PCNSC question 21 to 40

PCNSC question 21 to 40

Professional Development

20 Qs

quiz-placeholder

Similar activities

QUIZ ACTIVITY - MODULE 4 & 5 _ IME_BESCK204D_B SECTION

QUIZ ACTIVITY - MODULE 4 & 5 _ IME_BESCK204D_B SECTION

Professional Development

20 Qs

RME Review - VFD Motor Starter

RME Review - VFD Motor Starter

Professional Development

20 Qs

RME Review - Repair and Maintenance

RME Review - Repair and Maintenance

Professional Development

20 Qs

Electric Vehicles

Electric Vehicles

Professional Development

15 Qs

Electronic Warfare Techniques Quiz

Electronic Warfare Techniques Quiz

Professional Development

15 Qs

Quiz on Hybrid Electric Vehicles

Quiz on Hybrid Electric Vehicles

Professional Development

17 Qs

Exploring Web Services and Spring Boot

Exploring Web Services and Spring Boot

Professional Development

25 Qs

Microprocessor Quiz

Microprocessor Quiz

Professional Development

22 Qs

PCNSC question 21 to 40

PCNSC question 21 to 40

Assessment

Quiz

Engineering

Professional Development

Hard

Created by

Juan Juan

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

CLASSIFICATION QUESTION

3 mins • 1 pt

​ ​ ​

​ ​ ​ Match the command with the appropriate scenario for its use

Groups:

(a) Management plane resource

,

(b) Data plane resources

,

(c) State of various processes

,

(d) Authentication log

show system resources

debug dataplane packet-diag

show running resource-monitor

tail follow yes mp.log authd.log

tail follow yes dp.log authd.log

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your customer is setting up an IPsec VPN tunnel with a third party. The third-party device only supports policy-based IPsec VPN tunnels.
What must be set up on the IPsec tunnel on the Palo Alto Networks Next-Generation Firewall to support policy-based tunnels?

policy-based forwarding

static route

Proxy-ID

DNS proxy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which category of Vulnerability Signatures is most likely to trigger false positive alerts?

info-leak

code-execution

phishing

brute-force

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information is required in order to plan the deployment of a perimeter firewall?

the management IP of the DSL device provided by the ISP

The operating system and browser version of the management client

the link type and speed of the surrounding devices

the name of the Internet provider and the cost of the link

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A customer uses an application on the network that shows unknown-tcp application in the traffic logs.
Which two actions can the administrator take to make the application display this information? (Choose two.)

Create a custom application by using fingerprinting applications

Submit a request for a new App-ID on the Application & Threat Research Center

Create a customer application by using signatures

Submit a request for new App-ID with Unit-42

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when a packet from an existing session is received by a firewall that is not the owner in an HA active/active configuration?

The firewall requests the sender to resend the packet

The firewall forwards the packet to the peer firewall over the HA3 link.

The firewall takes ownership of the session from the peer firewall

The firewall drops the packet to prevent any L3 loops.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have just completed a firewall migration project in Expedition. Expedition is not directly connected to a firewall. You decide to export the configuration.
What two file types will be available to you in the download options? (Choose two.)

a tech support file for the target firewall

the README file describing how to use the XML file

a TXT file with SET commands

an XML file to upload to the Palo Alto Networks device

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?