PCNSA Palo Alto Networks Certified Network Security Administrator testing | http://babelouedstory.com/

PCNSA testing - Palo Alto Networks Certified Network Security Administrator Updated: 2023

Pass4sure PCNSA test braindumps with real questions and practice software.
Exam Code: PCNSA Palo Alto Networks Certified Network Security Administrator testing June 2023 by Killexams.com team

PCNSA Palo Alto Networks Certified Network Security Administrator

Exam Name : Network Security Administrator
Exam Number : PCNSA PAN OS 9
Exam Duration : 80 minutes
Questions in test : 50
Passing Score : 70%
Exam Registration : PEARSON VUE
Real Questions : Palo Alto PCNSA Real Questions
VCE practice questions : Palo Alto Networks Certified Network Security Administrator Practice Test

OBJECTIVE: Demonstrate your ability to configure the central features of Palo Alto Networks Next Generation Firewall and capability to effectively deploy the firewalls to enable network traffic

Section Objectives Palo Alto Networks Security Operating Platform Core Requirements
- Identify the components of the Palo Alto Networks Security Operating Platform.
- dentify the components and operation of single‐pass parallel processing architecture.
- Given a network design scenario, apply the Zero Trust security model and describe how it relates to traffic moving through your network.
- Identify stages in the Cyber‐Attack Lifecycle and firewall mitigations that can prevent attacks. Simply Passing Traffic - Identify and configure firewall management interfaces.
- Identify how to manage firewall configurations.
- Identify and schedule dynamic updates.
- Configure internal and external services for account administration.
- Given a network diagram, create the appropriate security zones.
- Identify and configure firewall interfaces.
- Given a scenario, identify steps to create and configure a virtualrouter.
- Identify the purpose of specific security rule types.
- Identify and configure security policy match conditions, actions, and logging options.
- Given a scenario, identify and implement the proper NAT solution. Traffic Visibility - Given a scenario, select the appropriate application‐based security policy rules.
- Given a scenario, configure application filters or application groups.
- Identify the purpose of application characteristics as defined in the App‐ID database.
- Identify the potential impact of App‐ID updates to existing security policy rules.
- Identify the tools to optimize security policies. Securing Traffic - Given a risk scenario, identify and apply the appropriate security profile.
- Identify the difference between security policy actions and security profile actions.
- Given a network scenario, identify how to customize security profiles.
- Identify the firewalls protection against packet‐ and protocol‐ based attacks.
- Identify how the firewall can use the cloud DNS database to control traffic based on domains.
- Identify how the firewall can use the PAN‐DB database to control traffic based on websites.
- Discuss how to control access to specific URLs using custom URL filtering categories. Identifying Users - Given a scenario, identify an appropriate method to map IP addresses to usernames.
- Given a scenario, identify the appropriate User‐ID agent to deploy.
- Identify how the firewall maps usernames to user groups.
- Given a graphic, identify User‐ID configuration options. Deployment Optimization - Identify the benefits and differences between the Heatmap and the BPA reports.
- Heatmap Component
- Zone Mapping Feature Section
Palo Alto Networks Certified Network Security Administrator
Palo-Alto Administrator testing

Other Palo-Alto exams

ACE Accredited Configuration Engineer (ACE)
PCNSE Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 10
PCCSA Palo Alto Networks Certified Cybersecurity Associate
PCNSA Palo Alto Networks Certified Network Security Administrator
PCNSE-PANOS-9 Palo Alto Networks Certified Security Engineer (PCNSE PAN-OS 9.0)
PCCET Palo Alto Networks Certified Cybersecurity Entry-level Technician
PSE-Strata Palo Alto Networks System Engineer Professional Strata
PCCSE Prisma Certified Cloud Security Engineer
PCSAE Palo Alto Networks Certified Security Automation Engineer

killexams.com is the ultimate preparation source for passing the PCNSA PCNSA exam. We have carefully complied and assembled PCNSA real test questions and answers, which are updated with the same frequency as real PCNSA test is updated, and reviewed by industry experts. Huge Discount Coupon and Promo codes are offered for great discount.
PCNSA Braindumps
PCNSA Real Questions
PCNSA Practice Test
PCNSA dumps free
Palo Alto Networks Certified Network Security Administrator
Question: 80
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.
Complete the security policy to ensure only Telnet is allowed.
Security Policy: Source Zone: Internal to DMZ Zone __________services Application defaults, and action = Allow
A. Destination IP:
B. Application = Telnet
C. Log Forwarding
D. USER-ID = Allow users in Trusted
Answer: B
Question: 81
Which three types of authentication services can be used to authenticate user traffic flowing through the firewalls data
plane? (Choose three )
D. Kerberos
Answer: A,B,D
Question: 82
What do you configure if you want to set up a group of objects based on their ports alone?
A. Application groups
B. Service groups
C. Address groups
D. Custom objects
Answer: B
Question: 83
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and
DMZ servers using SSH. web-browsing and SSL applications.
Which policy achieves the desired results?
A. Option
B. Option
C. Option
D. Option
Answer: C
Question: 84
Given the detailed log information above, what was the result of the firewall traffic inspection?
A. It was blocked by the Vulnerability Protection profile action.
B. It was blocked by the Anti-Virus Security profile action.
C. It was blocked by the Anti-Spyware Profile action.
D. It was blocked by the Security policy action.
Answer: C
Question: 85
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against
a targeted machine.
A. Exploitation
B. Installation
C. Reconnaissance
D. Act on Objective
Answer: A
Question: 86
How are Application Fillers or Application Groups used in firewall policy?
A. An Application Filter is a static way of grouping applications and can be configured as a nested member of an
Application Group
B. An Application Filter is a dynamic way to group applications and can be configured as a nested member of an
Application Group
C. An Application Group is a dynamic way of grouping applications and can be configured as a nested member of an
Application Group
D. An Application Group is a static way of grouping applications and cannot be configured as a nested member of
Application Group
Answer: B
Question: 87
Complete the statement. A security profile can block or allow traffic____________
A. on unknown-tcp or unknown-udp traffic
B. after it is matched by a security policy that allows traffic
C. before it is matched by a security policy
D. after it is matched by a security policy that allows or blocks traffic
Answer: B
Security profiles are objects added to policy rules that are configured with an action of allow.
Question: 88
Which interface does not require a MAC or IP address?
A. Virtual Wire
B. Layer3
C. Layer2
D. Loopback
Answer: A
Question: 89
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)
A. facebook
B. facebook-chat
C. facebook-base
D. facebook-email
Answer: B,C
Question: 90
Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the
infected host attempting to contact and command-and-control (C2) server.
Which security profile components will detect and prevent this threat after the firewall`s signature database has been
A. antivirus profile applied to outbound security policies
B. data filtering profile applied to inbound security policies
C. data filtering profile applied to outbound security policies
D. vulnerability profile applied to inbound security policies
Answer: C
Question: 91
Which statement is true about Panorama managed devices?
A. Panorama automatically removes local configuration locks after a commit from Panorama
B. Local configuration locks prohibit Security policy changes for a Panorama managed device
C. Security policy rules configured on local firewalls always take precedence
D. Local configuration locks can be manually unlocked from Panorama
Answer: D
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/administer-panorama/manage- locks-
Question: 92
Which solution is a viable option to capture user identification when Active Directory is not in use?
A. Cloud Identity Engine
B. group mapping
C. Directory Sync Service
D. Authentication Portal
Answer: D
Question: 93
An internal host wants to connect to servers of the internet through using source NAT.
Which policy is required to enable source NAT on the firewall?
A. NAT policy with source zone and destination zone specified
B. post-NAT policy with external source and any destination address
C. NAT policy with no source of destination zone selected
D. pre-NAT policy with external source and any destination address
Answer: A
Question: 94
What are three differences between security policies and security profiles? (Choose three.)
A. Security policies are attached to security profiles
B. Security profiles are attached to security policies
C. Security profiles should only be used on allowed traffic
D. Security profiles are used to block traffic by themselves
E. Security policies can block or allow traffic
Answer: B,C,E
Question: 95
What is a recommended consideration when deploying content updates to the firewall from Panorama?
A. Before deploying content updates, always check content release version compatibility.
B. Content updates for firewall A/P HA pairs can only be pushed to the active firewall.
C. Content updates for firewall A/A HA pairs need a defined master device.
D. After deploying content updates, perform a commit and push to Panorama.
Answer: D
Reference: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-licenses-and-updates/deploy-
Question: 96
An administrator wishes to follow best practices for logging traffic that traverses the firewall
Which log setting is correct?
A. Disable all logging
B. Enable Log at Session End
C. Enable Log at Session Start
D. Enable Log at both Session Start and End
Answer: B
Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC
Question: 97
Which administrator type utilizes predefined roles for a local administrator account?
A. Superuser
B. Role-based
C. Dynamic
D. Device administrator
Answer: C
Question: 98
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
A. any supported Palo Alto Networks firewall or Prisma Access firewall
B. an additional subscription free of charge
C. a firewall device running with a minimum version of PAN-OS 10.1
D. an additional paid subscription
Answer: A
Question: 99
Refer to the exhibit.
A web server in the DMZ is being mapped to a public address through DNAT.
Which Security policy rule will allow traffic to flow to the web server?
A. Untrust (any) to DMZ (, web browsing -Allow
B. Untrust (any) to Untrust (, web browsing Allow
C. Untrust (any) to Untrust (, web browsing -Allow
D. Untrust (any) to DMZ (, web browsing Allow
Answer: D
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/networking/nat/nat-configuration-
For More exams visit https://killexams.com/vendors-exam-list
Kill your test at First Attempt....Guaranteed!

Palo-Alto Administrator testing - BingNews https://killexams.com/pass4sure/exam-detail/PCNSA Search results Palo-Alto Administrator testing - BingNews https://killexams.com/pass4sure/exam-detail/PCNSA https://killexams.com/exam_list/Palo-Alto Becoming An MSSP Is Hard. Partnering With One Could Be A Better Answer

Security News

Kyle Alspach

Solution providers looking to bring managed security services to their customers -- without having to offer the services themselves --are finding growing options to do so through partnerships within the channel community.


For solution provider Alacrinet, its portfolio of specialized cybersecurity services has been a strong source of growth in recent years. The Palo Alto, Calif.-based company’s offerings range from implementation services for a full array of cyberdefense tools to risk assessment services such as penetration testing.

What the company is not, however, is an MSSP. And it doesn’t want to be.

“When we were looking at the MSP market, we saw that we could either build out another business unit around MSP—which in some cases might make sense—or we could partner,” said Daniel Duhaime, vice president of sales at Alacrinet. “We decided to partner.”

Amid the massive cybersecurity talent shortage, intensifying threat environment and relentless complexity of running a cyberdefense operation in 2023, many customers are asking their trusted advisers for help with security. Countless organizations are looking to outsource more of their cybersecurity management to a third party, and for many in the channel, building an MSSP practice would seem to be a huge opportunity.

But becoming an MSSP is far easier said than done due to a high barrier to entry, increased liability and a host of other factors, MSSP executives told CRN.

[RELATED: Cyber Insurance Primer: How To Avoid The Pitfalls]

How can solution providers bring much-needed managed security services to their customers without actually having to offer the services themselves? A growing number of solution providers are finding that partnerships—within the channel community they know so well—may be the answer.

Alacrinet partners with 10 different MSSPs in total, a strategy that allows the solution provider to match the ideal service provider to each customer situation, Duhaime said.

One of those MSSP partners is Cyderes, a 900-person cybersecurity services powerhouse formed through the merger of Herjavec Group and Fishtech Group in 2022.

Within its six Security Operations Center (SOC) locations around the globe, Cyderes analysts do the critical work of monitoring and responding to security threats around the clock, every day of the year.

For Cyderes, partnering with other solution providers on deals is increasingly proving to be a smarter growth strategy than competing with them, according to Anthony Aurigemma, CRO of the Kansas City, Mo.-based company.

The model is so promising, in fact, that Cyderes launched a partner program of its own in March. The new program serves as a way to formalize the process and build trust between the company and its expanding set of collaborators within the channel, Aurigemma said.

Case in point: Cyderes recently won two new customers within the retail industry and state, local government and education (SLED) market by teaming up with another solution provider. The solution provider partner handled the closing of the deals, which included managed security services from Cyderes as part of the packages.

The arrangement has increased Cyderes’ reach, Aurigemma said, while enabling the solution provider partner to meet customer needs and generate margin.

But that’s not all. The deals came together faster than usual “because we didn’t compete with each other,” he said. “The client got everything that they wanted, and the process was much cleaner and speedier.”

The new Cyderes partner program underscores a movement toward greater collaboration between solution providers and MSSPs, sparked by the rising demand for managed security.

And it’s not just VARs that could benefit from exploring these types of in-channel partnerships to meet customer needs for managed security services, channel executives said. Even for an MSP that is adept at delivering managed IT services, expanding into the managed security side can be a major undertaking.

“We have seen MSPs, both large and small, say, ‘We’re going to take some of that on ourselves.’ And it’s a big lift,” said Ben Masino, CRO of Avertium, a Phoenix-based MSSP.

And so, while it might seem like a natural progression for MSPs to evolve into MSSPs over time, that’s not realistic in many cases, according to channel executives.

“Doing security operations 24x7 is a significant investment of time, money and resources. You need a lot of expertise to build it and then to scale it, maybe even more so to scale it. And it’s not the same as running a Network Operations Center. It’s a very different business,” Masino said.

The bottom line is that “for MSPs out there that are trying and struggling [on managed security], or don’t want to try, or have tried and failed, I think the partner model really works well,” he said. “As long as everybody’s very clear and you build trust in how you engage, I think it can be incredibly successful.”

Focus On Enablement

For Avertium, which formed in 2019 through the merger of three MSSPs, collaboration within the channel would seem to be in its DNA. All three of the pre-existing companies already had partnerships with other solution providers prior to the merger, Masino said.

Masino joined Avertium the following year and said he brought an emphasis on in-channel partnerships as a “core part” of his growth strategy for the company. Since then, “we’ve built on that and made it better, made it more formal,” he said.

That included the 2021 hire of cybersecurity sales veteran Randy Rosenbaum to head up Avertium’s channel partner program. The program puts a major emphasis on partner enablement, which can be one of the biggest challenges when two solution providers decide to work together, Masino said.

“How do you teach sales teams, partner teams what each partner does and how it fits together?” he said. “That doesn’t happen by accident. It really needs to be a concerted effort between the two partners to make sure that everybody’s up to date on how we work together, why we work together, what value the customer has. It sounds basic, but it is actually the thing that differentiates a good partnership from a bad one.”

One solution provider that has turned to Avertium to deliver managed security services to its end customers is Towerwall, a longtime provider of solutions and professional services for security.

The Framingham, Mass.-based company’s offerings span proactive services such as penetration testing, which entails using hacking techniques to assess security weaknesses, to reactive services such as incident response and remediation. But Michelle Drolet, founder and CEO of Towerwall, said the company has steered clear of offering its own managed services in order to avoid a conflict of interest with the other services the company provides, she said.

“What’s happening is you have these managed service providers [that are] adding information security arms. And so it’s not church and state anymore. Now it’s, ‘I’m monitoring your endpoints, I’m managing your firewalls. And hey, I could do penetration testing—on myself,’” Drolet said. “It’s getting really muddy now. The same thing goes with managed security service providers.”

Still, in cases where Towerwall resells a tool that a customer needs to have managed—such as a security information and event management (SIEM) or endpoint detection and response (EDR) product—customers are often looking to bundle in management of those tools. That’s when Towerwall’s partnership with Avertium comes into play.

Avertium operates two “cyber fusion” operations centers in the U.S. that are staffed 24x7 by security analysts, providing the continuous monitoring that is increasingly a must-have for many businesses for compliance reasons.

Providers of managed security services usually offer a lot more than just managed detection and response (MDR), a fast-growing cybersecurity category often focused on management of endpoint detection tools.

Many solution providers and MSPs partner with MDR vendors to bring essential threat detection capabilities to their customers, though managed security services offers a more comprehensive approach that many organizations are looking for.

“[Managed security services] is like the department store of security,” said Pete Shoard, vice president and analyst at research firm Gartner. “MDR is a much smaller slice. MDR is like one of the boutique retailers in the department store.”

While managed security services can comprise a range of offerings and levels of involvement, it typically requires operating a SOC that offers around-theclock security monitoring. That usually entails SIEM and EDR administration, threat intelligence, automation and advisory services, said Eron Howard, COO of Novacoast, a large MSSP based in Wichita, Kan.

“Running a good MSSP that’s actually doing 24x7 SOC coverage is not trivial. It’s taken us years to learn to get it right. And it’s super nuanced,” Howard said.

Compared with professional services around security, with managed security services, “you can’t just jump into it as easily,” he said.

MSSP Challenges

Even for well-resourced organizations, getting a SOC up and running—and hiring the necessary talent from a coveted pool of professionals—can pose massive hurdles, MSSP executives told CRN.

For instance, management consulting firm MorganFranklin Consulting launched its line of managed security services about a year ago. A few months in, the McLean, Va.-based company hired SOC veteran Justin Klein Keane from Meta, where he was the manager of internal detection and response.

“I think they learned very quickly how challenging it is, which is part of the reason they hired me, because I’ve done this before,” Klein Keane said. “Standing up these services is not just logistically challenging, but providing a compelling value proposition to potential customers is also really hard.”

For example, articulating what a customer will get at different price points for managed security services can be particularly tricky for those who haven’t done it before, according to Klein Keane, who is director of MorganFranklin Consulting’s SOC.

The genuine day-to-day work of serving as an outsourced security operations team for customers is notoriously difficult as well.

“In security operations, you are responding to alerts of anomalous activity and then having staff actually conduct investigations to make determinations, whether that is a malicious anomaly or a benign anomaly. Or if it’s just an outlier, maybe the detection needs to be tuned,” Klein Keane said. “Whenever you make those judgment calls, there is risk that you get it wrong. And there’s risk of impact for getting that wrong. I would advise any MSP to think very carefully about that risk.”

An MSP might be convinced to add a managed security line of business on account of the revenue opportunity, but there’s a lot that needs to be thought through first, he said.

“You need to think about, ‘How am I going to be able to staff this and provide the expertise in a way that I’m comfortable and confident that my team is making the right calls? And where I’m going to have the assurance that, if I faced a situation where someone made the wrong call and there was a calamitous business impact, that my position would be somehow defensible?’” Klein Keane said.

Liability considerations should be top of mind for any solution provider or MSP that’s entertaining the idea of adding an MSSP practice, channel executives said.

“There’s a lot of liability just from putting yourself out there and saying you do it,” said Seth Kilander, founder and CEO of Denver-based Ki Security and Compliance Group. “That liability could be exponential, especially when it comes to insurance.”

Without a doubt, when it comes to a service provider’s liability, “they’re essentially signing up for a lot more” by making the leap into MSSP work, said Andy Anderson, founder and CEO of cyber insurance broker DataStream.

If an MSP is considering such a move, Anderson said, “I think they really want to make sure that they are not making that decision lightly and that they actually are going to take on the responsibility and have the expertise to do it.”

Ki Security and Compliance Group has intentionally stayed away from describing itself as an MSSP even though the company is “close to one” in terms of capabilities, Kilander said. For instance, the company doesn’t operate its own SOC or offer SIEM capabilities, “which an MSSP definitely should,” he said.

All in all, “we’re covering some of the MSSP [capabilities], and then we’re outsourcing the rest” to a trusted partner, Kilander said. “We work with them very closely so that all of our stuff is tying through theirs. [We want to] have that relationship where they are an extension of us.”

There’s a widespread mentality in the MSP community that prevents many solution providers from taking a similar approach, however, he said.

“Most MSPs come from the side of, ‘We do everything. You don’t need anyone else. And if you have anything else, our contract is void,’” Kilander said. “We have to get past this mindset.”

Managed Security Basics

For solution providers and MSPs that do want to explore expanding into managed security services, there are a few good places to start, channel executives told CRN.

For instance, an MSP could start by acquiring an inexpensive SIEM platform and collecting logs from different systems, according to Stel Valavanis, founder and CEO of onShore Security, a Chicago-based MSSP. From there, it could begin to build processes around managing the data, policies and reporting, he said.

By doing that work, “they can actually gain a lot of maturity in a pretty short time, if they really want to become an MSSP,” Valavanis said.

However, he said, MSPs on this journey need to recognize that delivering managed security services requires a different mindset than traditional management of IT. “Security is more like accounting than it is like firefighting,” Valavanis said.

Because attackers typically are inside victims’ systems for weeks or months before they’re detected, “you’re looking for activity that hints that there are things going on,” he said, which is akin to accounting work. “You’re not looking for attacks as they happen.”

For this reason, MSPs should not necessarily view the MSSP model as the next logical step, Valavanis said. “It has a very different nature to it,” he said. Too often, though, service providers looking to expand to become MSSPs run into problems from “dragging in some of that MSP thinking,” Valavanis said.

For an MSP that’s exploring the idea of offering managed security services to customers, a recommended initial step is to become proficient at managing its own internal cybersecurity program, according to FCI Cyber CEO Brian Edelman.

“If you do it [well] for yourself, then make that jump,” said Edelman, who founded the Bloomfield, N.J.-based MSSP in 1995. “But if you don’t do it well for yourself, then learn to do it well for yourself—and then make an informed decision that allows you to do something that’s good for you and your clients.”

Serving SMBs

For those solution providers and MSPs that want to play an important role in meeting customer needs for managed security services—but aren’t inclined to try to deliver those services inhouse— there are a growing number of choices.

In addition to working with MSSPs such as Cyderes and Avertium, another notable partnership option was originally devised by security service provider Novacoast.

The offering, Pillr, is targeted at MSPs that serve SMBs, with its platform that enables partners to bring 24x7 SOC services to SMB customers.

A platform like Pillr’s is needed because, first and foremost, most security vendors tailor their products to the requirements of large global enterprises, said Adam Gray, chief science officer at Pillr. But for SMBs, many products are “either too complicated or too watered down, or don’t really fit their budgets and people and expertise,” he said.

“I founded the Pillr side specifically to fill that market and that void,” said Gray, who is also the CTO of Novacoast. Now a separate entity from Novacoast, Pillr currently works with 1,300 partners in North America and Europe.

Notably, for the MSPs that work with Pillr to bring SOC coverage to their SMB customers, something interesting tends to happen: They naturally Excellerate their capability for delivering valuable security services, according to Gray.

“They become much better practitioners around remediation and response,” he said. And from there, MSPs will often get more involved with deploying vulnerability management controls and helping their customers with improving their cyber hygiene, Gray noted.

By working with Pillr, MSPs also “get better at studying the threat intel reports, they get better at the advisory reports, and they start to get a lot more proactive,” he said. “They become much better stewards of security simply by having access to the information and having it digested in a way that is suitable for them.”

Building Trust

For Cyderes and its recently introduced channel program, the focus so far has been on working with reseller partners. The program includes the major components of a typical channel offering: discounts and margins, deal registration and protection, training, dedicated channel account managers and co-selling opportunities.

Jamie Wolf, formerly a channel executive at cybersecurity vendors including Black Kite and Onapsis, leads the partner program as Cyderes’ head of global channel, alliances and ISVs.

By working with channel partners, MSSPs such as Cyderes get the classic benefit of a boost to their scalability, noted Alacrinet’s Duhaime: “It’s cheaper to supply us margin than it would be to try to acquire all those customers on their own.”

There are some differences with a partnership between two companies in the channel, however, as compared with a partner-vendor relationship. For instance, from the get-go, extra effort may need to be put in around building trust—especially when it comes to navigating potential areas of competition.

As part of establishing its in-channel partnerships, Cyderes has made clear to its VAR partners that product resale is not a top priority, according to Cyderes’ Aurigemma.

“They need to be assured when working with you that you aren’t going to step into their space,” he said. “That’s the piece of the puzzle that I think we’re starting to unlock. I think others will figure that out as well.”

Ultimately, “when they meet us and realize that we’re not looking to encroach on some of their core services—that we know our swim lane—we’ve had some great outcomes.” 

Kyle Alspach

Kyle Alspach is a Senior Editor at CRN focused on cybersecurity. His coverage spans news, analysis and deep dives on the cybersecurity industry, with a focus on fast-growing segments such as cloud security, application security and identity security.  He can be reached at kalspach@thechannelcompany.com.

Mon, 05 Jun 2023 02:00:00 -0500 en text/html https://www.crn.com/news/security/becoming-an-mssp-is-hard-partnering-with-one-could-be-a-better-answer
Archer rolls out first Midnight aircraft

Archer Aviation Inc., a leader in electric vertical takeoff and landing (eVTOL) aircraft, announced it has now completed the final assembly of its first Midnight aircraft. With final assembly and initial testing complete, last week the aircraft was shipped from Archer’s Palo Alto facility to its flight test facility in Salinas, California and reassembled. Archer will now take this aircraft through a series of ground tests leading up to its planned first flight this summer. The Midnight aircraft has recently garnered significant attention from the U.S. Department of Defense given its payload capabilities.

This Midnight aircraft will enable Archer to perform critical “company testing” to accelerate and reduce risk on its certification program with the Federal Aviation Administration (“FAA”) in advance of “for credit” certification testing that the company plans to begin early next year with piloted Midnight aircraft. Our strategy with this aircraft is to allow Archer to fly many of the same test points that will be needed during piloted “for credit” flight testing in order to further validate the aircraft before the FAA witnesses and participates in the testing – a customary practice in many aircraft certification programs.

Component manufacturing is already underway for Archer’s conforming Midnight aircraft. Archer is targeting the completion of final assembly of its initial conforming Midnight aircraft in Q4 2023 and to begin piloted flight test operations in early 2024. 

“Today we announced our exciting progress that the final assembly of our first Midnight aircraft is now complete and it is preparing for its flight test program,” said Adam Goldstein, Archer’s Founder and CEO. “This aircraft will accelerate and reduce risk on our certification program paving the way for our team to focus on building and conducting piloted operations with conforming aircraft to support the goal of entering into service in 2025.”

Archer’s industry-leading team, alongside its key strategic partners, Stellantis and United Airlines, continues to advance its aircraft development and commercial operations with impressive speed and efficiency. The company has also established a significant lead over industry peers on the manufacturing and commercial operations fronts with the build out of its high-volume manufacturing facility in Covington, Georgia underway and announced key strategic electric air taxi routes in New York and Chicago.

With a range of up to 100 miles, Archer’s Midnight aircraft is designed to perform rapid back-to-back flights with minimal charge time in between. Archer’s goal is to transform inter-city travel, replacing 60-90 minute commutes by car that can take over an hour in traffic with ~10-20 minute electric air taxi flights that are safe, sustainable, low noise and cost competitive with ground transportation.

Wed, 24 May 2023 04:12:00 -0500 en-US text/html https://www.jeccomposites.com/news/archer-rolls-out-first-midnight-aircraft/
The new Palo Alto App

Download Palo Alto Online App
from the Google Play Store for Android

1. Go to 'Market' on your Android-powered device.
2. Select 'Search'.
3. Enter 'Palo Alto Online' into the search field.
4. Once you've found the 'Palo Alto' app, touch to install.
5. Follow the onscreen instructions to proceed with the installation.

Unfortunately, this is a brand new app and will have to be downloaded again. An upgrade is not possible.

Mon, 01 Nov 2010 06:36:00 -0500 en text/html https://www.paloaltoonline.com/app/
Up 50% in 2023, Is Palo Alto Networks Stock Still a Buy Now? No result found, try new keyword!After yet another exceptional financial update, shares of Palo Alto Networks (NASDAQ: PANW) are up a whopping 50% so far in 2023. The cybersecurity pure-play leader has some lofty goals and keeps ... Tue, 30 May 2023 21:42:00 -0500 text/html https://www.nasdaq.com/articles/up-50-in-2023-is-palo-alto-networks-stock-still-a-buy-now Palo Alto Unified sets forth plan for preventing violence

The Palo Alto Unified School District is expediting plans to address student violence and other harmful behaviors, Superintendent Don Austin said in a Superintendent's Update released on Friday, May 26.

The actions, which were previously planned to roll out in stages, are meant to address teachers', parents' and students' concerns regarding behavior issues, communication and student support.

The rapid rollout comes after two teachers were injured during a May 5 incident involving a special needs student at Jane Lathrop Stanford Middle School. One teacher was struck on the head with a folding chair and kicked in the stomach, and another teacher was punched several times in the face. The student's parents said he sustained injuries to his arm, according to Palo Alto police.

Numerous teachers spoke emotionally about students' behavioral problems at the May 23 Board of Education meeting. They said they can no longer handle situations and pleaded with the board to institute remedies quickly.

"Behavior has been tough for us as teachers. It has kind of gotten away from us, and we need help," one teacher tearfully told the board. "We're being asked to be therapists, teachers, administrators, behavior analysts — everything on our own, isolated in our classrooms, and we can't do it."

In his update, Austin acknowledged what teachers have said.

"We have listened attentively to the valuable feedback provided by our staff members, families, advocates and other stakeholders, which has guided us in formulating the most effective steps forward," Austin wrote. "The unfortunate incidents involving injuries to staff, along with other impactful events throughout this school year, have compelled us to take swift action for the coming year."

The district has started a third-party external investigation into the incident at JLS. A system-wide review will produce beneficial insights to help all schools improve, Austin said.

Hiring 'behavioral intervention' staff

The district is also committing to hiring 12 new behavioral intervention coaches for the school sites, a significant staffing increase. The new staff would ensure each school has consistent support. The move is in response to feedback the district received from its behavioral support team, classroom professionals and additional stakeholders, Austin said.

"We recognize that this increase will have budget impacts; however, doing so is a top priority based on the feedback from our professional team of district educators and the concerned community," Austin said.

The district's professional unions, Palo Alto Educators Association (PAEA) and California School Employees Association (CSEA), have also expressed concerns regarding staff members' training in de-escalation techniques and handling physical altercations.

Austin said the district will be providing a modified safety-care-training program for all employees next year. The training will equip staff members with skills to navigate challenging situations, he said.

The district will also fully staff a second therapeutic services (TS) program at Fletcher Middle School, alongside the existing program at Greene Middle School, to enhance school support services. The elementary and high school TS program will continue operating at Duveneck Elementary and Palo Alto High School respectively, so that students across all grade levels receive needed therapeutic support.

On June 6, the Board of Education will consider adopting a districtwide social emotional learning program called Second Step, which will provide consistent support and guidance to elementary programs. Second Step aims to foster healthy emotional development and build strong interpersonal skills among students, Austin said.

Taking on social media

The district will also address social media behaviors and online bullying.

"Recognizing the impact of social media on our school community, we have formed a new partnership with Josh Ochs and SmartSocial. Together, we will address the challenges associated with appropriate conduct on social media platforms. This collaboration will provide learning opportunities for both our families and students, empowering them to navigate the digital world responsibly," Austin said.

The district is also starting the PAUSD Speaker Series, six districtwide events that will cover a range of relevant Topics and offer insights to the community, fostering a sense of togetherness and shared learning, he said. The district will work with the PTA and local partners to create the programs. A calendar will come out prior to the start of the 2023-2024 school year.

A new ad hoc committee consisting of parents and staff members will discuss district communication strategies and clear expectations for staff and students, promoting better understanding, and reducing potential confusion, he said.

Austin acknowledged that the planned initiatives will take funding but said that the cost of not implementing them will far outweigh the investment.

"We understand that the ending of this year has been challenging for some members of our community, and we empathize with the difficulties you have experienced. As we move forward, we are optimistic about the positive changes that lie ahead," he said. "By working together and implementing these measures, we can create a safer, more inclusive, and supportive learning environment for all members of our school community."

Wed, 31 May 2023 04:55:00 -0500 en text/html https://www.paloaltoonline.com/news/2023/05/31/palo-alto-unified-sets-plan-for-preventing-violence
Palo Alto High School (Paly) Access Denied You don't have permission to access "http://www.usnews.com/education/best-high-schools/california/districts/palo-alto-unified-school-district/palo-alto-high-school-paly-2993" on this server.

Reference #18.ad7dd17.1686018116.6763ea77

Sat, 15 Aug 2020 13:45:00 -0500 text/html https://www.usnews.com/education/best-high-schools/california/districts/palo-alto-unified-school-district/palo-alto-high-school-paly-2993
East Palo Alto Academy No result found, try new keyword!High school students take AP® exams and IB exams to earn college credit and demonstrate success at college-level coursework. U.S. News calculated a College Readiness Index based on AP/IB test ... Sat, 29 Apr 2023 01:25:00 -0500 text/html https://www.usnews.com/education/best-high-schools/california/districts/east-palo-alto-academy-district/east-palo-alto-academy-3082 Navigating the 'instutional highway': faculty on approaching politics at Stanford

In the height of the Vietnam War, Bruce Franklin was an outspoken professor. Then, he got fired for his activism at Stanford. (Photo: The Stanford Daily Archive)

May 28, 2023, 11:14 a.m.

It’s 1972 at Stanford, and the Vietnam War is raging on. The effects of the conflict can be felt on campus, from student-led anti-war protests to Stanford’s continued involvement in the war effort. Bruce Franklin, a once-tenured English professor, was just fired for allegedly inciting students to “disrupt University functions,” through two public speeches and a verbal protest to police.

Franklin’s firing did not sit well with many students. So, the student body did the thing it was probably most well-known for doing at this time: they demonstrated. Many times. At one rally for Franklin, 300 students tried to seize a building in protest, though they were met by locked doors and Palo Alto police in riot gear.

The events that took place at Stanford were just a snapshot of what was going on across the country. While students at nearly every college protested against the bloodshed and destruction that the Vietnam War caused, parts of the Stanford Research Institute (SRI) were directly involved in supporting the war effort. Stanford’s Computation Center was working on Gamut-H, a government program sponsored by the SRI that was linked to a Navy amphibious attack model.

Many students did protest against the University’s ties to Vietnam, doing everything from shutting down the Applied Electronics Laboratory to blocking traffic to the SRI.

The Vietnam War demonstrated the power administrators, faculty and students all have in setting the tone for their campus on pressing issues. But what steps are all these different stakeholders taking today? And how has the intersection of universities and policies changed in recent years?

Stanford’s historical support for the war and the subsequent dismissal of Franklin starkly contrasts with its current approach to political issues. However, varying viewpoints among faculty regarding the extent and importance of free speech persist, as commonly observed across college campuses. 

While professors generally concur that the administration tries to maintain neutrality towards their views, professors seem to still have disagreements between each other regarding personal politics. These disagreements have been exemplified by recent incidents such as controversial comments made by Hoover Institution senior fellow Scott Atlas about COVID-19 and the University’s response to a student demonstration during a talk by federal Judge Kyle Duncan at Stanford Law School (SLS).

Stanford’s historical support for the war and the subsequent dismissal of Franklin differs from the University’s current approach to political issues, which current faculty have described as a more neutral approach. However, there are still disagreements among faculty about the significance and limits of free speech.  

David Palumbo-Liu, a comparative literature professor who often speaks out on issues related to progressive politics and social justice, said the administration has been “super neutral” about his personal politics. 

Palumbo-Liu was hired to work in the Asian-American studies program after a student protest for ethnic studies. Now, he sees his role at Stanford as someone who is unafraid to challenge authority. 

“I’ve never been particularly intimidated by Stanford because that’s what they hired me to do, to be visible and an advocate for studies in race and ethnicity,” he said.

Every one of the faculty interviewed for this story said that they also felt the administration tries to be neutral when it comes to the professors’ political affiliations. 

“I think that the University tries to not take stands on things as much as they can avoid it,” Joe Lipsick, a pathology and genetics professor who sets the agenda for faculty senate meetings, said. “I’ve never seen a faculty member discriminated against based on their political views, but there are differences in opinion.” 

The changing current events and various responses from University administrators leads to a central question that the country also seems to be grappling with: what is the role of a university in society?

Stanford vs. the Antiwar Movement

The run-ins with police and seizing of buildings highlight the rising tensions between the administration, professors and students during the Vietnam War. And it had been tense even before Franklin’s dismissal.

On Jan. 14, 1969, a group of 40 students from Students for a Democratic Society (SDS) interrupted a Board of Trustees meeting to urge the trustees to stop any projects relating to Southeast Asia. Of those who participated, 29 students were penalized with probation and fines

Franklin was known for being outspoken. He was the final speaker at a campus rally to protest the Laos invasion, when he urged the students to “strike” at the Computation Center. His final words were “Shut it down.” 

The next day, he was fired.

“[Franklin] was picked out of the [protest] crowd by the moderator from the Hoover Institution even though he was not participating in the heckling,” Lenny Siegel, who wrote a book about the Stanford Vietnam War era, said. “I’m saying that because I was a witness and I testified to that effect.” 

The Bruce Franklin Legal Fund wrote in The Daily in 1972 that the Board’s decision to fire Franklin was based on the “uncomfortably heterodox” nature of Franklin’s political views, though the University insisted that it was about his actions, not his beliefs. Of the four charges brought against him, one was thrown out in court in 1978 and one was not sustained.

According to Siegel, Bruce represented a threat to the University that had “relatively little to do with the incidents that he was fired for.” 

“There was often a tension between the faculty, which thought it ran the University, and the trustees, and the administration was in between,” Siegel said.

In an interview with the Daily in 2019, when he returned to Stanford to speak about his memoir, Franklin said that Stanford’s involvement in the Vietnam War “changed people’s understanding of the roles of a university in society.” 

Palumbo-Liu expressed a similar sentiment about the Vietnam War protests at Stanford, marking them as a special case of protests. 

“Bruce pointed out that the University was part of the war effort. People felt that the niceties of the ivory tower had to take a backseat to pressing issues,” he said. “Many of us felt that the U.S. government had broken the law.”

Scott Atlas, Kyle Duncan and Academic Freedom

Fast forward nearly 50 years after Franklin’s firing. Campus is rocked by another groundbreaking world event. Except this time, instead of going out into the streets, students are going home to their childhood bedrooms. And instead of carrying around heavy gas masks, students are stocking up on thin surgical masks.  

In the thick of the COVID-19 pandemic, former COVID-19 adviser to Donald Trump and Hoover fellow Dr. Scott Atlas was condemned by around 100 Stanford faculty members for his advising on COVID-19 in an open letter organized by former School of Medicine Dean Philip Pizzo. During the pandemic, Atlas suggested that children don’t transmit the virus, questioned the efficacy of face masks and advocated for a “herd immunity” strategy. He also pushed people to “rise up” against Michigan Governor Gretchen Whitmer’s COVID-19 public health measures.

After that comment, the University released a statement, saying “Dr. Atlas has expressed views that are inconsistent with the University’s approach in response to the pandemic.” Officials also released a statement saying they supported “using masks, social distancing, and conducting surveillance and diagnostic testing.

Stanford President Marc Tessier-Lavigne, Hoover Institution director Condoleeza Rice and Provost Presis Drell all voiced concern over Atlas’ comments. However, some professors, including Palumbo-Liu, thought that the University did not distance itself enough from Atlas at that point.

The Faculty Senate passed a resolution condemning Atlas for his statements on COVID-19, though they disagreed over whether or not he should be subjected to disciplinary action.

Lipsick said that the Atlas story is complicated. 

“I don’t agree at all with what he said and what he did, but he does have a right to say things,” Lipsick said. 

He also noted that faculty being responsible for the statement is problematic and raised the question of whether or not faculty should be driving the University’s official stance. 

Palumbo-Liu, however, said that he views the issue differently. He said that Atlas “used his connections to Stanford to make pronouncements on things he wasn’t qualified to make pronouncements on.” 

“Academic freedom is one value, but it doesn’t trump academic responsibility,” he said.

Atlas did not respond to The Daily’s request for comment. 

The University was once again tested a couple months ago on March 9, when Judge Kyle Duncan, who was invited to speak at the Stanford Law School (SLS) by the Federalist Society, was interrupted by booing from audience members who said Duncan supports laws that would harm women, immigrants and LGBTQ+ people. Some people also accused Duncan of playing into the emotions of the protestors by filming them and using inflammatory language, including insulting protestors. 

How was the University supposed to respond to this protest? Does freedom of speech outweigh etiquette in academic settings?

In his statement responding to the incident, Tessier-Lavigne said that “the world is a place of disagreement, and we would not be preparing students adequately if we sheltered them from ideas they find difficult.” He expressed Stanford’s commitment to academic freedom and called the events at the law school “deeply disappointing.” Tessier-Levigne also endorsed SLS dean Jennifer Martinez’s “forceful message” and said people are free to “express their views and even protest; what they may not do is disrupt the effective carrying out of the event.”

“I think the administration aspires to be neutral and encourage academic freedom and free speech,” comparative literature professor Russell Berman said, referencing Tessier-Lavigne’s recent statement. “I’m not sure that the ideal situation that he describes in that eloquent statement is an accurate description of empirical conditions at all times at the University.”

Palumbo-Liu, however, felt the reactions from University leadership were excessive. 

“The offense was real but not that important in real life,” he said “I think the whole thing was kind of silly.”

The University did not directly respond to the comments from Palumbo-Liu and Berman, but wrote in a statement that the “University leadership respects the wide range of individual viewpoints in our community on issues and events in the world, and therefore most typically issues institutional statements only when there is a direct tie to the mission or operations of the University.”

The Institutional Highway

When reflecting on the role of the University in political matters, Berman pointed to the the University of Chicago’s 1967 Kalven Report as an important set of guidelines. The Report establishes the role of a university in political and social action, emphasizing the importance of institutional neutrality on social and political issues in protecting academic freedom. 

“The institution should be like a highway. Anyone should be able to drive on it,” Berman said, referencing the Kalven Report. 

Palumbo-Liu said that his feeling on the Kalven Report is that there is no empirical ground zero from which to measure it. That being said, Palumbo-Liu does believe that the University can be a place that holds a multitude of ideas where people can disagree with each other. “I’ve never felt that to be a huge issue because I don’t mind being disagreed with,” he said.

Berman said that he worried, however, that certain University initiatives may draw similarly politically affiliated professorial candidates. Stanford research supports the claim that university faculty are usually liberal: a study by sociologists Neil Gross and Ethan Fosse’s research points to typecasting as a potential explanation. Universities like Stanford have started to prioritize the study of race, class and gender more, as well as promote equity, diversity and inclusion, Topics that are typically believed to be more important to liberals, according to Gross and Fosse’s research.

Berman said he’s not prepared to advertise his political leaning, but said many people would regard him as conservative. 

“There’s a widespread agreement … that the professoriate in general, is more liberal. I don’t think that’s a controversial claim,” he said.

Palumbo-Liu, however, feels that it’s more nuanced than liberal versus conservative, and that the professoriate falls about middle left. “It means that they are of a kind of liberal persuasion,” Palumbo-Liu said.

But a question still remains: how does the University decide which issues to get involved with, or which issues not to get involved with? 

Lipsick said one of the reasons the administration might not want to get involved in certain political matters is so as not to offend donors. 

“Stanford is a corporation disguised as a university […] The corporation doesn’t want to get sued and wants to raise money,” he said. “Is there any money that can be too dirty for the university to take?”

The University denied such a claim, stating that “alumni donations have no bearing on institutional statements.”

While the University now seems to remain neutral in political matters, according to faculty, the professors are having debates themselves about what should and shouldn’t be allowed to say. 

“We don’t have a problem with it as long as we agree with what’s being said,” Palumbo-Liu said. 

As world events shift, the question of what the university’s role in society is remains unanswered, but if one thing is for certain, it’s that the institutional highway is still open, awaiting inevitable traffic and probably some collisions along the way.

Sun, 28 May 2023 06:47:00 -0500 en-US text/html https://stanforddaily.com/2023/05/28/navigating-the-institutional-highway-faculty-on-approaching-politics-at-stanford/
Palo Alto Networks

About Palo Alto Networks

Palo Alto Networks, Inc. engages in the provision of network security solutions to enterprises, service providers, and government entities. It operates through the following geographical segments: Americas; Europe, the Middle East, and Africa; and Asia Pacific and Japan. The company was founded by Nir Zuk, Rajiv Batra and Yu Ming Mao in March 01, 2005 and is headquartered in Santa Clara, CA.

Related People & Companies

Fri, 02 Jun 2023 09:00:00 -0500 en text/html https://www.forbes.com/companies/palo-alto-networks/
Up 50% in 2023, Is Palo Alto Networks Stock Still a Buy Now?

1 Stock-Split Stock to Buy Hand Over Fist in June and 1 to Avoid Like the Plague

Statistically Speaking, These Are the 2 Worst Ages to Claim Social Security Benefits

U.S. Money Supply Hasn't Done This Since the Great Depression, and It Implies Something Big for Stocks

Surprise! Warren Buffett Has Bet Over $166 Billion on 3 AI Growth Stocks

Tue, 30 May 2023 17:20:00 -0500 Nicholas Rossolillo en text/html https://www.fool.com/investing/2023/05/31/up-50-in-2023-is-palo-alto-networks-stock-still-a/

PCNSA certification | PCNSA course outline | PCNSA Topics | PCNSA Topics | PCNSA basics | PCNSA learner | PCNSA reality | PCNSA teaching | PCNSA certification | PCNSA test plan |

Killexams test Simulator
Killexams Questions and Answers
Killexams Exams List
Search Exams
PCNSA exam dump and training guide direct download
Training Exams List