Vcehome > Palo Alto Networks > Palo Alto Certifications and Accreditations > PCNSC > PCNSC Online Practice Questions and Answers

PCNSC Online Practice Questions and Answers

Questions 4

An administrator has users accessing network resources through Citrix XenApp 7 .x.

Which User-ID mapping solution will map multiple mat who using Citrix to connect to the network and access resources?

A. Client Probing

B. Globa1Protect

C. Terminal Services agent

D. Syslog Monitoring

Browse 81 Q&As
Questions 5

Which two benefits come from assigning a Decrypting Profile to a Decryption rule with a" NO Decrypt" action? (Choose two.)

A. Block sessions with unsuspected cipher suites

B. Block sessions with untrusted issuers

C. Block credential phishing.

D. Block sessions with client authentication

E. Block sessions with expired certificates

Browse 81 Q&As
Questions 6

A firewall administrator has been asked to configure a Palo Alto Networks NGFW to prevent against compromised hosts trying to phone-number or bacon out to eternal command-and-control (C2) servers. Which Security Profile type will prevent these behaviors?

A. Vulnerability Protection

B. Antivirus

C. Wildfire

D. Anti-Spyware

Browse 81 Q&As
Questions 7

If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will be detected as credential theft?

A. Using the name user's corporate username and password.

B. First four letters of the username matching any valid corporate username.

C. Matching any valid corporate username.

D. Mapping to the IP address of the logged-in user.

Browse 81 Q&As
Questions 8

A customer wants to combine multiple Ethernet interfaces into a single virtual interface using Link aggregation.

Which two formats are correct for naming aggregate interlaces? (Choose two.)

A. aggregate.8

B. ae.8

C. ae.1

D. aggregate.1

Browse 81 Q&As
Questions 9

Which administrative authentication method supports authorization by an external service?

A. RADIUS

B. SSH keys

C. Certification

D. LDAP

Browse 81 Q&As
Questions 10

What will be the egress interface if the traffic's ingress interface is Ethernet 1/6 sourcing form 192.168.11.3 and to the destination 10.46.41.113.during the.

A. ethernet 1/6

B. ethernet 1/5

C. ethernet 1/3

D. ethernet 1/7

Browse 81 Q&As
Questions 11

Which option would an administration choose to define the certificate and protect that Panorama and its managed devices uses for SSL/ITS services?

A. Set Up SSL/TLS under Policies > Service/URL Category > Service.

B. Configure on SSL/TLS Profile.

C. Configure a Decryption Profile and select SSL/TLS services.

D. Set up Security policy rule to allow SSL communication.

Browse 81 Q&As
Questions 12

Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?

A. No prerequisites are required

B. SSH keys must be manually generated

C. Both SSH keys and SSL certificates must be generated

D. SSL certificates must be generated

Browse 81 Q&As
Questions 13

Anadministrator using an enterprise PKI needs to establish a unique chain of trust to ensure mutual authentication between Panorama and the managed firewalls and Log Collectors. How would the administrator establish the chain of trust?

A. Use custom certificates

B. Enable LDAP or RADIUS integration

C. Set up multi-factor authentication

D. Configure strong password authentication

Browse 81 Q&As
Exam Code: PCNSC
Exam Name: Palo Alto Networks Certified Network Security Consultant
Last Update: May 10, 2024
Questions: 81 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99