Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! PCNSC Palo Alto Networks Certified Network Security Consultant is now Stable and With Pass Result

PCNSC Practice Exam Questions and Answers

Palo Alto Networks Certified Network Security Consultant

Last Update 1 day ago
Total Questions : 75

PCNSC is stable now with all latest exam questions are added 1 day ago. Just download our Full package and start your journey with Paloalto Networks Palo Alto Networks Certified Network Security Consultant certification. All these Paloalto Networks PCNSC practice exam questions are real and verified by our Experts in the related industry fields.

PCNSC PDF

PCNSC PDF (Printable)
$48
$119.99

PCNSC Testing Engine

PCNSC PDF (Printable)
$56
$139.99

PCNSC PDF + Testing Engine

PCNSC PDF (Printable)
$70.8
$176.99
Question # 1

A Security policy rule is configured with a Vulnerability Protection Profile and an action of Deny".

Which action will this configuration cause on the matched traffic?

Options:

A.  

The configuration is invalid it will cause the firewall to Skip thisSecurity policy rule A warning will be displayed during a command.

B.  

The configuration is valid It will cause the firewall to deny the matched sessions. Any configured Security Profiles have no effect if the Security policy rule action is set to "Deny"

The configuration will allow the matched session unless a vulnerability signature is detected. The "Deny" action will supersede the per. defined, severity defined actions defined in the associated Vulnerability Protection Profile.

C.  

The configuration is invalid. The Profile Settings section will be- grayed out when the action is set to "Deny"

Discussion 0
Question # 2

A user's traffic traversing a Palo Alto Networks NGFW sometime can reach http//www company com At the session times out. The NGFW has been configured with a PBF rule that the user's traffic matches when it goes to http //www company com.

How con the firewall be configured to automatically disable the PBF rule if thenext hop goes down?

Options:

A.  

Configure path monitoring for tine next hop gateway on the default route in tin- virtual router.

B.  

Enable and configure a Link Monitoring Profile for the external interface of the firewall.

C.  

Create and add a Monitor Profile withan action of Wait Recover in the PBF rule in question.

D.  

Create and add a Monitor Profile with an action of Fail Over in the PBF rule in question.

Discussion 0
Question # 3

An administrator has enabled OSPF on a virtual router on the NGFW OSPF is not adding new routes to the virtual router.

Which two options enable the administrator top troubleshoot this issue? (Choose two.)

Options:

A.  

Perform atraffic pcap at the routing stage.

B.  

View System logs.

C.  

Add a redistribution profile to forward as BGP updates.

D.  

View Runtime Status virtual router.

Discussion 0
Question # 4

Which PAN-OS® policy must you configure to force a user to provide additional credential before he is allowed to access an internal application that contains highly sensitive business data?

Options:

A.  

Authentication policy

B.  

Decryption policy

C.  

Security policy

D.  

Application Override policy

Discussion 0
Question # 5

Which administrative authentication method supports authorization by an external service?

Options:

A.  

RADIUS

B.  

SSH keys

C.  

Certification

D.  

LDAP

Discussion 0
Question # 6

An administrator has left a firewall to used default port for all management services. Which three function performed by the dataplane? (Choose three.)

Options:

A.  

NTP

B.  

antivirus

C.  

NAT

D.  

WildFire updates

E.  

file blocking

Discussion 0
Question # 7

An administrator has been asked to configure active/active HA for a pair of Palo Alto Networks NGFWs. The firewalls use layer 3 interface to send traffic to a single gateway IP for the pair.

Which configuration will enable this HA scenario?

Options:

A.  

The firewall do not use floating IPs in active/active H

A.  

B.  

The two firewalls will share a single floating IP and will use gratuitous ARP to share the floating IP.

C.  

The firewalls will share the sameinterface IP address, and device 1 will use the floating IP if device 0 fails.

D.  

Each firewall will have a separate floating IP. and priority will determine which firewall has the primary IP.

Discussion 0
Question # 8

A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the switch it connect.

How would an administrator configure the interface to IGbps?

Options:

A.  

set deviceconfig system speed-duplex 10Gbps-full-duplex

B.  

set deviceconfig interface speed-duplex 1Gbs--full-duplex

C.  

set deviceconfig interface speed-duplex 1Gbs--half-duplex

D.  

set deviceconfig system speed-duplex 1Gbs--half-duplex.

Discussion 0
Question # 9

Which method will dynamically register tags on the Palo Alto Networks NGFW?

Options:

A.  

Restful API or the VMware API on the firewall or on theUser.-D agent or the ready -only domain controller

B.  

XML API or the VMware API on the firewall on the User-ID agent or the CLI

C.  

Restful API or the VMware API on the firewall or on the User-ID Agent

D.  

XML- API or lite VM Monitoring agent on the NGFW oron the User- ID agent

Discussion 0
Question # 10

A session in the Traffic log is reporting the application as "incomplete”

What does "incomplete" mean?

Options:

A.  

The three-way TCP handshake did notcomplete.

B.  

Data was received but wan instantly discarded because of a Deny policy was applied before App ID could be applied.

C.  

The three-way TCP handshake was observed, but the application could not be identified.

D.  

The traffic is coming across UDP, and the application could not be identified.

Discussion 0
Question # 11

An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port. Which log entry can the administrator use to verify that sessions are being decrypted?

Options:

A.  

Decryption tag

B.  

In the details of the Threat log entries

C.  

In the details of the Traffic log entries

D.  

Data filtering log

Discussion 0
Get PCNSC dumps and pass your exam in 24 hours!

Free Exams Sample Questions