Exam PCNSA All QuestionsBrowse all questions from this exam
Question 40

Which three statements describe the operation of Security policy rules and Security Profiles? (Choose three.)

    Correct Answer: B, C, E

    Security Profiles are attached to Security policy rules, which means that they cannot stand alone and need the rules to be in place for assignment and enforcement. Since Security policy rules dictate the handling of traffic, including whether to allow or block it, it makes sense that Security Profiles would only be applicable to allowed traffic to provide additional security measures such as antivirus scanning or URL filtering. Security policy rules themselves have the capability to both block and allow traffic; this is their fundamental purpose within a security infrastructure.

Discussion
LyuboOptions: BCE

B, C, and E seem to be correct answers.

ramasamymuthiahOptions: BCE

Correct Answer is B, C & E

Sanjug2022Options: BCE

Correct B,C,E

3osuwaOptions: BCE

by process of elimination, A and D are obviously wrong.

daytonadave2011Options: BCE

B, C, and E are the correct answers.

FreakezoidOptions: BCE

Correct answer: B,C,E

elbi05Options: BCE

B. Security profiles are the ones attached to Sec policy rules not the other way around. C. It doesn't make sense if you have a security profile on a denied traffic by the Security policy rule E. Security policy rules can block and allow traffic

bishop2009Options: BDE

BDE. B. Security Profiles are attached to Security policy rules. Security policies define how traffic is handled, and security profiles provide additional security measures like antivirus scanning or URL filtering. You can attach security profiles to security policies to extend their functionality. D. Security policy rules inspect but do not block traffic. Security policy rules can perform inspections on traffic based on various criteria (source, destination, application, etc.). Based on the match criteria and the defined action (allow or deny), they can either permit or block traffic flow. E. Security policy rules can block or allow traffic. This is the core functionality of security policies. They evaluate traffic against defined criteria and dictate whether to permit or deny its passage through the firewall. C. Security Profiles should be used only on allowed traffic. Security profiles can be applied to both allowed and denied traffic. For example, you might want to perform antivirus scanning on all traffic, even traffic that is ultimately blocked by the security policy.

Rakshith27Options: BCE

Security policy cannot be attached to security profile but it is other way around. Block traffic need not to have security profile. Hence ans is B C and E

Totosos1Options: BCE

B, C & E are absolutely correct, I work with Palo Alto's every day.

mr_flubberOptions: BCE

A and B contradict anyway

Mang_OneOptions: BCE

BCE seems to be the right answer

SamWBishOptions: BCE

B,C,E. A contradicts with B, correct?

Alessandr0Options: BCD

B,C and D if the question says Security policy and Security profile (means togheter) security policy cannot block must allow always in order to inspect the traffic and let the Security profile works

kewokil120Options: BCE

B, C, and E seem to be correct answers.

cabraOptions: BCE

Correct Answer is B, C & E

JustinoFigueiredoOptions: BCE

B, C, and E seem to be correct answers