최신 PCNSA 무료덤프 - Palo Alto Networks Certified Network Security Administrator
Match the Cyber-Attack Lifecycle stage to its correct description.
정답:
Explanation:
Reconnaissance - stage where the attacker scans for network vulnerabilities and services that can be exploited.
Installation - stage where the attacker will explore methods such as a root kit to establish persistence Command and Control - stage where the attacker has access to a specific server so they can communicate and pass data to and from infected devices within a network.
Act on the Objective - stage where an attacker has motivation for attacking a network to deface web property
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1 What changes are required on VR-1 to route traffic between two interfaces on the NGFW?
정답: B
An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?
정답: C
Which type security policy rule would match traffic flowing between the inside zone and outside zone within the inside zone and within the outside zone?
정답: C
What is an advantage for using application tags?
정답: C
Which statement best describes the use of Policy Optimizer?
정답: A
How does the Policy Optimizer policy view differ from the Security policy view?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which path is used to save and load a configuration with a Palo Alto Networks firewall?
정답: A
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?
정답: C
Which Security profile would you apply to identify infected hosts on the protected network uwall user database?
정답: A
Given the screenshot what two types of route is the administrator configuring? (Choose two )
정답: C
Which two rule types allow the administrator to modify the destination zone? (Choose two )
정답: C,D