Get Full Version of the Exam
http://www.EnsurePass.com/PCNSE.html
Question No.121
Which tool provides an administrator the ability to see trends in traffic over periods of time, such as threats detected in the last 30 days?
-
Session Browser
-
Application Command Center
-
TCP Dump
-
Packet Capture
Correct Answer: B
Explanation:
https://live.paloaltonetworks.com/t5/Management-Articles/Tips-amp-Tricks-How-to-Use-the- Application-Command-Center-ACC/ta-p/67342
Question No.122
When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?
-
Load named configuration snapshot
-
Load configuration version
-
Save candidate config
-
Export device state
Correct Answer: A
Question No.123
When configuring the firewall for packet capture, what are the valid stage types?
-
Receive, management, transmit, and drop
-
Receive, firewall, send, and non-syn
-
Receive management, transmit, and non-syn
-
Receive, firewall, transmit, and drop
Correct Answer: D
Question No.124
Which data flow describes redistribution of user mappings?
-
User-ID agent to firewall
-
firewall to firewall
-
Domain Controller to User-ID agent
-
User-ID agent to Panorama
Correct Answer: B
Question No.125
Which feature must you configure to prevent users form accidentally submitting their corporate credentials to a phishing website?
-
URL Filtering profile
-
Zone Protection profile
-
Anti-Spyware profile
-
Vulnerability Protection profile
Correct Answer: A
Explanation:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/threat-prevention/prevent- credential-phishing
Question No.126
An administrator sees several inbound sessions identified as unknown-tcp in the traffic logs. The administrator determines that these sessions are from external users accessing the company#39;s proprietary accounting application. The administrator wants to reliablyidentify this as their accounting application and to scan this traffic for threats. Which option would achieve this result?
-
Create an Application Override policy and a custom threat signature for the application
-
Create an Application Override policy
-
Create a custom App-ID and use the quot;ordered conditionsquot; check box
-
Create a custom App ID and enable scanning on the advanced tab
Correct Answer: A
Question No.127
An administrator wants a new Palo Alto Networks NGFW to obtain automatic application updates daily, so it is configured to use a scheduler for the application database. Unfortunately,they required the management network to be isolated so that it cannot reach the internet. Which configuration will enable the firewall to download and install application updates automatically?
-
Configure a Policy Based Forwarding policy rule for the update server IP address so that traffic sourced from themanagement interfaced destined for the update servers goes out of the interface acting as your internet connection.
-
Configure a security policy rule to allow all traffic to and from the update servers.
-
Download and install application updates cannot be done automatically if the MGT port cannot reach the internet.
-
Configure a service route for Palo Alto networks services that uses a dataplane interface that can route traffic to the internet, and create a security policy rule to allow the traffic from that interface to the update servers if necessary.
Correct Answer: B
Question No.128
Which Zone Pair and Rule Type will allow a successful connection for a user on the internet zone to a web server hosted in the DMZ zone? The web server is reachableusing a destination Nat policy in the Palo Alto Networks firewall.
-
Zone Pair:
Source Zone: Internet Destination Zone: DMZ Rule Type:
quot;intrazonequot;
-
Zone Pair:
Source Zone: Internet Destination Zone: DMZ
Rule Type:
quot;intrazonequot; or quot;universalquot;
-
Zone Pair:
Source Zone: Internet Destination Zone: Internet Rule Type:
quot;intrazonequot; or quot;universalquot;
-
Zone Pair:
Source Zone: Internet Destination Zone: Internet Rule Type:
quot;intrazonequot;
Correct Answer: B
Question No.129
Which three firewall states are valid? (Choose three.)
-
Active
-
Functional
-
Pending
-
Passive
-
Suspended
Correct Answer: ADE
Explanation:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/high-availability/ha-firewall- states
Question No.130
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and HOST B (10.1.1.101) receives SSH traffic. Which two security policy rules will accomplish this configuration? (Choose two.)
-
Untrust (Any) to Untrust (10.1.1.1), web-browsing -Allow
-
Untrust (Any) to Untrust (10.1.1.1), ssh -Allow
-
Untrust (Any) to DMZ (10.1.1.1), web-browsing -Allow
-
Untrust (Any) to DMZ (10.1.1.1), ssh -Allow
-
Untrust (Any) to DMZ (10.1.1.100.10.1.1.101), ssh, web-browsing -Allow
Correct Answer: CD
Get Full Version of the Exam
PCNSE Dumps
PCNSE VCE and PDF