PCNSA Exam Information and Guideline
Palo Alto Networks Certified Network Security Administrator
Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.
Exam Name : Network Security Administrator
Exam Number : PCNSA PAN OS 9
Exam Duration : 80 minutes
Questions in Exam : 50
Passing Score : 70%
Exam Registration : PEARSON VUE
Real Questions : Palo Alto PCNSA Real Questions
VCE Practice Test : Palo Alto Networks Certified Network Security Administrator Practice Test
OBJECTIVE: Demonstrate your ability to configure the central features of Palo Alto Networks Next Generation Firewall and capability to effectively deploy the firewalls to enable network traffic
Section Objectives Palo Alto Networks Security Operating Platform Core Requirements
- Identify the components of the Palo Alto Networks Security Operating Platform.
- dentify the components and operation of single‐pass parallel processing architecture.
- Given a network design scenario, apply the Zero Trust security model and describe how it relates to traffic moving through your network.
- Identify stages in the Cyber‐Attack Lifecycle and firewall mitigations that can prevent attacks. Simply Passing Traffic - Identify and configure firewall management interfaces.
- Identify how to manage firewall configurations.
- Identify and schedule dynamic updates.
- Configure internal and external services for account administration.
- Given a network diagram, create the appropriate security zones.
- Identify and configure firewall interfaces.
- Given a scenario, identify steps to create and configure a virtualrouter.
- Identify the purpose of specific security rule types.
- Identify and configure security policy match conditions, actions, and logging options.
- Given a scenario, identify and implement the proper NAT solution. Traffic Visibility - Given a scenario, select the appropriate application‐based security policy rules.
- Given a scenario, configure application filters or application groups.
- Identify the purpose of application characteristics as defined in the App‐ID database.
- Identify the potential impact of App‐ID updates to existing security policy rules.
- Identify the tools to optimize security policies. Securing Traffic - Given a risk scenario, identify and apply the appropriate security profile.
- Identify the difference between security policy actions and security profile actions.
- Given a network scenario, identify how to customize security profiles.
- Identify the firewalls protection against packet‐ and protocol‐ based attacks.
- Identify how the firewall can use the cloud DNS database to control traffic based on domains.
- Identify how the firewall can use the PAN‐DB database to control traffic based on websites.
- Discuss how to control access to specific URLs using custom URL filtering categories. Identifying Users - Given a scenario, identify an appropriate method to map IP addresses to usernames.
- Given a scenario, identify the appropriate User‐ID agent to deploy.
- Identify how the firewall maps usernames to user groups.
- Given a graphic, identify User‐ID configuration options. Deployment Optimization - Identify the benefits and differences between the Heatmap and the BPA reports.
- Heatmap Component
- Zone Mapping Feature Section