Ugur IT Academy PCNSA Exam - Question No Answers ExamTopics
Ugur IT Academy PCNSA Exam - Question No Answers ExamTopics
Question #1 Topic 1
DRAG DROP -
Match the Palo Alto Networks Security Operating Platform architecture to its description.
Question #2 Topic 1
Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?
A. management
B. network processing
C. data
D. security processing
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 1/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 1
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an
application identified by
App-ID as SuperApp_base.
On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be
deployed in 30 days.
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
A. All traffic matching the SuperApp_chat, and SuperApp_download is denied because it no longer matches the SuperApp-base application
C. No impact because the firewall automatically adds the rules to the App-ID interface
D. All traffic matching the SuperApp_base, SuperApp_chat, and SuperApp_download is denied until the security administrator approves the
applications
Question #4 Topic 1
How many zones can an interface be assigned with a Palo Alto Networks firewall?
A. two
B. three
C. four
D. one
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 2/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 1
Which two configuration settings shown are not the default? (Choose two.)
C. Enable Session
D. Enable Probing
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 3/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 1
Which dataplane layer of the graphic shown provides pattern protection for spyware and vulnerability exploits on a Palo Alto Networks Firewall?
A. Signature Matching
B. Network Processing
C. Security Processing
D. Data Interfaces
Question #7 Topic 1
Which option shows the attributes that are selectable when setting up application filters?
Question #8 Topic 1
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
A. Block List
D. Allow List
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 4/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 1
DRAG DROP -
Which two statements are correct about App-ID content updates? (Choose two.)
A. Updated application content might change how Security policy rules are enforced.
B. After an application content update, new applications must be manually classified prior to use.
C. Existing security policy rules are not affected by application content updates.
D. After an application content update, new applications are automatically identified and classified.
Which User-ID mapping method should be used for an environment with users that do not authenticate to Active Directory?
C. Captive Portal
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple
A. Create an Application Filter and name it Office Programs, then filter it on the business-systems category, office-programs subcategory
C. Create an Application Filter and name it Office Programs, then filter it on the business-systems category
D. Create an Application Group and add Office 365, Evernote, Google Docs, and Libre Office
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 5/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
C. The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus prevention
activities
D. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?
A. intrazone-default
B. Deny Google
C. allowed-security services
D. interzone-default
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 6/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and
None?
A. Translation Type
B. Interface
C. Address Type
D. IP Address
A. Virtual Wire
B. Layer3
C. Layer2
D. Loopback
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 7/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
DRAG DROP -
Order the steps needed to create a new security zone with a Palo Alto Networks firewall.
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
A. An implicit dependency does not require the dependent application to be added in the security policy
B. An implicit dependency requires the dependent application to be added in the security policy
C. An explicit dependency does not require the dependent application to be added in the security policy
D. An explicit dependency requires the dependent application to be added in the security policy
Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping.
What is the quickest way to reset the hit counter to zero in all the security policy rules?
A. At the CLI enter the command reset rules and press Enter
B. Highlight a rule and use the Reset Rule Hit Counter > Selected Rules for each rule
D. Use the Reset Rule Hit Counter > All Rules option
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 8/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two App-ID applications will you need to allow in your Security policy to use facebook-chat? (Choose two.)
A. facebook
B. facebook-chat
C. facebook-base
D. facebook-email
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management
plane resources?
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You
must collect IP
`"to-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The
Given the scenario, choose the option for sending IP-to-user mappings to the NGFW.
A. syslog
B. RADIUS
C. UID redistribution
D. XFF headers
An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to
Which two security profile components will detect and prevent this threat after the firewall's signature database has been updated? (Choose two.)
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 9/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?
A. Delivery
B. Reconnaissance
D. Exploitation
Identify the correct order to configure the PAN-OS integrated USER-ID agent.
1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent
A. 2-3-4-1
B. 1-4-3-2
C. 3-1-2-4
D. 1-3-2-4
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.
Security Policy: Source Zone: Internal to DMZ Zone __________services `Application defaults`, and action = Allow
B. Application = "Telnet"
C. Log Forwarding
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 10/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Based on the security policy rules shown, ssh will be allowed on which port?
A. 80
B. 53
C. 22
D. 23
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
A. Threat Prevention
B. WildFire
C. Antivirus
D. URL Filtering
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 11/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image
shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?
B. north-south traffic
C. perimeter traffic
D. east-west traffic
Given the topology, which zone type should zone A and zone B to be configured with?
A. Layer3
B. Tap
C. Layer2
D. Virtual Wire
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 12/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?
A. domain controller
B. TACACS+
C. LDAP
D. RADIUS
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
A. Layer 2
B. Tap
C. Layer 3
D. Virtual Wire
Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator
account?
A. Root
B. Dynamic
C. Role-based
D. Superuser
Which administrator type utilizes predefined roles for a local administrator account?
A. Superuser
B. Role-based
C. Dynamic
D. Device administrator
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 13/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two security profile types can be attached to a security policy? (Choose two.)
A. antivirus
B. DDoS protection
C. threat
D. vulnerability
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto
their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from
the laptop.
Which security profile feature could have been used to prevent the communication with the CnC server?
C. Create a URL filtering profile and block the DNS Sinkhole category
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?
Which three statements describe the operation of Security policy rules and Security Profiles? (Choose three.)
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 14/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the image, which two options are true about the Security policy rules. (Choose two.)
Which type of Security policy rule would match traffic flowing between the Inside zone and Outside zone, within the Inside zone, and within the
Outside zone?
A. global
B. intrazone
C. interzone
D. universal
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet
gateways?
A. GlobalProtect
B. AutoFocus
C. Aperture
D. Panorama
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 15/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two statements are correct regarding multiple static default routes when they are configured as shown in the image? (Choose two.)
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can run malicious code against a targeted machine.
A. Exploitation
B. Installation
C. Reconnaissance
D. Act on Objective
Which file is used to save the running configuration with a Palo Alto Networks firewall?
A. running-config.xml
B. run-config.xml
C. running-configuration.xml
D. run-configuration.xml
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 16/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
In the example security policy shown, which two websites would be blocked? (Choose two.)
A. LinkedIn
B. Facebook
C. YouTube
D. Amazon
Which Palo Alto Networks component provides consolidated policy creation and centralized management?
A. GlobalProtect
B. Panorama
C. Prisma SaaS
D. AutoFocus
A. The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture,
B. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
A. User identification
B. Filtration protection
C. Vulnerability protection
D. Antivirus
E. Application identification
F. Anti-spyware
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 17/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
The PowerBall Lottery has reached a high payout amount and a company has decided to help employee morale by allowing employees to check
the number, but doesn't want to unblock the gambling URL category.
Which two methods will allow the employees to get to the PowerBall Lottery site without the company unlocking the gambling URL category?
(Choose two.)
A. Add all the URLs from the gambling category except powerball.com to the block list and then set the action for the gambling category to
allow.
D. Create a custom URL category called PowerBall and add *.powerball.com to the category and set the action to allow.
Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive
information?
A. Aperture
B. AutoFocus
C. Panorama
D. GlobalProtect
An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to
Which security profile components will detect and prevent this threat after the firewall's signature database has been updated?
B. New URLs
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 18/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A server-admin in the USERS-zone requires SSH-access to all possible servers in all current and future Public Cloud environments. All other
required connections have already been enabled between the USERS- and the OUTSIDE-zone. What configuration-changes should the Firewall-
admin make?
A. Create a custom-service-object called SERVICE-SSH for destination-port-TCP-22. Create a security-rule between zone USERS and OUTSIDE
to allow traffic from any source IP-address to any destination IP-address for SERVICE-SSH
B. Create a security-rule that allows traffic from zone USERS to OUTSIDE to allow traffic from any source IP-address to any destination IP-
C. In addition to option a, a custom-service-object called SERVICE-SSH-RETURN that contains source-port-TCP-22 should be created. A second
security-rule is required that allows traffic from zone OUTSIDE to USERS for SERVICE-SSH-RETURN for any source-IP-address to any
destination-Ip-address
D. In addition to option c, an additional rule from zone OUTSIDE to USERS for application SSH from any source-IP-address to any destination-
IP-address is required to allow the return-traffic from the SSH-servers to reach the server-admin
A. every 5 minutes
B. every 15 minutes
C. every 60 minutes
D. every 30 minutes
What is the minimum frequency for which you can configure the firewall to check for new WildFire antivirus signatures?
A. every 30 minutes
B. every 5 minutes
C. every 24 hours
D. every 1 minute
Your company has 10 Active Directory domain controllers spread across multiple WAN links. All users authenticate to Active Directory. Each link
has substantial network bandwidth to support all mission-critical applications. The firewall's management plane is highly utilized.
Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
B. Captive Portal
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 19/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
DRAG DROP -
Arrange the correct order that the URL classifications are processed within the system.
What must you configure to enable the firewall to access multiple Authentication Profiles to authenticate a non-local account?
A. authentication sequence
C. antivirus profile
D. vulnerability profile
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 20/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Tap
B. Layer3
C. Virtual Wire
D. Layer2
Which URL Filtering Profile action does not generate a log entry when a user attempts to access a URL?
A. Override
B. Allow
C. Block
D. Continue
An internal host needs to connect through the firewall using source NAT to servers of the internet.
Which Security Profile can provide protection against ICMP floods, based on individual combinations of a packet's source and destination IP
addresses?
A. DoS protection
B. URL filtering
C. packet buffering
D. anti-spyware
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 21/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which path in PAN-OS 9.0 displays the list of port-based security policy rules?
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
A. Layer-ID
B. User-ID
C. QoS-ID
D. App-ID
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
A. Device>Setup>Services
B. Device>Setup>Management
C. Device>Setup>Operations
D. Device>Setup>Interfaces
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 22/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
DRAG DROP -
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application
signatures?
A. Review Policies
B. Review Apps
C. Pre-analyze
A. Select a Security policy rule, and then select Hit Count > Reset.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 23/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the topology, which zone type should you configure for firewall interface E1/1?
A. Tap
B. Tunnel
C. Virtual Wire
D. Layer3
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
A. Management
B. High Availability
C. Aggregate
D. Aggregation
Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that
A. intrazone
B. interzone
C. universal
D. global
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 24/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Four configuration choices are listed, and each could be used to block access to a specific URL. If you configured each choice to block the same
URL then which choice would be the last to block access to the URL?
Which data flow direction is protected in a zero-trust firewall deployment that is not protected in a perimeter-only firewall deployment?
A. north-south
B. inbound
C. outbound
D. east-west
Which protocol is used to map usernames to user groups when User-ID is configured?
A. TACACS+
B. SAML
C. LDAP
D. RADIUS
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 25/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone.
Complete the two empty fields in the Security policy rules that permits only this type of access.
Application: _________?
Service: ____________?
Action: allow -
(Choose two.)
A. Service = ג€application-defaultג€
B. Service = ג€service-telnetג€
C. Application = ג€Telnetג€
D. Application = ג€anyג€
A. Anti-Spyware Profile
C. Antivirus Profile
Which two statements are true for the DNS Security service introduced in PAN-OS version 9.0? (Choose two.)
C. It functions like PAN-DB and requires activation through the app portal.
D. It removes the 100K limit for DNS entries for the downloaded DNS updates.
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
A. GlobalProtect agent
B. XML API
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 26/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop. The malware contacted a
known command- and-control server, which caused the infected laptop to begin exfiltrating corporate data.
Which security profile feature could have been used to prevent the communication with the command-and-control server?
C. Create a URL filtering profile and block the DNS Sinkhole URL category
D. Create a Data Filtering Profiles and enable its DNS Sinkhole feature.
You must configure which firewall feature to enable a data-plane interface to submit DNS queries on behalf of the control plane?
A. virtual router
C. DNS proxy
D. service route
Which component provides network security for mobile endpoints by inspecting traffic routed through gateways?
A. Prisma SaaS
B. GlobalProtect
C. AutoFocus
D. Panorama
For the firewall to use Active Directory to authenticate users, which Server Profile is required in the Authentication Profile?
A. TACACS+
B. RADIUS
C. LDAP
D. SAML
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 27/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which operations are allowed when working with App-ID application tags?
Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's
Which type of administrative role must you assign to a firewall administrator account, if the account must include a custom set of firewall
permissions?
A. Role-based
B. Multi-Factor Authentication
C. Dynamic
D. SAML
A. When guided by authorized sales engineer, it helps determine the areas of greatest security risk
C. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 28/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Based on the screenshot presented, which column contains the link that when clicked, opens a window to display all applications matched to the
policy rule?
A. Apps Allowed
B. Service
C. Name
D. Apps Seen
A. PAN-DB database
B. DNS Security
A. They are groups that are imported from RADIUS authentication servers.
B. They are the only groups visible based on the firewall's credentials.
C. They contain only the users you allow to manage the firewall.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 29/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Based on the graphic, which statement accurately describes the output shown in the Server Monitoring panel?
Which action results in the firewall blocking network traffic without notifying the sender?
A. Drop
B. Deny
C. Reset Server
D. Reset Client
A. create a policy that provides auto-remediation for anomalous user behavior and malicious activity
C. create a QoS policy that provides auto-remediation for anomalous user behavior and malicious activity
D. create a policy that provides auto-sizing for anomalous user behavior and malicious activity
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 30/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows
A. global
B. intrazone
C. interzone
D. universal
You notice that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which
traffic would you need to monitor and block to mitigate the malicious activity?
B. north-south traffic
C. perimeter traffic
D. east-west traffic
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 31/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
DRAG DROP -
Match each feature to the DoS Protection Policy or the DoS Protection Profile.
Which type of administrator account cannot be used to authenticate user traffic flowing through the firewall's data plane?
A. Kerberos user
B. SAML user
D. local user
A. every 15 minutes
B. every 30 minutes
C. every 60 minutes
D. every 5 minutes
Starting with PAN-OS version 9.1, which new type of object is supported for use within the User field of a Security policy rule?
A. remote username
D. local username
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 32/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which link in the web interface enables a security administrator to view the Security policy rules that match new application signatures?
B. Review Apps
C. Pre-analyze
D. Review Policies
Based on the shown security policy, which Security policy rule would match all FTP traffic from the inside zone to the outside zone?
A. interzone-default
B. internal-inside-dmz
C. inside-portal
D. egress-outside
A. backup
B. candidate
C. running
D. committed
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 33/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which three configuration settings are required on a Palo Alto Network firewall management interface? (Choose three.)
A. hostname
B. netmask
C. default gateway
D. auto-negotiation
E. IP address
At which point in the App-ID update process can you determine if an existing policy rule is affected by an App-ID update?
You receive notification about a new malware that infects hosts. An infection results in the infected host attempting to contact a command-and-
control server.
Which Security Profile detects and prevents this threat from establishing a command-and-control connection?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 34/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
C. When guided by an authorized sales engineer, it helps determine the areas of greatest risk where you should focus prevention activities.
D. It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network and security architecture.
The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access
the PowerBall
Lottery website (www.powerball.com) for just this week. However, the company does not want employees to access any other websites also
Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the `gambling` URL category?
D. Create a custom URL category, add *.powerball.com to it and allow it in the Security Profile.
Which Palo Alto Networks service protects cloud-based applications such as Dropbox and Salesforce by monitoring permissions and shares and
A. Prisma SaaS
B. AutoFocus
C. Panorama
D. GlobalProtect
In a Security policy, what is the quickest way to reset all policy rule hit counters to zero?
A. Highlight each rule and use the Reset Rule Hit Counter > Selected Rules
C. Use the Reset Rule Hit Counter > All Rules option
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 35/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Based on the Security policy rules shown, SSH will be allowed on which port?
C. any port
You receive notification about new malware that is being used to attack hosts. The malware exploits a software bug in common application.
Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?
Palo Alto Networks firewall architecture accelerates content inspection performance while minimizing latency using which two components?
(Choose two.)
B. Policy Engine
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 36/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which log setting configuration is consistent with best practices for normal traffic?
Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
A. URL filtering
B. vulnerability protection
C. anti-spyware
D. antivirus
Given the topology, which zone type should zone A and zone B to be configured with?
A. Layer3
B. Ethernet
C. Layer2
D. Virtual Wire
Assume a custom URL Category Object of `NO-FILES` has been created to identify a specific website.
How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
A. Create a Security policy with a URL Filtering profile that references the site access setting of block to NO-FILES.
B. Create a Security policy that references NO-FILES as a URL Category qualifier with an appropriate File Blocking profile.
C. Create a Security policy with a URL Filtering profile that references the site access setting of continue to NO-FILES.
D. Create a Security policy that references NO-FILES as a URL Category qualifier with an appropriate Data Filtering profile.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 37/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?
A. authorization
B. continue
C. authentication
D. override
A. An Application Group is a static way of grouping applications and cannot be configured as a nested member of Application Group.
B. An Application Group is a dynamic way of grouping applications and can be configured as a nested member of an Application Group.
C. An Application Filter is a dynamic way to group applications and can be configured as a nested member of an Application Group.
D. An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group.
A. Objects
B. Monitor
C. Device
D. Policies
An administrator wishes to follow best practices for logging traffic that traverses the firewall.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 38/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)
A. QoS profile
An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs.
A. Select the interzone-default rule and click Override; on the Actions tab, select Log at Session End and click OK.
B. Select the interzone-default rule and edit the rule; on the Actions tab, select Log at Session End and click OK.
C. Select the interzone-default rule and edit the rule; on the Actions tab, select Log at Session Start and click OK.
D. This rule has traffic logging enabled by default; no further action is required.
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1.
What changes are required on VR-1 to route traffic between two interfaces on the NGFW?
An administrator wants to prevent users from submitting corporate credentials in a phishing attack.
A. antivirus
B. anti-spyware
C. URL-filtering
D. vulnerability protection
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 39/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two rule types allow the administrator to modify the destination zone? (Choose two.)
A. interzone
B. shadowed
C. intrazone
D. universal
B. migrate other firewall vendors' security rules to Palo Alto Networks configuration
Based on the screenshot, what is the purpose of the group in User labelled `it`?
Which action results in the firewall blocking network traffic without notifying the sender?
A. Drop
B. Deny
C. No notification
D. Reset Client
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 40/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic.
Which statement accurately describes how the firewall will apply an action to matching traffic?
C. If it is a block rule, then the Security policy rule action is applied last.
Which Security profile can you apply to protect against malware such as worms and Trojans?
A. antivirus
B. data filtering
C. vulnerability protection
D. anti-spyware
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 41/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH,
A.
B.
C.
D.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 42/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which license is required to use the Palo Alto Networks built-in IP address EDLs?
A. DNS Security
B. Threat Prevention
C. WildFire
D. SD-Wan
A. Panorama automatically removes local configuration locks after a commit from Panorama.
B. Local configuration locks prohibit Security policy changes for a Panorama managed device.
DRAG DROP -
Place the following steps in the packet processing order of operations from first to last.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 43/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. IP netmask
B. IP subnet
C. IP wildcard mask
D. IP range
A. decryption profile
B. destination interface
C. timeout (min)
D. application
You have been tasked to configure access to a new web server located in the DMZ.
Based on the diagram what configuration changes are required in the NGFW virtual router to route traffic from the 10.1.1.0/24 network to
192.168.1.0/24?
A. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/2 with a next-hop of 172.16.1.2.
B. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/3 with a next-hop of 192.168.1.10
C. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/3 with a next-hop of 172.16.1.2.
D. Add a route with the destination of 192.168.1.0/24 using interface Eth 1/3 with a next-hop of 192.168.1.254.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 44/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new
A. Reset server
B. Reset both
C. Deny
D. Drop
Selecting the option to revert firewall changes will replace what settings?
An administrator has configured a Security policy where the matching condition includes a single application, and the action is drop.
If the application's default deny action is reset-both, what action does the firewall take?
Which three types of authentication services can be used to authenticate user traffic flowing through the firewall's data plane? (Choose three.)
A. SAML 2.0
B. Kerberos
C. TACACS
D. TACACS+
E. SAML 1.0
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 45/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which objects would be useful for combining several services that are often defined together?
A. application filters
B. service groups
D. application groups
Given the screenshot, what two types of route is the administrator configuring? (Choose two.)
A. BGP
B. static route
C. default route
D. OSPF
Which rule type is appropriate for matching traffic both within and between the source and destination zones?
A. interzone
B. shadowed
C. intrazone
D. universal
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 46/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to override the default deny action for a given application, and instead would like to block the traffic and send the
ICMP code
A. Drop
C. Reset both
D. Reset server
You receive notification about new malware that infects hosts through malicious files transferred by FTP.
Which Security profile detects and protects your internal networks from this threat after you update your firewall's threat signature database?
An administrator wants to prevent access to media content websites that are risky.
Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two.)
A. recreation-and-hobbies
B. streaming-media
C. known-risk
D. high-risk
A. PAN-DB
D. Antivirus
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 47/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to silently drop traffic from the internet to a ftp server.
A. Drop
B. Deny
C. Block
D. Reset-server
Which object would an administrator create to block access to all high-risk applications?
A. HIP profile
C. application group
D. application filter
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of
time?
B. Automatically ג€download and installג€ but with the ג€disable new applicationsג€ option used
C. Automatically ג€download onlyג€ and then install Applications and Threats later, after the administrator approves the update
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 48/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What must be considered with regards to content updates deployed from Panorama?
B. Panorama can only install up to five content versions of the same type for potential rollback scenarios.
D. Panorama can only download one content update at a time for content updates of the same type.
During the packet flow process, which two processes are performed in application identification? (Choose two.)
Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.
Which Security policy rule will allow traffic to flow to the web server?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 49/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What does an administrator use to validate whether a session is matching an expected NAT policy?
A. system log
B. test command
C. threat log
D. config audit
B. It causes HA synchronization to occur automatically between the HA peers after a push from Panorama.
C. It reverts the firewall configuration if the firewall recognizes a loss of connectivity to Panorama after the change.
D. It generates a config log after the Panorama configuration successfully reverts to the last running configuration.
According to the best practices for mission critical devices, what is the recommended interval for antivirus updates?
A. by minute
B. hourly
C. daily
D. weekly
DRAG DROP -
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 50/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which Security policy match condition would an administrator use to block traffic from IP addresses on the Palo Alto Networks EDL of Known
Malicious IP
Addresses list?
A. destination address
B. source address
C. destination zone
D. source zone
URL categories can be used as match criteria on which two policy types? (Choose two.)
A. authentication
B. decryption
C. application override
D. NAT
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 51/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server
based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic.
Which two Security policy rules will accomplish this configuration? (Choose two.)
Which type of profile must be applied to the Security policy rule to protect against buffer overflows, illegal code execution, and other attempts to
A. URL filtering
B. vulnerability protection
C. file blocking
D. anti-spyware
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 52/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What action will inform end users when their access to Internet content is being restricted?
C. Ensure that the ג€site accessג€ setting for all URL sites is set to ג€alertג€.
What is a recommended consideration when deploying content updates to the firewall from Panorama?
A. Before deploying content updates, always check content release version compatibility.
B. Content updates for firewall A/P HA pairs can only be pushed to the active firewall.
C. Content updates for firewall A/A HA pairs need a defined master device.
Which information is included in device state other than the local configuration?
A. uncommitted changes
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 53/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
A. It defines the SSL/TLS encryption strength used to protect the management interface.
C. It defines the certificate to send to the client's browser from the management interface.
An administrator is troubleshooting an issue with traffic that matches the intrazone-default rule, which is set to default configuration.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 54/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
During the App-ID update process, what should you click on to confirm whether an existing policy rule is affected by an App-ID update?
A. check now
B. review policies
D. download
A. domain match
B. host names
C. wildcard
D. category match
When HTTPS for management and GlobalProtect are enabled on the same interface, which TCP port is used for management access?
A. 80
B. 8443
C. 4443
D. 443
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 55/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What two authentication methods on the Palo Alto Networks firewalls support authentication and authorization for role-based access control
A. SAML
B. TACACS+
C. LDAP
D. Kerberos
Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content whose services are frequently
Which security policy match condition would an administrator use to block traffic to IP addresses on the Palo Alto Networks Bulletproof IP
Addresses list?
A. source address
B. destination address
C. source zone
D. destination zone
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 56/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which three filter columns are available when setting up an Application Filter? (Choose three.)
A. Parent App
B. Category
C. Risk
D. Standard Ports
E. Subcategory
Which stage of the cyber attack lifecycle makes it important to provide ongoing education to users on spear phishing links, unknown emails, and
risky websites?
A. reconnaissance
B. delivery
C. installation
D. exploitation
A coworker found a USB labeled "confidential in the parking lot. They inserted the drive and it infected their corporate laptop with unknown
malware The malware caused the laptop to begin infiltrating corporate data.
Which Security Profile feature could have been used to detect the malware on the laptop?
A. DNS Sinkhole
B. WildFire Analysis
C. Antivirus
D. DoS Protection
A. Threat Prevention
C. User-ID
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 57/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?
A. block
B. sinkhole
C. allow
D. alert
A. Policy Optimizer can be used on a schedule to automatically create a disabled Layer 7 App ID Security policy for every Layer 4 policy that
exist. Admins can then manually enable policies they want to keep and delete ones they want to remove.
B. Policy Optimizer can display which Security policies have not been used in the last 90 days.
C. Policy Optimizer on aVM-50 firewall can display which Layer 7 App-ID Security policies have unused applications.
D. Policy Optimizer can add or change a Log Forwarding profile for each Security policy selected.
Which two statements are correct regarding multiple static default routes when they are configured as shown in the image? (Choose two.)
C. The virtual router would load balance across the two routes.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 58/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An address object of type IP Wildcard Mask can be referenced in which part of the configuration?
You receive notification about a new malware that infects hosts. An infection results in the infected host attempting to contact command-and-
control server.
Which Security Profile, when applied to outbound Security policy rules, detects and prevents this threat from establishing a command-and-control
connection?
A. Anti-Spyware Profile
C. Antivirus Profile
A. Policy Optimizer
B. Prisma SaaS
C. GlobalProtect
D. Panorama
An administrator needs to create a Security policy rule that matches DNS traffic within the LAN zone, and also needs to match DNS traffic within
The administrator does not want to allow traffic between the DMZ and LAN zones.
A. interzone
B. intrazone
C. default
D. universal
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 59/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
According to best practices, how frequently should WildFire updates he made to perimeter firewalls?
A. every 10 minutes
B. every minute
C. every 5 minutes
D. in real time
Given the topology, which interface type should you configure for firewall interface E1/1?
A. Layer 2
B. virtual wire
C. tap
D. mirror port
Which solution is a viable option to capture user identification when Active Directory is not in use?
C. group mapping
D. Authentication Portal
What allows a security administrator to preview the Security policy rules that match new application signatures?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 60/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User ID?
B. Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or 389.
C. Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL.
An administrator needs to add capability to perform real time signature lookups to block or sinkhole all known malware domains.
A. Content ID
B. App-ID
D. User-ID
Which action would an administrator take to ensure that a service object will be available only to the selected device group?
Which built-in IP address EDL would be useful for preventing traffic from IP addresses that are verified as unsafe based on WildFire analysis, Unit
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 61/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to determine the default deny action for the application dns-over-https.
B. Check the action for the Security policy matching that traffic
A. PAN-DB database
C. DNS Security
A. ensure that policy rules are not shadowing other policy rules
B. confirm that rules meet or exceed the Best Practice Assessment recommendations
C. confirm that policy rules in the configuration are allowing donning the correct traffic
Which attribute can a dynamic address group use as a filtering condition to determine its membership?
A. subnet mask
B. tag
C. IP address
D. wildcard mask
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 62/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
View the diagram. What is the most restrictive, yet fully functional rule, to allow general Internet and SSH traffic into both the DMZ and
A.
B.
C.
D.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 63/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are the three DNS Security categories available to control DNS traffic? (Choose three.)
A. Parked Domains
B. Spyware Domains
C. Vulnerability Domains
D. Phishing Domains
E. Malware Domains
What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)
A. firewall logs
The compliance officer requests that all evasive applications need to be blocked on all perimeter firewalls out to the internet. The firewall is
Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this
A. Create a deny rule at the top of the policy from trust to untrust with service application-default and add an application filter with the evasive
characteristic
B. Create a deny rule at the top of the policy from trust to untrust over any service and select evasive as the application
C. Create a deny rule at the top of the policy from trust to untrust with service application-default and select evasive as the application
D. Create a deny rule at the top of the policy from trust to untrust over any service and add an application filter with the evasive characteristic
Which object would an administrator create to enable access to all applications in the office-programs subcategory?
A. HIP profile
B. URL category
C. application group
D. application filter
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 64/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the detailed log information above, what was the result of the firewall traffic inspection?
An administrator wants to create a No-NAT rule to exempt a flow from the default NAT rule.
D. Create a new NAT rule with the correct parameters and leave the translation type as None.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 65/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What can be achieved by selecting a policy target prior to pushing policy rules from Panorama? *
A. You can specify the location as pre- or post-rules to push policy rules
B. You can specify the firewalls in a device group to which to push policy rules
C. Doing so provides audit information prior to making changes for selected policy rules
When an ethernet interface is configured with an IPv4 address, which type of zone is it a member of?
A. Layer 3
B. Virtual Wire
C. Tap
D. Tunnel
An administrator would like to create a URL Filtering log entry when users browse to any gambling website.
An administrator is investigating a log entry for a session that is allowed and has the end reason of aged-out.
Which two fields could help in determining if this is normal? (Choose two.)
A. IP Protocol
B. Packets sent/received
C. Decrypted
D. Action
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 66/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are three characteristics of the Palo Alto Networks DNS Security service? (Choose three.)
After making multiple changes to the candidate configuration of a firewall, the administrator would like to start over with a candidate configuration
Which command in Device > Setup > Operations would provide the most operationally efficient way to accomplish this?
What are three valid ways to map an IP address to a username? (Choose three.)
A. 192.168.40.1-192.168.40.255
B. 192.168.40.1-255
C. 192.168.40.1, 192.168.40.255
D. 192.168.40.1/24
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 67/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator is troubleshooting traffic that should match the interzone-default rule. However, the administrator doesn't see this traffic in the
traffic logs on the firewall. The interzone-default was never changed from its default configuration.
What do you configure if you want to set up a group of objects based on their ports alone?
A. address groups
B. custom objects
C. application groups
D. service groups
What are two valid selections within a Vulnerability Protection profile? (Choose two.)
A. deny
B. drop
C. default
D. sinkhole
Which three interface deployment methods can be used to block traffic flowing through the Palo Alto Networks firewall? (Choose three.)
A. Tap
B. HA
C. Layer 3
D. Layer 2
E. Virtual Wire
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 68/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to override the default deny action for a given application, and instead would like to block the traffic.
A. Drop
C. Reset both
D. Reset server
When creating an Admin Role profile, if no changes are made, which two administrative methods will you have full access to? (Choose two.)
A. web UI
B. XML API
C. command line
D. RESTAPI
An administrator would like to apply a more restrictive Security profile to traffic for file sharing applications. The administrator does not want to
update the Security policy or object when new applications are released.
Which object should the administrator use as a match condition in the Security policy?
C. an application group containing all of the file-sharing App-IDs reported in the traffic logs
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 69/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which list of actions properly defines the order of steps needed to add a local database user account and create a new group to which this user
will be assigned?
A. 1. Navigate to Device > Local User Database > Users and click Add. 2. Enter a Name for the user. 3. Enter and Confirm a Password or Hash.
4. Enable the account and click OK. 5. Navigate to Device > Local User Database > User Groups and click Add. 6. Enter a Name for the group.
B. 1. Navigate to Device > Authentication Profile > Users and click Add. 2. Enter a Name for the user. 3. Enter and Confirm a Password or
Hash. 4. Enable the account and click OK. 5. Navigate to Device > Local User Database > User Groups and click Add. 6. Enter a Name for the
C. 1. Navigate to Device > Users and click Add. 2. Enter a Name for the user. 3. Enter and Confirm a Password or Hash. 4. Enable the account
and click OK. 5. Navigate to Device > User Groups and click Add. 6. Enter a Name for the group. 7. Add the user to the group and click OK.
D. 1. Navigate to Device > Admins and click Add. 2. Enter a Name for the user. 3. Enter and Confirm a Password or Hash. 4. Enable the
account and click OK. 5. Navigate to Device > User Groups and click Add. 6. Enter a Name for the group. 7. Add the user to the group and click
OK.
When creating a Panorama administrator type of Device Group and Template Admin, which two things must you create first? (Choose two.)
A. server profile
B. admin role
C. password profile
D. access domain
A. source zone
B. name
C. destination interface
D. destination zone
E. destination address
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 70/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator wants to prevent hacking attacks through DNS queries to malicious domains.
Which two DNS policy actions can the administrator choose in the Anti-Spyware Security Profile? (Choose two.)
A. deny
B. block
C. sinkhole
D. override
Which combination of address and zone are used as match conditions? (Choose two.)
A. Pre-NAT address
B. Pre-NAT zone
C. Post-NAT address
D. Post-NAT zone
A network administrator is required to use a dynamic routing protocol for network connectivity.
Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)
A. OSPF
B. EIGRP
C. IS-IS
D. BGP
E. RIP
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 71/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the network diagram, traffic must be permitted for SSH and MYSQL from the DMZ to the SERVER zones, crossing two firewalls. In addition,
traffic should be permitted from the SERVER zone to the DMZ on SSH only.
A.
B.
C.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 72/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
D.
Which firewall feature do you need to configure to query Palo Alto Networks service updates over a data-plane interface instead of the
management interface?
A. service route
B. dynamic updates
C. SNMP setup
D. data redistribution
In order to fulfill the corporate requirement to backup the configuration of Panorama and the Panorama-managed firewalls securely, which
protocol should you select when adding a new scheduled config export?
A. HTTPS
B. SMB v3
C. SCP
D. FTP
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 73/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
All users from the internal zone must be allowed only HTTP access to a server in the DMZ zone.
Complete the empty field in the Security policy using an application object to permit only this type of access.
Application: __________
Service: application-default -
Action: allow
A. Application = "any"
B. Application = "web-browsing"
C. Application = "ssl"
D. Application = "http"
An administrator wants to prevent users from unintentionally accessing malicious domains where data can be exfiltrated through established
From the Pre-defined Categories tab within the URL Filtering profile, what is the right configuration to prevent such connections?
An administrator would like to follow the best-practice approach to log the traffic that traverses the firewall.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 74/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two protocols are available on a Palo Alto Networks Firewall Interface Management Profile? (Choose two.)
A. HTTPS
B. RDP
C. SCP
D. SSH
A network administrator created an intrazone Security policy rule on the firewall. The source zones were set to IT. Finance, and HR.
Which two types of traffic will the rule apply to? (Choose two)
You receive notification about new malware that infects hosts through malicious files transferred by FTP.
Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
An administrator would like to override the default deny action for a given application, and instead would like to block the traffic.
A. Drop
C. Reset both
D. Reset client
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 75/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. It dynamically shapes defined application traffic based on active sessions and bandwidth usage.
B. It dynamically filters applications based on critical, high, medium, low, or informational severity.
C. It dynamically groups applications based on application attributes such as category and subcategory.
D. It dynamically provides application statistics based on network, threat, and blocked activity.
Which action can be set in a URL Filtering Security profile to provide users temporary access to all websites in a given category using a provided
password?
A. continue
B. override
C. hold
D. exclude
A. named address
B. IP range
C. FQDN
D. IP netmask
What are the requirements for using Palo Alto Networks EDL Hosting Service?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 76/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are two valid selections within an Antivirus profile? (Choose two.)
A. deny
B. drop
C. block-ip
D. default
Your company is highly concerned with their intellectual property being accessed by unauthorized resources. There is a mature process to store
Which Security profile can further ensure that these documents do not exit the corporate network?
A. File Blocking
B. Data Filtering
C. Anti-Spyware
D. URL Filtering
An administrator is reviewing the Security policy rules shown in the screenshot below.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 77/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location.
What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?
DRAG DROP
What are the two default behaviors for the intrazone-default policy? (Choose two.)
A. Allow
C. Deny
D. Logging disabled
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 78/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets.
What are two security policy actions the administrator can select? (Choose two.)
A. Reset server
B. Deny
C. Drop
D. Reset both
An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address.
A. Static IP
B. Destination
D. Dynamic IP
What are three Palo Alto Networks best practices when implementing the DNS Security Service? (Choose three.)
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 79/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator would like to see the traffic that matches the intrazone-default rule in the traffic logs.
A. Select the intrazone-default rule and click Override; on the Actions tab, select Log at Session End and click OK.
B. Select the intrazone-default rule and edit the rule; on the Actions tab, select Log at Session End and click OK.
C. Select the intrazone-default rule and edit the rule; on the Actions tab, select Log at Session Start and click OK.
D. This rule has traffic logging enabled by default; no further action is required.
B. application prioritization
A. https://paloaltonetworks.com
B. #.paloaltonetworks.com
C. http://paloaltonetworks.com
D. *.paloaltonetworks.com
What are two valid selections within an Anti-Spyware profile? (Choose two.)
B. Drop
C. Deny
D. Default
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 80/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What is a prerequisite before enabling an administrative account which relies on a local firewall user database?
Which Security policy set should be used to ensure that a policy is applied first?
B. Shared pre-rulebase
An administrator is trying to implement an exception to an external dynamic list manually. Some entries are shown underlined in red.
What can be achieved by disabling the Share Unused Address and Service Objects with Devices setting on Panorama?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 81/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which Security profile can be used to detect and block compromised hosts from trying to communicate with external command-and-control (C2)
servers?
A. URL Filtering
B. Antivirus
C. Vulnerability
D. Anti-Spyware
An administrator is trying to enforce policy on some (but not all) of the entries in an external dynamic list.
A. 50
B. 100
C. 200
D. 1,000
What are two ways to resolve this issue for a proper response? (Choose two.)
Update the active URL Filtering profile site access setting for the custom URL category to block.
Submit for "request change", identifying the appropriate categorization, and wait for confirmation before testing again.
Edit the active URL Filtering profile and update that category's site access settings to block.
Add a Security policy with a URL category qualifier of the custom URL category below the original policy.
If the firewall interface E1/1 is connected to a SPAN or mirror port, which interface type should E1/1 be configured as?
A. Tap
B. Virtual Wire
C. Layer 2
D. Layer 3
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 82/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator manages a network with 300 addresses that require translation. The administrator configured NAT with an address pool of 240
addresses and found that connections from addresses that needed new translations were being dropped.
A. Dynamic IP
B. Static IP
D. Destination NAT
The NetSec Manager asked to create a new EMEA Regional Panorama Administrator profile with customized privileges. In particular, the new
What is the correct configuration for the new EMEA Regional Panorama Administrator profile?
An administrator would like to reference the same address object in Security policies on 100 Panorama managed firewalls, across 10 devices
Which configuration action should the administrator take when creating the address object?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 83/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which type of policy allows an administrator to both enforce rules and take action?
A. Authentication
B. Security
C. NAT
D. Decryption
With the DNS Security subscription, when will the cloud-based signature database provide users access to newly added DNS signatures?
Why should a company have a File Blocking profile that is attached to a Security policy?
What can be used as match criteria for creating a dynamic address group?
A. MAC addresses
B. IP addresses
C. Usernames
D. Tags
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 84/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator is reviewing packet captures to troubleshoot a problem with an application, and they observe TCP resets to the client and the
server.
A. Drop
B. Reset server
C. Reset client
D. Reset both
An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution.
A. Vulnerability protection
B. Anti-spyware
C. URL filtering
D. Antivirus
An organization has some applications that are restricted for access by the Human Resources Department only, and other applications that are
A. Application Group
B. Tag
D. Application Filter
Which two configurations does an administrator need to compare in order to see differences between the active configuration and potential
A. Device state
B. Active
C. Candidate
D. Running
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 85/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator configured a Security policy rule where the matching condition includes a single application and the action is set to deny.
A. Discard the session’s packets and send a TCP reset packet to let the client know the session has been terminated
C. Perform the default deny action as defined in the App-ID database for the application
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?
Services: SSH -
Applications: Any -
Action: Allow
Services: Application-Default -
Applications: SSH -
Action: Allow
Services: Application-Default -
Applications: SSH -
Action: Deny
Services: SSH -
Applications: Any -
Action: Deny
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 86/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action for the profile.
If a virus gets detected, how will the firewall handle the traffic?
B. It drops the traffic because the profile was not set to explicitly allow the traffic.
C. It allows the traffic because the profile was not set the explicitly deny the traffic.
How should the administrator configure the firewall to restrict users to specific email applications?
B. Create an application filter and filter it on the collaboration category, email subcategory.
A. Data Filtering
B. URL Filtering
C. Anti-Spyware
D. Antivirus
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 87/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Allow
B. Deny
C. Reset-client
D. Reset-server
A. 2
B. Unlimited
C. 10
D. 1
D. Unused Apps
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 88/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Where within the firewall GUI can all existing tags be viewed?
A. Sinkhole
B. Reset-client
C. Drop
D. Reset-both
To enable DNS sinkholing, which two addresses should be reserved? (Choose two.)
A. MAC
B. IPv6
C. Email
D. IPv4
A NetSec manager was asked to create a new firewall administrator profile with customized privileges. The new firewall administrator must be
able to download TSF File and Starts Dump File but must not be able to reboot the device.
Where does the NetSec manager go to configure the new firewall administrator role profile?
A. Device > Admin Roles > Add > XML API > Configuration
B. Device > Admin Roles > Add > XML API > Operational Request
C. Device > Admin Roles > Add > Web UI > Support
D. Device > Admin Roles > Add > Web UI > Operations
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 89/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What must exist in order for the firewall to route traffic between Layer 3 interfaces?
A. Virtual router
B. Virtual wires
D. VLANs
Which path in PAN-OS 10.2 is used to schedule a content update to managed devices using Panorama?
A. Panorama > Device Deployment > Dynamic Updates > Schedules > Add
B. Panorama > Device Deployment > Content Updates > Schedules > Add
C. Panorama > Dynamic Updates > Device Deployment > Schedules > Add
D. Panorama > Content Updates > Device Deployment > Schedules > Add
In which threat profile object would you configure the DNS Security service?
A. Antivirus
B. Anti-Spyware
C. WildFire
D. URL Filtering
Which rule type is appropriate for matching traffic occurring within a specified zone?
A. Universal
B. Shadowed
C. Intrazone
D. Interzone
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 90/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two matching criteria are used when creating a Security policy involving NAT? (Choose two.)
A. Pre-NAT address
B. Post-NAT address
C. Pre-NAT zone
D. Post-NAT zone
If a universal security rule was created for source zones A & B and destination zones A & B, to which traffic would the rule apply?
Which interface type requires no routing or switching but applies Security or NAT policy rules before passing allowed traffic?
A. Tap
B. Virtual Wire
C. Layer 2
D. Layer 3
A. Management
B. Logical
C. Transparent
D. Tap
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 91/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator is creating a Security policy rule and sees that the destination zone is grayed out.
While creating the rule, which option was selected to cause this?
A. Interzone
B. Source zone
C. Universal (default)
D. Intrazone
How many levels can there be in a device-group hierarchy, below the shared level?
A. 2
B. 3
C. 4
D. 5
A. Templates
B. Device Groups
C. Shared
D. Panorama tab
A. Tags
B. Service
C. Type
D. Action
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 92/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Destination Zone
B. Actions
C. Source Zone
D. Application
Which policy set should be used to ensure that a policy is applied just before the default security rules?
A. Shared post-rulebase
Which rule type is appropriate for matching traffic occurring within a specified zone?
How should the administrator configure the firewall to restrict users to specific email applications?
B. Create an application filter and filter it on the collaboration category, email subcategory.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 93/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Review the screenshot below. Based on the information it contains, which protocol decoder will detect a machine-learning match, create a Threat
A. smb
B. imap
C. ftp
D. http2
A. 1
B. 2
C. 3
D. 4
A. Role Based
B. Superuser
C. Dynamic
D. Local
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 94/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
The Net Sec Manager asked to create a new Firewall Operator profile with customized privileges.
Check the configuration with read-only privilege for LDAP, RADIUS, TACACS+, and SAML as Server profiles to be used inside an Authentication
profile.
What is the right path m order to configure the new firewall Administrator Profile?
A. Device > Admin Roles > Add > Web UI > Device > Server Profiles
Device > Admin Roles > Add > Web UI > disable access to everything else
B. Device > Admin Roles > Add > Web UI > Objects > Server Profiles
Device > Admin Roles > Add > Web UI > disable access to everything else
C. Device > Admin Roles > Add >Web UI > Objects > Authentication Profile
Device > Admin Roles > Add > Web UI > disable access to everything else
D. Device > Admin Roles > Add > Web UI > Device > Authentication Profile
Device > Admin Roles > Add > Web UI > disable access to everything else
Within the WildFire Analysis profile, which three items are configurable? (Choose three.)
A. FileType
B. Direction
C. Service
D. Application
E. Objects
Which Security profile can be used to configure sinkhole IPs m the DNS Sinkhole settings?
A. Vulnerability Protection
B. Anti-Spyware
C. Antivirus
D. URL Filtering
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 95/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which three management interface settings must be configured for functional dynamic updates and administrative access on a Palo Alto
A. NTP
B. IP address
C. MTU
D. DNS server
E. service routes
How does the Policy Optimizer policy view differ from the Security policy view?
An administrator creates a new Security policy rule to allow DNS traffic from the LAN to the DMZ zones. The administrator does not change the
A. Intrazone
B. Interzone
C. Universal
D. Tagged
B. Applications that are not explicitly sanctioned and that a company wants users to be able to access
D. Applications that are not explicitly unsanctioned and that a company wants users to be able to access
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 96/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
D. It identifies the purpose of a rule or configuration object and helps you better organize your rulebase
How would a Security policy need to be written to allow outbound traffic using Secure Shell (SSH) to destination ports tcp/22 and tcp/4422?
A. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin then creates a Security policy allowing application "ssh" and service "tcp-4422".
B. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin then creates a Security policy allowing application "ssh", service "tcp-4422", and service "application-default".
C. The admin creates a custom service object named "tcp-4422" with port tcp/4422.
The admin also creates a custom service object named "tcp-22" with port tcp/22.
The admin then creates a Security policy allowing application "ssh", service "tcp-4422", and service "tcp-22".
D. The admin creates a Security policy allowing application "ssh" and service "application-default".
Which type of DNS signatures are used by the firewall to identify malicious and command-and-control domains?
Which Security policy action will message a user's browser that their web session has been terminated?
A. Reset client
B. Deny
C. Drop
D. Reset server
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 97/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
In order to protect users against exploit kits that exploit a vulnerability and then automatically download malicious payloads, which Security profile
should be configured?
A. Anti-Spyware
B. WildFire
C. Vulnerability Protection
D. Antivirus
A. Phishing
B. Spyware
C. PUP
D. Malware
To protect against illegal code execution, which Security profile should be applied?
Which three types of entries can be excluded from an external dynamic list? (Choose three.)
A. IP addresses
B. Applications
C. User-ID
D. Domains
E. URLs
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 98/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Within a WildFire Analysis Profile, what match criteria can be defined to forward samples for analysis?
A. File Size
B. Application Category
C. Direction
D. Source
A. Reset-client
B. Reset-server
C. Deny
D. Allow
A Panorama administrator would like to create an address object for the DNS server located in the New York City office, but does not want this
Which configuration action should the administrator take when creating the address object?
A. Tag the address object with the New York Office tag.
An administrator is troubleshooting an issue with traffic that matches the interzone-default rule, which is set to default configuration.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 99/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What is the default action for the SYN Flood option within the DoS Protection profile?
A. Reset-client
B. Alert
C. Sinkhole
B. Applications that are not explicitly unsanctioned and that an administrator wants users to be able to access
D. Applications that are not explicitly sanctioned and that an administrator wants users to be able to access
Where does a user assign a tag group to a policy rule in the policy creation window?
A. General tab
B. Usage tab
C. Application tab
D. Actions tab
A. Security profile
B. App-ID
C. Policy-based forwarding
D. Policy Optimizer
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 100/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Wait until all running and pending jobs are finished before committing.
D. Disable the automatic commit feature that prioritizes content database installations before committing.
Which Security profile generates an alert based on a threshold when the action is set to Alert?
A. Vulnerability Protection
B. Antivirus
C. DoS protection
D. Anti-Spyware
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 101/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the network diagram, which two statements are true about traffic between the User and Server networks? (Choose two.)
B. Traffic restrictions are not possible because the networks are in the same zone.
Which setting is available to edit when a tag is created on the local firewall?
A. Color
B. Location
C. Order
D. Priority
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 102/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
With the PAN-OS 11.0 Nova release, which two attack options can new inline deep learning analysis engines detect and prevent? (Choose two.)
B. SSL attacks
D. HTTP attacks
Which profile must be applied to the Security policy rule to block spyware on compromised hosts from trying to phone-home or beacon out to
A. Anti-spyware
B. File blocking
C. WildFire
D. URL filtering
Which feature dynamically analyzes and detects malicious content by evaluating various web page details using a series of machine learning (ML)
models?
A. Antivirus Inline ML
C. Anti-Spyware Inline ML
D. WildFire Inline ML
An administrator is troubleshooting an issue with Office365 and expects that this traffic traverses the firewall.
When reviewing Traffic Log entries, there are no logs matching traffic from the test workstation.
C. Traffic matches the interzone-default rule, which does not log traffic by default.
D. The firewall is blocking the traffic, and all blocked traffic is in the Threat Log.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 103/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
When creating an address object, which option is available to select from the Type drop-down menu?
A. IPv6 Address
B. IP Netmask
C. IPv4 Address
D. IP Address Class
If both interfaces are connected to the same virtual router, which IP address information will an administrator need to enter in the Destination field
A. 0.0.0.0
B. 10.0.2.1/32
C. 10.0.1.254/32
D. 0.0.0.0/0
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 104/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Where within the URL Filtering security profile must a user configure the action to prevent credential submissions?
Which Security profile must be added to Security policies to enable DNS Signatures to be checked?
A. URL Filtering
B. Vulnerability Protection
C. Anti-Spyware
D. Antivirus
Which two Security profile actions can only be applied to DoS Protection profiles? (Choose two.)
A. Reset-server
B. Reset-both
C. SYN cookies
Where can you apply URL Filtering policy in a Security policy rule?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 105/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Tunnel interfaces
B. Layer 2 subinterfaces
C. Layer 3 subinterfaces
D. Loopback interfaces
Which three factors can be used to create malware based on domain generation algorithms? (Choose three.)
A. Time of day
D. Cryptographic keys
E. IP address
Which action column is available to edit in the Action tab of an Antivirus security profile?
A. Virus
B. Signature
C. Spyware
D. Trojan
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 106/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Given the detailed log information above, what was the result of the firewall traffic inspection?
B. Allow the User-ID agent in zones where agents are not monitoring services.
D. Deny WMI traffic from the User-ID agent to any external zone.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 107/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Block
B. Allow
C. Strict
D. Sinkhole
E. Alert
Which System log severity level would be displayed as a result of a user password change?
A. Low
B. Medium
C. High
D. Critical
An administrator would like to block traffic to all high risk audio streaming applications, including new App-IDs introduced with content updates.
Which filter should the administrator configure in the application filter object?
An administrator receives a notification about new malware that is being used to attack hosts. The malware exploits a software bug in a common
application.
Which Security Profile will detect and block access to this threat after the administrator updates the firewall's threat signature database?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 108/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
The NetSec Manager asked to create a new firewall Local Administrator profile with customized privileges named New_Admin. This new
administrator has to authenticate without inserting any username or password to access the WebUI.
What steps should the administrator follow to create the New_Admin Administrator profile?
Which Security profile prevents users from submitting valid corporate credentials online?
A. WildFire
B. URL filtering
D. SSL decryption
Which two statements apply to an Advanced Threat Prevention subscription? (Choose two.)
B. It provides the ability to identify evasive and previously unseen command-and-control (C2) threats.
D. Due to its more advanced signatures, it provides the ability to identify new threats.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 109/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
With the PAN-OS 11.0 release, which tab becomes newly available within the Vulnerability security profile?
A. Vulnerability Exceptions
B. Advanced Rules
D. WildFire Inline ML
DRAG DROP
Drag the steps into the correct order to create a static route.
What are the two ways to implement an exception to an external dynamic list? (Choose two.)
D. Edit the external dynamic list by adding the “-“ symbol before the entries to exclude.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 110/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator needs to create a Security policy rule that matches DNS traffic sourced from either the LAN or VPN zones, destined for the DMZ
or Untrust zones.
The administrator does not want to match traffic where the source and destination zones are LAN, and also does not want to match traffic where
A. Interzone
B. Universal
C. Intrazone
D. Default
Why are the two fields in the Security policy EDL-Deny highlighted in red?
B. Because the destination zone, address, and device are all "any"
D. Because the Security-EDL tag has been assigned the red color
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 111/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are two differences between an application group and an application filter? (Choose two.)
A. Application groups enable access to sanctioned applications explicitly, while application filters enable access to sanctioned applications
implicitly.
C. Application groups dynamically group applications based on attributes, while application filters contain applications that are statically
grouped.
D. Application groups can be added to application filters, while application filters cannot be added to application groups.
An administrator reads through the following Applications and Threats Content Release Notes before an update:
Which rule would continue to allow the file upload to confluence after the update?
A.
B.
C.
D.
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 112/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. The traffic within the same security zone will not be allowed.
C. It applies regardless of whether it is from the same security zone or a different one.
D. It applies to all matching traffic within the specified source security zones.
Review the screenshot below. Which statement is correct about the information it contains?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 113/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator wants to enable users to access retail websites that are considered minimum risk.
Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two.)
A. e-commerce
B. known-good
C. shopping
D. low-risk
B. A file that has been analyzed is potentially dangerous for the system.
Within an Anti-Spyware security profile, which tab is used to enable machine learning based engines?
A. Signature Policies
B. Signature Exceptions
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 114/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two statements correctly describe how pre-rules and local device rules are viewed and modified? (Choose two.)
A. Pre-rules can be modified by the local administrator or by a Panorama administrator who has switched to a local firewall.
D. Pre-rules are modified in Panorama only, and local device rules are modified on local firewalls only.
The administrator profile "SYS01 Admin" is configured with authentication profile "Authentication Sequence SYS01," and the authentication
After a network outage, the LDAP server is no longer reachable. The RADIUS server is still reachable but has lost the "SYS01 Admin" username and
password.
A. Auth KO because RADIUS server lost user and password for SYS01 Admin
Which three types of Source NAT are available to users inside a NGFW? (Choose three.)
A. Static Port
C. Dynamic IP
E. Static IP
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 115/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are the two main reasons a custom application is created? (Choose two.)
By default, what is the maximum number of templates that can be added to a template stack?
A. 6
B. 8
C. 10
D. 12
A. It shows rules with the same Source Zones and Destination Zones.
B. It indicates that a broader rule matching the criteria is configured above a more specific rule.
Which two types of profiles are needed to create an authentication sequence? (Choose two.)
A. Security profile
B. Authentication profile
C. Server profile
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 116/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
2) Specify the outgoing interface for packets to use to go to the next hop
4) Specify the outgoing interface for packets to use to go to the next hop
3) Specify the outgoing interface for packets to use to go to the next hop
4) Specify the outgoing interface for packets to use to go to the next hop
Which two actions are needed for an administrator to get real-time WildFire signatures? (Choose two.)
Which two features implement one-to-one translation of a source IP address while allowing the source port to change? (Choose two.)
A. Dynamic IP
C. Static IP
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 117/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are three ways application characteristics are used? (Choose three.)
In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)
A. Antivirus
B. URL Filtering
C. Vulnerability Protection
D. Anti-spyware
In which section of the PAN-OS GUI does an administrator configure URL Filtering profiles?
A. Network
B. Policies
C. Objects
D. Device
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 118/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
B. Vulnerability profile
C. WildFire analysis
D. Content-ID
In which three places on the PAN-OS interface can the application characteristics be found? (Choose three.)
Where within the firewall GUI can an administrator create a local user database?
A. By the OSPF protocol, as part of Dijkstra's algorithm, to give access to the various services offered in the network
B. To statically route subnets so they are joinable from, and have access to, the Palo Alto Networks external services
C. For routing, because they are the shortest path selected by the BGP routing protocol
D. To route management plane services through data interfaces rather than the management interface
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 119/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
How can a complete overview of the logs be displayed to an administrator who has permission in the system to view them?
Which User Credential Detection method should be applied within a URL Filtering Security profile to check for the submission of a valid corporate
A. Group Mapping
B. Domain Credential
D. IP User
A. URL Filtering
B. Web Content
C. Antivirus
D. Vulnerability Protection
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 120/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A systems administrator momentarily loses track of which is the test environment firewall and which is the production firewall. The administrator
makes changes to the candidate configuration of the production firewall, but does not commit the changes. In addition the configuration was not
B. Load named configuration snapshot, and choose the first item on the list.
D. Load configuration version, and choose the first item on the list.
An administrator is implementing an exception to an external dynamic list by adding an entry to the list manually. The administrator wants to save
What are two possible reasons the OK button is grayed out? (Choose two.)
Which three Ethernet interface types are configurable on the Palo Alto Networks firewall? (Choose three.)
A. Static
B. Tap
C. Dynamic
D. Layer 3
E. Virtual Wire
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 121/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
A network security manager is asked to save a configuration to be used after a firewall reboot.
When the configuration is ready, how should it be saved so that the changes are not lost?
Which action should be taken to identify threats that have been detected by using inline cloud analysis?
What are three valid source or D=destination conditions available as Security policy qualifiers? (Choose three.)
A. Zone
B. Service
C. User
D. Application
E. Address
Which path in PAN-OS 11.x would you follow to see how new and modified App-IDs impact a Security policy?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 122/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What are three configurable interface types for a data-plane ethernet interface? (Choose three.)
A. VWire
B. Layer 2
C. Management
D. HSCI
E. Layer 3
An administrator wants to enable access to www.paloaltonetworks.com while denying access to all other sites in the same category.
Which object should the administrator create to use as a match condition for the security policy rule that allows access to
www.paloaltonetworks.com?
A. Service
B. Address
C. URL category
D. Application group
Which Security profile should be applied in order to protect against illegal code execution?
Which CLI command will help confirm if FQDN objects are resolved in the event there is a shadow rule?
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 123/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
An administrator should filter NGFW traffic logs by which attribute column to determine if the entry is for the start or end of the session?
A. Source
B. Type
C. Receive Time
D. Destination
What is a default setting for NAT Translated Packets when the destination NAT translation is selected as Dynamic IP (with session distribution)?
A. IP Hash
B. Round Robin
C. Least Sessions
D. Source IP Hash
Which two options does the firewall use to dynamically populate address group members? (Choose two.)
A. Tag-based filters
B. MAC Addresses
C. IP Addresses
D. Tags
Which feature enables an administrator to review the Security policy rule base for unused rules?
D. Policy Optimizer
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 124/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
In the PAN-OS Web Interface, which is a session distribution method offered under NAT Translated Packet Tab to choose how the firewall assigns
sessions?
A. Max Sessions
B. IP Modulo
C. Destination IP Hash
D. Concurrent Sessions
Which administrative role type allows a custom set of firewall permissions to be configured for administrators?
A. Superuser
B. Role based
C. Device administrator
Which table for NAT and NPTv6 (IPv6-to-IPv6 Network Prefix Translation) settings is available only on Panorama?
Which log type would be used to find commit entries for a firewall?
A. Config
B. Alarms
C. Correlation
D. System
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 125/126
1/8/25, 8:57 PM PCNSA Exam - Free Actual Q&As, Page 1 | ExamTopics
What must first be created on the firewall for SAML authentication to be configured?
A. Server Profile
B. Server Policy
C. Server Location
D. Server Group
Where in the PAN-OS GUI can an administrator monitor the rule usage for a specified period of time?
What two actions can be taken when Implementing an exception to an External Dynamic List? (Choose two.)
https://www.examtopics.com/exams/palo-alto-networks/pcnsa/custom-view/ 126/126