exam questions

Exam PCNSA All Questions

View all questions & answers for the PCNSA exam

Exam PCNSA topic 1 question 40 discussion

Actual exam question from Palo Alto Networks's PCNSA
Question #: 40
Topic #: 1
[All PCNSA Questions]

Which three statements describe the operation of Security policy rules and Security Profiles? (Choose three.)

  • A. Security policy rules are attached to Security Profiles.
  • B. Security Profiles are attached to Security policy rules.
  • C. Security Profiles should be used only on allowed traffic.
  • D. Security policy rules inspect but do not block traffic.
  • E. Security policy rules can block or allow traffic.
Show Suggested Answer Hide Answer
Suggested Answer: BCE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Lyubo
Highly Voted 3 years, 9 months ago
B, C, and E seem to be correct answers.
upvoted 20 times
...
ramasamymuthiah
Highly Voted 3 years, 9 months ago
Correct Answer is B, C & E
upvoted 9 times
...
ALCOSTA35
Most Recent 3 months, 4 weeks ago
BCE: Security Profiles are attached to Security Rules. B is in contradiction with A, so they cannot be both true. D is surely false because Security Policies can Block (Deny) traffic.
upvoted 1 times
...
bishop2009
6 months, 1 week ago
BDE. B. Security Profiles are attached to Security policy rules. Security policies define how traffic is handled, and security profiles provide additional security measures like antivirus scanning or URL filtering. You can attach security profiles to security policies to extend their functionality. D. Security policy rules inspect but do not block traffic. Security policy rules can perform inspections on traffic based on various criteria (source, destination, application, etc.). Based on the match criteria and the defined action (allow or deny), they can either permit or block traffic flow. E. Security policy rules can block or allow traffic. This is the core functionality of security policies. They evaluate traffic against defined criteria and dictate whether to permit or deny its passage through the firewall. C. Security Profiles should be used only on allowed traffic. Security profiles can be applied to both allowed and denied traffic. For example, you might want to perform antivirus scanning on all traffic, even traffic that is ultimately blocked by the security policy.
upvoted 1 times
...
Rakshith27
1 year, 4 months ago
Selected Answer: BCE
Security policy cannot be attached to security profile but it is other way around. Block traffic need not to have security profile. Hence ans is B C and E
upvoted 1 times
...
Totosos1
1 year, 5 months ago
Selected Answer: BCE
B, C & E are absolutely correct, I work with Palo Alto's every day.
upvoted 1 times
...
Sanjug2022
1 year, 6 months ago
Correct B,C,E
upvoted 2 times
...
mr_flubber
1 year, 8 months ago
Selected Answer: BCE
A and B contradict anyway
upvoted 1 times
...
3osuwa
1 year, 10 months ago
Selected Answer: BCE
by process of elimination, A and D are obviously wrong.
upvoted 2 times
...
daytonadave2011
2 years ago
Selected Answer: BCE
B, C, and E are the correct answers.
upvoted 2 times
...
Mang_One
2 years, 2 months ago
BCE seems to be the right answer
upvoted 1 times
...
SamWBish
2 years, 4 months ago
Selected Answer: BCE
B,C,E. A contradicts with B, correct?
upvoted 1 times
...
Freakezoid
2 years, 5 months ago
Selected Answer: BCE
Correct answer: B,C,E
upvoted 2 times
...
elbi05
2 years, 7 months ago
Selected Answer: BCE
B. Security profiles are the ones attached to Sec policy rules not the other way around. C. It doesn't make sense if you have a security profile on a denied traffic by the Security policy rule E. Security policy rules can block and allow traffic
upvoted 2 times
...
Alessandr0
2 years, 7 months ago
B,C and D if the question says Security policy and Security profile (means togheter) security policy cannot block must allow always in order to inspect the traffic and let the Security profile works
upvoted 1 times
...
kewokil120
2 years, 8 months ago
Selected Answer: BCE
B, C, and E seem to be correct answers.
upvoted 1 times
...
cabra
2 years, 8 months ago
Selected Answer: BCE
Correct Answer is B, C & E
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago