Test Online Free Paloalto Networks PCNSC Exam Questions and Answers

The questions for PCNSC were last updated On Oct.14 2022

Get PCNSC Full Access
 / 1

Question No : 1
During the packet flow process, which two processes are performed in application identification? (Choose two.)

Answer:

Question No : 2
Which event will happen administrator uses an Application Override Policy?

Answer:

Question No : 3
When a malware-infected host attempts to resolve a known command-and-control server, the traffic matches a security policy with DNS sinhole enabled, generating a traffic log.
What will be the destination IP Address in that log entry?

Answer:
Explanation:
https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Verify-DNS-Sinkhole-Function-is-Working/ta-p/65864

Question No : 4
Which option would an administration choose to define the certificate and protect that Panorama and its managed devices uses for SSL/ITS services?

Answer:

Question No : 5
A global corporate office has a large-scale network with only one User-ID agent, which creates a bottleneck near the User-ID agent server.
Which solution in PAN -OS® software would help in this case?

Answer:

Question No : 6
Refer to the exhibit.



A web server in the DMZ is being mapped to a public address through DNAT.
Which Security policy rule will allow traffic to flow to the web server?

Answer:

Question No : 7
Which PAN-OS® policy must you configure to force a user to provide additional credential before he is allowed to access an internal application that contains highly sensitive business data?

Answer:

Question No : 8
Which two methods can be used to verify firewall connectivity to Autofocus? (Choose two)

Answer:

Question No : 9
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will be detected as credential theft?

Answer:

Question No : 10
An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port.
Which log entry can the administrator use to verify that sessions are being decrypted?

Answer:

 / 1
  TOP 50 Exam Questions
Exam