PCNSA試験無料問題集「Palo Alto Networks Certified Network Security Administrator 認定」

Which policy set should be used to ensure that a policy is applied just before the default security rules?

解説: (GoShiken メンバーにのみ表示されます)
Which feature enables an administrator to review the Security policy rule base for unused rules?

解説: (GoShiken メンバーにのみ表示されます)
What must be configured before setting up Credential Phishing Prevention?

解説: (GoShiken メンバーにのみ表示されます)

Given the detailed log information above, what was the result of the firewall traffic inspection?

What are three ways application characteristics are used? (Choose three.)

正解:C,D,E 解答を投票する
After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

Which type of administrator account cannot be used to authenticate user traffic flowing through the firewall's data plane?

Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?

解説: (GoShiken メンバーにのみ表示されます)
Identify the correct order to configure the PAN-OS integrated USER-ID agent.
3. add the service account to monitor the server(s)
2. define the address of the servers to be monitored on the firewall
4. commit the configuration, and verify agent connection status
1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent

How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?

Which object would an administrator create to block access to all high-risk applications?

How are Application Fillers or Application Groups used in firewall policy?

What action will inform end users when their access to Internet content is being restricted?

Match the cyber-attack lifecycle stage to its correct description.
正解:

Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

Which two security profile types can be attached to a security policy? (Choose two.)