Palo Alto Networks PCNSC - Palo Alto Networks Certified Network Security Consultant Exam
Page: 2 / 12
Total 59 questions
Question #6 (Topic: Exam A)
Which are two commands required to upgrade Expedition? (Choose two.)
A. sudo apt-get update
B. sudo apt-get update expedition
C. sudo apt-get upgrade all
D. sudo apt-get install expedition-beta
Answer: AD
Question #7 (Topic: Exam A)
An existing customer who has deployed several Palo Alto Networks Next-Generation Firewalls would like to start using Device-ID to obtain policy rule recommendations. They have also purchased a Support license, a Threat license, a URL Filtering license, and a WildFire license for each firewall.
What additional license do they need to purchase?
What additional license do they need to purchase?
A. an IoT Security license for each deployed firewall
B. a Cortex Data Lake license
C. an IoT Security license for the perimeter firewall
D. an Enterprise Data Loss Prevention (DLP) license
Answer: B
Question #8 (Topic: Exam A)
Instead of disabling App-IDs regularly, a security policy rule is going to be configured to temporarily allow new App-IDs. In which two circumstances is it valid to disable App-IDs as part of content update? (Choose two.)
A. when planning to enable the App-IDs immediately
B. when you want to immediately benefit from the latest threat prevention
C. when an organization operates a mission-critical network and has zero tolerance for downtime
D. when disabling facebook-base to disable all other Facebook App-IDs
Answer: AC
Question #9 (Topic: Exam A)
DRAG DROP
Identify the Stakeholder with their Role when planning a Firewall, Panorama, and Cortex XDR Deployment.
Identify the Stakeholder with their Role when planning a Firewall, Panorama, and Cortex XDR Deployment.

Answer:

Question #10 (Topic: Exam A)
DRAG DROP
In Panorama, the web interface displays the security rules in evaluation order. Organize the security rules in the order in which they will be evaluated?
In Panorama, the web interface displays the security rules in evaluation order. Organize the security rules in the order in which they will be evaluated?

Answer:
