Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PCNSC Topic 3 Question 72 Discussion

Actual exam question for Palo Alto Networks's PCNSC exam
Question #: 72
Topic #: 3
[All PCNSC Questions]

Where and how is Expedition installed^

Show Suggested Answer Hide Answer
Suggested Answer: C, D, E

Contribute your Thoughts:

Georgiann
1 years ago
So, we all agree on LDAP and RADIUS, and some of us think TACACS+ is also correct. Let's go with those three for our final answer.
upvoted 0 times
...
Val
1 years ago
SAML can only provide authentication information, not role names, so I don't think it's one of the options.
upvoted 0 times
...
Cruz
1 years ago
I believe SAML, LDAP, and RADIUS are the correct options.
upvoted 0 times
...
Georgiann
1 years ago
TACACS+ can also provide both username and role names, so I think it's one of the correct options.
upvoted 0 times
...
Val
1 years ago
I agree with LDAP and RADIUS, but I'm not sure about TACACS+.
upvoted 0 times
...
Georgiann
1 years ago
I think the answer is LDAP, TACACS+, and RADIUS.
upvoted 0 times
...
Chauncey
1 years ago
Yeah, TACACS+ is a solid option too. I'm just hoping they don't throw us a curve ball and include something obscure like Kerberos. That would really put my authentication protocol knowledge to the test!
upvoted 0 times
...
Eun
1 years ago
Wait, isn't PAP like, the most basic authentication protocol out there? I don't think that would be a good fit for the Palo Alto NGFW. But I could be wrong, so I'm open to input from the group.
upvoted 0 times
...
Yun
1 years ago
Good point. SAML does seem like a more logical choice compared to RADIUS. Although, TACACS+ could also potentially work since it's often used for network access control and can provide user role information.
upvoted 0 times
...
Catalina
1 years ago
I agree with you on LDAP and Kerberos, but I'm not sure about RADIUS. Wouldn't SAML be a better choice since it's a popular identity federation protocol that can pass along user attributes like roles?
upvoted 0 times
...
Hayley
1 years ago
Ooh, TACACS+ - I remember that one from my networking class. I think that might be a good choice too, along with LDAP and SAML.
upvoted 0 times
...
Buck
1 years ago
Hmm, this is an interesting question. It's testing our knowledge of user authentication services and which ones can provide both username and role information to the Palo Alto Networks NGFW. I'm thinking LDAP, RADIUS, and Kerberos are the three correct answers here.
upvoted 0 times
...
Vanna
1 years ago
I'm leaning towards LDAP, RADIUS, and Kerberos. But I'm curious to see if anyone has a different perspective on this.
upvoted 0 times
...
Laurel
1 years ago
SAML, LDAP, and RADIUS - those are my picks. I feel pretty confident about those, but I'm open to hearing what the others think too.
upvoted 0 times
Quinn
1 years ago
SAML, LDAP, and RADIUS seem to be the popular choices here.
upvoted 0 times
...
Elbert
1 years ago
I'm pretty confident it's SAML, LDAP, and Kerberos that can do the job.
upvoted 0 times
...
Albert
1 years ago
I'm leaning towards LDAP, RADIUS, and TACACS+ as the correct options.
upvoted 0 times
...
Timothy
1 years ago
I believe it's PAP, SAML, and RADIUS that can provide both username and role names.
upvoted 0 times
...
Dierdre
1 years ago
I think TACACS+, LDAP, and Kerberos could be the right ones.
upvoted 0 times
...
Miles
1 years ago
I'm not too sure about RADIUS, but SAML and LDAP seem like good options for sure.
upvoted 0 times
...
Germaine
1 years ago
I agree with you, I also think SAML, LDAP, and RADIUS are the correct choices.
upvoted 0 times
...
...
Bronwyn
1 years ago
Hmm, I think I've worked with a few of these authentication services before, but I'm not sure which ones can be modified for the Palo Alto NGFW. This is going to require some careful thinking.
upvoted 0 times
...
Renea
1 years ago
Man, this question looks tricky. I'm not sure I know the exact answer, but I'm going to give it my best shot.
upvoted 0 times
Kendra
1 years ago
I'm pretty sure it's PAP, SAML, and RADIUS.
upvoted 0 times
...
Kendra
1 years ago
No, I believe it's SAML, LDAP, and Kerberos.
upvoted 0 times
...
Kendra
1 years ago
I think the answer is LDAP, TACACS+, and RADIUS.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77