PCNSA Sample Test Questions and
Answers Already Passed
The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies?
(Choose three.)
A. securing operations response
B. securing the en
...
PCNSA Sample Test Questions and
Answers Already Passed
The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies?
(Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party application access
D. securing the cloud
E. securing the internet of things ✔✔A. securing operations response
B. securing the enterprise
D. securing the cloud
What are four components of the Palo Alto Networks Cybersecurity Portfolio?(Choose four.)
A. Cortex DynamicDNS
B. WildFire
C. Cortex XDR
D. OpenConnect
E. Prisma Access
F. AutoFocus ✔✔B. WildFire
C. Cortex XDR
E. Prisma Access
F. AutoFocus
Which cloud-delivered security service provides instant access to community-based threat data?
A. Prisma SaaS
B. AutoFocusC. Unit 42
D. Cortex XDR ✔✔B. AutoFocus
Which cloud-delivered security service provides security and connectivity for branches and
mobileusers?
A. Cortex XSOAR
B. Cortex XDR
C. AutoFocus
D. Prisma Access ✔✔D. Prisma Access
Which Palo Alto Networks Cybersecurity Portfolio product provides access to applications from
Palo Alto Networks, third parties, and customers?
A. WildFire
B. Cortex Data Lake
C. Network Security
D. Prisma Access ✔✔B. Cortex Data Lake
Which Palo Alto Networks firewall feature provides all the following abilities?
• Stops malware, exploits, and ransomware before they can compromise endpoints
• Provides protection while endpoints are online and offline, on network and off
• Coordinates enforcement with network and cloud security to prevent successful attacks
• Detects threats and automates containment to minimize impact
• Creates zero-day malware signatures with cloud-based threat
analysis• Integrates with Palo Alto Networks Cortex Data Lake
A. Cortex XDR
B. Prisma SaaS
C. WildFire
D. AutoFocus ✔✔A. Cortex XDR
Which three management features does the Control Plane provide? (Choose three.)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing ✔✔B. logging
C. reporting
D. firewall configuration
Which three data processing features does the data plane provide? (Choose three.)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing ✔✔A. security processing
E. signature matching
F. network processing
What are three components of the Network Processing module? (Choose three.)A. QoS
B. NAT
C. App-ID
D. flow control
E. URL match
F. spyware ✔✔A. QoS
B. NAT
D. flow control
10. Which approach most accurately defines the Palo Alto Networks SP3 architecture?
A. prioritize first
B. sequential processing
C. scan it all, scan it once
D. Zero Trust segmentation platform ✔✔C. scan it all, scan it once
What is the result of using a stream-based architectural design?
A. superior performance
B. increased latency
C. detailed logging
D. increased functionality ✔✔A. superior performance
Which security model does Palo Alto Networks recommend that you deploy?
A. separation-of-trust
B. Zero Trust
C. trust-then-verify
D. never trust ✔✔B. Zero TrustThe Zero Trust model is implemented to specifically inspect which type of traffic?
A. east-west
B. north-south
C. left-right
D. up-down ✔✔A. east-west
What are the three main concepts of Zero Trust? (Choose three.)
A. All resources are accessed in a secure manner, regardless of location.
B. Access control is on a "need-to-know" basis and is strictly enforced.
C. Credentials need to be verified.
D. All traffic is logged and inspected.
E. Internal users are trusted implicitly.
F. External users are trusted explicitly. ✔✔A. All resources are accessed in a secure manner,
regardless of location.
B. Access control is on a "need-to-know" basis and is strictly enforced.
D. All traffic is logged and inspected
Which two statements are true about the Zero Trust model? (Choose two.)
A. Traffic is inspected laterally.
B. Traffic is inspected east-west.
C. Internal traffic is implicitly trusted.
D. External traffic is implicitly trusted ✔✔A. Traffic is inspected laterally.
B. Traffic is inspected east-west.
Which three Palo Alto Networks products secure your network? (Choose three.)A. MineMerge
B. Prisma SaaS
C. URL filtering
D. Containers
E. TrapContent
F. WildFire ✔✔B. Prisma SaaS
C. URL filtering
F. WildFire
True or false: Blockage of just one stage in the cyberattack lifecycle will protect a company's
network from attack.
A. true
B. false ✔✔A. true
What are two stages of the cyberattack lifecycle? (Choose two.)
A. weaponization and delivery
B. manipulation
C. extraction
D. command and control ✔✔A. weaponization and delivery
D. command and control
Command and control can be prevented through which two methods? (Choose two.)
A. exploitation\
B. DNS Sinkholing
C. URL filtering
D. reconnaissance ✔✔B. DNS Sinkholing
C. URL filteringExploitation can be mitigated by which two actions? (Choose two.)
A. keeping systems patched
B. using local accounts
C. blocking known and unknown vulnerability exploits on the endpoint
D. providing admin credentials ✔✔A. keeping systems patched
C. blocking known and unknown vulnerability exploits on the endpoint
What are two firewall management methods? (Choose two.)
A. CLI
B. RDP
C. VPN
D. XML API ✔✔A. CLI
D. XML API
Which two devices are used to connect a computer to the firewall for management
purposes?(Choose two.)
A. rollover cable
B. serial cable
C. RJ-45 Ethernet cable
D. USB cable ✔✔B. serial cable
C. RJ-45 Ethernet cable
What is the default IP address on the MGT interfaces of a Palo Alto Networks firewall?
A. 192.168.1.1
B. 192.168.1.254
C. 10.0.0.1
D. 10.0.0.254 ✔✔A. 192.168.1.1What are the two default services that are available on the MGT interface? (Choose two.)
A. HTTPS
B. SSH
C. HTTP
D. Telnet ✔✔A. HTTPS
B. SSH
True or false. Service route traffic has Security policy rules applied against it.
A. true
B. false ✔✔A. true
Service routes may be used to forward which two traffic types out a data port? (Choose two.)
A. External Dynamic Lists
B. MineMeld
C. Skype
D. Palo Alto Networks updates ✔✔A. External Dynamic Lists
D. Palo Alto Networks updates
Which firewall plane does the running-configuration reside on?
A. management
B. control
C. data
D. security ✔✔C. data
Which firewall plane does the candidate configuration reside on?A. management
B. control
C. data
D. security ✔✔B. control
Candidate config and running config files are saved as which file type?
A. TXT
B. HTML
C. XML
D. RAR ✔✔C. XML
Which command must be performed on the firewall to activate any changes?
A. commit
B. save
C. load
D. import ✔✔A. commit
Which command backs up configuration files to a remote network device?
A. import
B. load
C. copy
D. export ✔✔D. export
The command load named configuration snapshot overwrites the current candidate configuration
with which three items? (Choose three.)
A. custom-named candidate configuration snapshot (instead of the default snapshot)
B. custom-named running configuration that you importedC. snapshot.xml
D. current running configuration (running-config.xml)
E. Palo Alto Networks updates ✔✔A. custom-named candidate configuration snapshot (instead of
the default snapshot)
B. custom-named running configuration that you imported
D. current running configuration (running-config.xml)
[Show More]