Search Header Logo

Lab Exercises Security Profiles

Authored by Steve Brusas

Professional Development

1st - 3rd Grade

Used 32+ times

Lab Exercises Security Profiles
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A "Continue" action can be configured on the following Security Profiles:

URL Filtering, File Blocking, and Data Filtering

URL Filtering

URL Filtering and Antivirus

URL Filtering and File Blocking

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which Palo Alto Networks Next Generation Firewall URL Category Action sends a response page to the user's browser that prompts the user for the administrator-defined override password, and logs the action to the URL Filtering log?

override

continue

block

alert

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three statements describe the operation of Security policy rules and Security Profiles? (Choose three.)

Security Profiles are attached to Security policy rules.

Security policy rules inspect but do not block traffic.

Security Profiles should be used only on allowed traffic.

Security policy rules can block or allow traffic.

Security policy rules are attached to Security Profiles.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An administrator has been asked to configure a Palo Alto Networks NGFW to provide protection against worms and trojans.

Which Security Profile type will protect against worms and trojans?

Anti-Spyware

Instruction Prevention

File Blocking

Antivirus

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server.

Which security profile components will detect and prevent this threat after the firewall's signature database has been updated?

antivirus profile applied to outbound security policies

data filtering profile applied to inbound security policies

data filtering profile applied to outbound security policies

vulnerability profile applied to inbound security policies

Answer explanation

Media Image

PCNSA Study Guide pg. 41

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two security profile types can be attached to a security policy? (Choose two.)

antivirus

DDoS protection

threat

vulnerability protection

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop. The malware contacted a known command- and-control server, which caused the infected laptop to begin exfiltrating corporate data.

Which security profile feature could have been used to prevent the communication with the command-and-control server?

Create an anti-spyware profile and enable DNS Sinkhole feature.

Create an antivirus profile and enable its DNS Sinkhole feature.

Create a URL filtering profile and block the DNS Sinkhole URL category

Create a Data Filtering Profiles and enable its DNS Sinkhole feature.

Answer explanation

Media Image

PCNSA Study Guide pg. 140

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?