PCNSA 無料問題集「Palo Alto Networks Certified Network Security Administrator」

Which security profile should be used to classify malicious web content?

解説: (JPNTest メンバーにのみ表示されます)
Identify the correct order to configure the PAN-OS integrated USER-ID agent.
3. add the service account to monitor the server(s)
2. define the address of the servers to be monitored on the firewall
4. commit the configuration, and verify agent connection status
1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent

An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny. What deny action will the firewall perform?

In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?

解説: (JPNTest メンバーにのみ表示されます)
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

How is the hit count reset on a rule?

Which object would an administrator create to block access to all high-risk applications?

Where within the firewall GUI can all existing tags be viewed?

Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?

解説: (JPNTest メンバーにのみ表示されます)
Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)

正解:B、D 解答を投票する
Which statement best describes the use of Policy Optimizer?

After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration that matches the running configuration.
Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?

The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet The firewall is configured with two zones;
1. trust for internal networks
2. untrust to the internet
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two )

正解:C、D 解答を投票する

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡