose two.)
Which link in the web interface enables a security administrator to view the security policy rules that match new application signatures?
Which protocol used to map username to user groups when user-ID is configured?
The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check the number, but doesn’t want to unblock the gambling URL category.
Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category? (Choose two.)
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are available for any known user in the organization.
What object is best suited for this configuration?
A Security Profile can block or allow traffic at which point?
Which Security policy set should be used to ensure that a policy is applied first?
In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)
Why does a company need an Antivirus profile?
When is an event displayed under threat logs?
Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)
Which Security profile should be applied in order to protect against illegal code execution?
Match the network device with the correct User-ID technology.
Based on the show security policy rule would match all FTP traffic from the inside zone to the outside zone?
What must be considered with regards to content updates deployed from Panorama?
Selecting the option to revert firewall changes will replace what settings?
Which Security policy action will message a user's browser thai their web session has been terminated?
During the packet flow process, which two processes are performed in application identification? (Choose two.)
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?
What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)
Which Security profile can you apply to protect against malware such as worms and Trojans?
Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available.
Which security policy action causes this?
An administrator would like to apply a more restrictive Security profile to traffic for file sharing applications. The administrator does not want to update the Security policy or object when new applications are released.
Which object should the administrator use as a match condition in the Security policy?
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
Which administrator type utilizes predefined roles for a local administrator account?
Which three configuration settings are required on a Palo Alto networks firewall management interface?
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
Which statements is true regarding a Heatmap report?
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
What must first be created on the firewall for SAML authentication to be configured?
What is a recommended consideration when deploying content updates to the firewall from Panorama?
Which situation is recorded as a system log?
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)
A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition, the configuration was not saved prior to
making the changes.
Which action will allow the administrator to undo the changes?
Which component is a building block in a Security policy rule?
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
Which dynamic update type includes updated anti-spyware signatures?
Which path in PAN-OS 10.0 displays the list of port-based security policy rules?
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
How would a Security policy need to be written to allow outbound traffic using Secure Shell (SSH) to destination ports tcp/22 and tcp/4422?
Which solution is a viable option to capture user identification when Active Directory is not in use?