Prev Next Question 102/150 - PCNSE.v2018-04-17

A Security policy rule is configured with a Vulnerability Protection Profile and an action of
'Deny".
Which action will this cause configuration on the matched traffic?

Comments (The most recent comments are at the top.)

- Oct 09, 2020

Answer should be B

- Oct 02, 2018

i think the correct answer is B ... the C told us that the matched session will allow if vulnerability is not detected ..this is wrong ...

- Sep 05, 2018

Security Profiles are not evaluated if the Security Policy is set to Deny. The answer is B

- Sep 04, 2018

Answer C also make sense. Because it mention that the deny action will supersede the security profile action

- Jul 30, 2018

Answer is B

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: Which option is an IPv6 routing protocol?...
Question 2: The company's Panorama server (IP 10.10.10.5) is not able to...
Question 3: Which two actions are required to make Microsoft Active Dire...
Question 4: How are IPV6 DNS queries configured to user interface ethern...
7 commentQuestion 5: What are two benefits of nested device groups in Panorama? (...
Question 6: What are two prerequisites for configuring a pair of Palo Al...
Question 7: An administrator wants multiple web servers in the DMZ to re...
Question 8: An administrator pushes a new configuration from Panorama to...
Question 9: A distributed log collection deployment has dedicated log Co...
Question 10: Palo Alto Networks maintains a dynamic database of malicious...
Question 11: Site-A and Site-B have a site-to-site VPN set up between the...
1 commentQuestion 12: Click the Exhibit button (Exhibit) An administrator has noti...
2 commentQuestion 13: Which three are valid configuration options in a WildFire An...
Question 14: A customer has an application that is being identified as un...
4 commentQuestion 15: An administrator creates an SSL decryption rule decrypting t...
Question 16: Which feature prevents the submission of corporate login inf...
Question 17: Which Panorama feature allows for logs generated by Panorama...
10 commentQuestion 18: Which three file types can be forwarded to WildFire for anal...
Question 19: A company needs to preconfigure firewalls to be sent to remo...
6 commentQuestion 20: During the packet flow process, which two processes are perf...
Question 21: A company has a pair of Palo Alto Networks firewalls configu...
Question 22: Which Security Policy Rule configuration option disables ant...
Question 23: Which two interface types can be used when configuring Globa...
4 commentQuestion 24: Which option is part of the content inspection process?...
Question 25: A Network Administrator wants to deploy a Large Scale VPN so...
3 commentQuestion 26: A company is upgrading its existing Palo Alto Networks firew...
2 commentQuestion 27: If a template stack is assigned to a device and the stack in...
Question 28: Which PAN-OS policy must you configure to force a user to pr...
Question 29: Which CLI command enables an administrator to view details a...
Question 30: Which field is optional when creating a new Security Policy ...
Question 31: YouTube videos are consuming too much bandwidth on the netwo...
4 commentQuestion 32: A company hosts a publically accessible web server behind a ...
1 commentQuestion 33: Which feature must you configure to prevent users form accid...
Question 34: A network security engineer for a large company has just ins...
Question 35: Which three types of software will receive a Grayware verdic...
1 commentQuestion 36: Which three options does the WF-500 appliance support for lo...
4 commentQuestion 37: Which protection feature is available only in a Zone Protect...
1 commentQuestion 38: A logging infrastructure may need to handle more than 10,000...
4 commentQuestion 39: The web server is configured to listen for HTTP traffic on p...
1 commentQuestion 40: A company has a policy that denies all applications it class...
Question 41: A VPN connection is set up between Site-A and Site-B, but no...
Question 42: The GlobalProtect Portal interface and IP address have been ...
Question 43: A host attached to Ethernet 1/4 cannot ping the default gate...
Question 44: People are having intermittent quality issues during a live ...
Question 45: Which Public Key infrastructure component is used to authent...
2 commentQuestion 46: Which client software can be used to connect remote Linux cl...
Question 47: A global corporate office has a large-scale network with onl...
Question 48: Which three rule types are available when defining policies ...
Question 49: Which two logs on the firewall will contain authentication-r...
Question 50: Which CLI command can be used to export the tcpdump capture?...
3 commentQuestion 51: What must be used in Security Policy Rule that contain addre...
1 commentQuestion 52: A company.com wants to enable Application Override. Given th...
Question 53: A network engineer has revived a report of problems reaching...
1 commentQuestion 54: Which three authentication services can administrator use to...
Question 55: A network security engineer has been asked to analyze Wildfi...
Question 56: Which event will happen if an administrator uses an Applicat...
Question 57: A firewall administrator has completed most of the steps req...
Question 58: How does Panorama handle incoming logs when it reaches the m...
Question 59: Which authentication source requires the installation of Pal...
Question 60: An administrator creates a custom application containing Lay...
Question 61: An administrator needs to determine why users on the trust z...
Question 62: Which CLI command displays the current management plane memo...
2 commentQuestion 63: What are three valid method of user mapping? (Choose three)...
Question 64: An administrator logs in to the Palo Alto Networks NGFW and ...
Question 65: Click the Exhibit button below, (Exhibit) A firewall has thr...
Question 66: Which three log-forwarding destinations require a server pro...
Question 67: Which Palo Alto Networks VM-Series firewall is valid?...
4 commentQuestion 68: An administrator needs to implement an NGFW between their DM...
Question 69: Several offices are connected with VPNs using static IPv4 ro...
2 commentQuestion 70: Which Palo Alto Networks VM-Series firewall is supported for...
Question 71: Refer to the exhibit. (Exhibit) Which certificates can be us...
Question 72: How can a Palo Alto Networks firewall be configured to send ...
4 commentQuestion 73: Decrypted packets from the website https://www.microsoft.com...
1 commentQuestion 74: An administrator has left a firewall to use the default port...
Question 75: Which two virtualized environments support Active/Active Hig...
Question 76: A network Administrator needs to view the default action for...
Question 77: What are three possible verdicts that WildFire can provide f...
1 commentQuestion 78: If an administrator does not possess a website's certificate...
Question 79: Several offices are connected with VPNs using static IPV4 ro...
Question 80: Which tool provides an administrator the ability to see tren...
Question 81: After Migrating from an ASA firewall to a Palo Alto Networks...
3 commentQuestion 82: A user's traffic traversing a Palo Alto Networks NGFW someti...
Question 83: Site-A and Site-B need to use IKEv2 to establish a VPN conne...
Question 84: In a virtual router, which object contains all potential rou...
Question 85: After pushing a security policy from Panorama to a PA-3020 f...
3 commentQuestion 86: The administrator has enabled BGP on a virtual router on the...
Question 87: Which Captive Portal mode must be configured to support MFA ...
4 commentQuestion 88: What are three valid actions in a File Blocking Profile? (Ch...
Question 89: PAN-OS 8.0 introduced an automated correlation engine that a...
2 commentQuestion 90: How would an administrator monitor/capture traffic on the ma...
Question 91: A firewall administrator is troubleshooting problems with tr...
Question 92: An administrator needs to optimize traffic to prefer busines...
Question 93: A network security engineer is asked to provide a report on ...
Question 94: When is it necessary to activate a license when provisioning...
Question 95: Which two methods can be used to mitigate resource exhaustio...
Question 96: Server Message Block (SMB), a common file-sharing applicatio...
Question 97: Which URL Filtering Security Profile action logs the URL Fil...
Question 98: A company has a web server behind a Palo Alto Networks next-...
2 commentQuestion 99: A company hosts a publicly accessible web server behind a Pa...
Question 100: Which two virtualization platforms officially support the de...
2 commentQuestion 101: Which three settings are defined within the Templates object...
5 commentQuestion 102: A Security policy rule is configured with a Vulnerability Pr...
Question 103: When configuring a GlobalProtect Portal, what is the purpose...
Question 104: A host attached to ethernet1/3 cannot access the internet. T...
Question 105: An administrator is using Panorama and multiple Palo Alto Ne...
Question 106: Which CLI command is used to simulate traffic going through ...
Question 107: Which two options are required on an M-100 appliance to conf...
3 commentQuestion 108: Which three steps will reduce the CPU utilization on the man...
Question 109: Refer to the exhibit. (Exhibit) An administrator is using DN...
6 commentQuestion 110: A speed/duplex negotiation mismatch is between the Palo Alto...
1 commentQuestion 111: Which two statements are correct for the out-of-box configur...
Question 112: Refer to the exhibit. (Exhibit) Which will be the egress int...
Question 113: To connect the Palo Alto Networks firewall to AutoFocus, whi...
1 commentQuestion 114: A network security engineer needs to configure a virtual rou...
Question 115: An administrator encountered problems with inbound decryptio...
Question 116: Which setting allow a DOS protection profile to limit the ma...
2 commentQuestion 117: Refer to Exhibit: (Exhibit) A firewall has three PDF rules a...
Question 118: Which method will dynamically register tags on the Palo Alto...
3 commentQuestion 119: An administrator has configured the Palo Alto Networks NGFW'...
Question 120: Given the following table. (Exhibit) Which configuration cha...
Question 121: An administrator sees several inbound sessions identified as...
2 commentQuestion 122: How does an administrator schedule an Applications and Threa...
Question 123: Support for which authentication method was added in PAN-OS ...
Question 124: (Exhibit) What will be the source address in the ICMP packet...
Question 125: What can missing SSL packets when performing a packet captur...
Question 126: Which Security policy rule will allow an admin to block face...
5 commentQuestion 127: If the firewall is configured for credential phishing preven...
Question 128: How can a candidate or running configuration be copied to a ...
Question 129: When a malware-infected host attempts to resolve a known com...
Question 130: Which three options are supported in HA Lite? (Choose three....
2 commentQuestion 131: Which three options are available when creating a security p...
1 commentQuestion 132: Which two mechanisms help prevent a spilt brain scenario an ...
1 commentQuestion 133: Which command can be used to validate a Captive Portal polic...
2 commentQuestion 134: An administrator has enabled OSPF on a virtual router on the...
Question 135: A critical US-CERT notification is published regarding a new...
Question 136: Which User-ID method maps IP addresses to usernames for user...
1 commentQuestion 137: A client is concerned about resource exhaustion because of d...
4 commentQuestion 138: An Administrator is configuring an IPSec VPN toa Cisco ASA a...
Question 139: Which URL Filtering Security Profile action togs the URL Fil...
1 commentQuestion 140: A network administrator uses Panorama to push security polic...
1 commentQuestion 141: A session in the Traffic log is reporting the application as...
Question 142: A client is deploying a pair of PA-5000 series firewalls usi...
2 commentQuestion 143: Refer to exhibit. (Exhibit) An organization has Palo Alto Ne...
Question 144: Which CLI command displays the current management plan memor...
Question 145: Which item enables a firewall administrator to see details a...
1 commentQuestion 146: A file sharing application is being permitted and no one kno...
1 commentQuestion 147: An administrator needs to upgrade a Palo Alto Networks NGFW ...
Question 148: Which option would an administrator choose to define the cer...
2 commentQuestion 149: An administrator is configuring an IPSec VPN to a Cisco ASA ...
2 commentQuestion 150: Only two Trust to Untrust allow rules have been created in t...