Get Latest Jul-2021 Conduct effective penetration tests using Actual4Exams PCNSC exam [Q25-Q49]

Share

Get Latest [Jul-2021] Conduct effective penetration tests using  Actual4Exams PCNSC

Penetration testers simulate PCNSC exam PDF

NEW QUESTION 25
An administrator has users accessing network resources through Citrix XenApp 7 .x. Which User-ID mapping solution will map multiple mat who using Citrix to connect to the network and access resources?

  • A. Syslog Monitoring
  • B. Globa1Protect
  • C. Terminal Services agent
  • D. Client Probing

Answer: C

 

NEW QUESTION 26
A client has a sensitive application server in their data center and is particularly concerned about resource exhaustion because of distributed denial-of-service attacks.
How can the Palo Alto Networks NGFW be configured to specifically protect tins server against resource exhaustion originating from multiple IP address (DDoS attack)?

  • A. Define a custom App-ID to ensure that only legitimate application traffic reaches the server
  • B. Add QoS Profiles to throttle incoming requests.
  • C. Add a DoS Protection Profile with defined session count.
  • D. Add a Vulnerability Protection Profile to block the attack.

Answer: C

 

NEW QUESTION 27
An administrator pushes a new configuration from panorama to a pair of firewalls that are configured as active/passive HA pair.
Which NGFW receives the configuration from panorama?

  • A. the active firewall, which then synchronizes to the passive firewall
  • B. both the active and passive firewalls independently, with no synchronization afterward
  • C. both the active and passive firewalls, which then synchronizes with each other
  • D. the passive firewall, which then synchronizes to the active firewall

Answer: C

 

NEW QUESTION 28
A web server is hosted in the DMZ and the server re configured to listen for income connections on TCP port
443. A Security policies rules allowing access from the Trust zone to the DMZ zone needs to be configured to allow web-browsing access. The web server host its contents over Traffic from Trust to DMZ is being decrypted with a Forward Proxy rule.
Which combination of service and application, and order of Security policy rules needs to be configured to allow cleaned web-browsing traffic to the server on tcp/443?

  • A. Rule#1 application web-brows.no service application-default, action allow Rule #2 application ssl. Service application-default, action allow
  • B. Rule# 1 application: ssl; service application-default: action allow
    Role # 2 application web browsing, service application default, action allow
  • C. Rule #1application web-browsing, service service imp action allow
    Rule #2 application ssl. service application -default, action allow
  • D. Rule#1application: web-biows.no; service service-https action allow
    Rule#2 application ssl. Service application-default, action allow

Answer: A

 

NEW QUESTION 29
A user's traffic traversing a Palo Alto Networks NGFW sometime can reach http//www company com At the session times out.
The NGFW has been configured with a PBF rule that the user's traffic matches when it goes to http //www company com.
How con the firewall be configured to automatically disable the PBF rule if the next hop goes down?

  • A. Create and add a Monitor Profile with an action of Wait Recover in the PBF rule in question.
  • B. Create and add a Monitor Profile with an action of Fail Over in the PBF rule in question.
  • C. Enable and configure a Link Monitoring Profile for the external interface of the firewall.
  • D. Configure path monitoring for tine next hop gateway on the default route in tin- virtual router.

Answer: B

 

NEW QUESTION 30
An administrator sees several inbound sessions identified as unknown tcp in the Traffic logs. The administrator determines that these sessions are from external users accessing the company's propriety accounting application. The administrator wants to reliability identity this as their accounting application and to scan this traffic for threats.
Which option would achieve this result?

  • A. Create an Application Override policy and a custom threat signature for the application.
  • B. Create an Application Override policy
  • C. Create a custom App-ID and enable scanning on the advanced tab.
  • D. Create a custom App-ID and use the "ordered condition cheek box.

Answer: A

 

NEW QUESTION 31
An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port. Which log entry can the administrator use to verify that sessions are being decrypted?

  • A. Data filtering log
  • B. Decryption tag
  • C. In the details of the Traffic log entries
  • D. In the details of the Threat log entries

Answer: C

 

NEW QUESTION 32
An administrator has been asked to configure active/active HA for a pair of Palo Alto Networks NGFWs. The firewalls use layer 3 interface to send traffic to a single gateway IP for the pair.
Which configuration will enable this HA scenario?

  • A. Each firewall will have a separate floating IP. and priority will determine which firewall has the primary IP.
  • B. The firewalls will share the same interface IP address, and device 1 will use the floating IP if device 0 fails.
  • C. The firewall do not use floating IPs in active/active HA.
  • D. The two firewalls will share a single floating IP and will use gratuitous ARP to share the floating IP.

Answer: A

 

NEW QUESTION 33
An administrator has left a firewall to used default port for all management services.
Which three function performed by the dataplane? (Choose three.)

  • A. file blocking
  • B. antivirus
  • C. NTP
  • D. NAT
  • E. WildFire updates

Answer: C,D,E

 

NEW QUESTION 34
Which processing order will be enabled when a panorama administrator selects the setting "Objects defined in ancestors will takes higher precedence?

  • A. Descendant object will take precedence over other descendant objects.
  • B. Ancestor objects will have precedence over other ancestor objects.
  • C. Ancestor will have precedence over descendant objects.
  • D. Descendant objects, will take precedence over ancestor objects.

Answer: C

 

NEW QUESTION 35
Refer to the exhibit.

An administrator cannot see any of the Traffic logs from the Palo Alto Networks NGFW on Panorama. The configuration problem seems to be on the firewall side. Where is the best place on the Palo Alto Networks NGFW to check whether the configuration is correct?
A)

B)

C)

D)

  • A. Option A
  • B. Option D
  • C. Option B
  • D. Option C

Answer: B

 

NEW QUESTION 36
Which three authentication faction factors does PAN-OS software support for MFA? (Choose three.)

  • A. Voice
  • B. Okta Adaptive
  • C. Push
  • D. SMS
  • E. Pull

Answer: A,C,E

 

NEW QUESTION 37
Which three file types can be forward to WildMFire for analysis a part of the basic WildMFire service?

  • A. .dil
  • B. .apk
  • C. .exe
  • D. .jar
  • E. .pdf
  • F. .fon

Answer: B,D,E

 

NEW QUESTION 38
What are two benefits of nested device groups in panorama? (Choose two )

  • A. reuse of the existing Security policy rules and objects
  • B. requires configuration both function and location for every device
  • C. overwrites local firewall configuration
  • D. all device groups inherit setting from the Shared group

Answer: B,D

 

NEW QUESTION 39
VPN traffic intended for an administrator's Palo Alto Networks NGfW is being maliciously intercepted and retransmitted by the interceptor. When Creating a VPN tunnel, which protection profile cm be enabled to prevent this malicious behavior?

  • A. DoS Protection
  • B. zone Protection
  • C. Replay
  • D. Web Application

Answer: B

 

NEW QUESTION 40
When is the content inspection performed in the packet flow process?

  • A. after the application has been identified
  • B. before session lookup
  • C. after the SSL Proxy re-encrypts the packet
  • D. before the packet forwarding process

Answer: A

 

NEW QUESTION 41
Which three options are supposed in HA Lite? (Choose three.)

  • A. Configuration synchronization
  • B. session synchronization
  • C. synchronization of IPsec security associations
  • D. Virtual link
  • E. active/passive deployment

Answer: A,C,E

 

NEW QUESTION 42
A session in the Traffic log is reporting the application as "incomplete" What does "incomplete" mean?

  • A. The three-way TCP handshake did not complete.
  • B. The traffic is coming across UDP, and the application could not be identified.
  • C. Data was received but wan instantly discarded because of a Deny policy was applied before App ID could be applied.
  • D. The three-way TCP handshake was observed, but the application could not be identified.

Answer: A

 

NEW QUESTION 43
A global corporate office has a large-scale network with only one User-ID agent, which creates a bottleneck near the User-ID agent server. Which solution in PAN -OS software would help in this case?

  • A. Virtual Wire mode
  • B. application override
  • C. content inspection
  • D. redistribution of user mappings

Answer: D

 

NEW QUESTION 44
An administrator is using Panorama and multiple Palo Alto Networks NGFWs. After upgrading all devices to the latest PAN-OS software, the administrator enables logs forwarding from the firewalls to panorama Pre-existing logs from the firewall are not appearing in Panorama.
Which action would enables the firewalls to send their preexisting logs to Panorama?

  • A. A CLI command will forward the pre-existing logs to Panorama.
  • B. Use the import option to pull logs panorama.
  • C. The- log database will need to be exported from the firewall and manually imported into Panorama.
  • D. Use the ACC to consolidate pre-existing logs.

Answer: A

 

NEW QUESTION 45
Which DoS protection mechanism detects and prevents session exhaustion attacks?

  • A. TCP Port Scan Protection
  • B. Flood Protection
  • C. Pocket Based Attack Protection
  • D. Resource Protection

Answer: D

 

NEW QUESTION 46
An administrator logs in to the Palo Alto Networks NGFW and reports and reports that the WebUI is missing the policies tab. Which profile is the cause of the missing policies tab?

  • A. Admin Role
  • B. Authorization
  • C. Authentication
  • D. WebUI

Answer: A

 

NEW QUESTION 47
What will be the egress interface if the traffic's ingress interface is Ethernet 1/6 sourcing form 192.168.11.3 and to the destination 10.46.41.113.during the.

  • A. ethernet 1/5
  • B. ethernet 1/3
  • C. ethernet 1/7
  • D. ethernet 1/6

Answer: B

 

NEW QUESTION 48
During the packet flow process, which two processes are performed in application identification? (Choose two.)

  • A. Application changed from content inspection
  • B. pattern based application identification
  • C. application override policy match
  • D. session application identified

Answer: C,D

 

NEW QUESTION 49
......

Tested Material Used To PCNSC Test Engine: https://www.actual4exams.com/PCNSC-valid-dump.html