Rally your PCNSE exam studies with updated VCE and PDF resources

Set sail on your academic voyage, powered by the formidable depths of the PCNSE dumps. Attuned to the myriad subtleties of the syllabus, the PCNSE dumps unfurl a vast repository of practice questions, nurturing an indomitable expertise. Whether it\’s the pristine clarity of PDFs or the dynamic narratives of the VCE format that appeals, the PCNSE dumps remain an academic linchpin. An erudite study guide, interwoven with the essence of the PCNSE dumps, distills complex notions, ensuring a lucid understanding. With an indomitable faith in the strength of our offerings, we confidently uphold our 100% Pass Guarantee.

Your success roadmap for 2024: Download the free PCNSE braindumps filled with practice questions

Question 1:

For which two reasons would a firewall discard a packet as part of the packet flow sequence? (Choose two )

A. equal-cost multipath

B. ingress processing errors

C. rule match with action “allow”

D. rule match with action “deny”

Correct Answer: BD

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0 Denying traffic will discard the packet. Packets can also be discarded due to malformed or incorrect frames, datagrams or packets.



Question 2:

A company has a policy that denies all applications it classifies as bad and permits only application it classifies as good. The firewall administrator created the following security policy on the company\’s firewall.

Which two benefits are gained from having both rule 2 and rule 3 presents? (choose two)

A. A report can be created that identifies unclassified traffic on the network.

B. Different security profiles can be applied to traffic matching rules 2 and 3.

C. Rule 2 and 3 apply to traffic on different ports.

D. Separate Log Forwarding profiles can be applied to rules 2 and 3.

Correct Answer: BD



Question 3:

An auditor has requested that roles and responsibilities be split inside the security team. Group A will manage templates, and Group B will manage device groups inside Panorama. Which two specific firewall configurations will Group B manage? (Choose two.)

A. Routing

B. Security rules

C. Interfaces

D. Address objects

Correct Answer: BD



Question 4:

Which function is handled by the management plane (control plane) of a Palo Alto Networks firewall?

A. signature matching for content inspection

B. IPSec tunnel standup

C. Quality of Service

D. logging

Correct Answer: D



Question 5:

During the implementation of SSL Forward Proxy decryption, an administrator imports the company\’s Enterprise Root CA and Intermediate CA certificates onto the firewall. The company\’s Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company\’s Intermediate CA.

Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

A. Generate a single subordinate CA certificate for both Forward Trust and Forward Untrust.

B. Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.

C. Generate a single self-signed CA certificate for Forward Trust and another for Forward Untrust

D. Generate two subordinate CA certificates, one for Forward Trust and one for Forward Untrust.

Correct Answer: B

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os- admin/decryption/configure-ssl-forward-proxy



Question 6:

Which two interface types can be used when configuring GlobalProtect Portal? (Choose two)

A. Virtual Wire

B. Loopback

C. Layer 3

D. Tunnel

Correct Answer: BC



Question 7:

Which three options are supported in HA Lite? (Choose three.)

A. Virtual link

B. Active/passive deployment

C. Synchronization of IPsec security associations

D. Configuration synchronization

E. Session synchronization

Correct Answer: BCD

“The PA-200 firewall supports HA Lite only. HA Lite is an active/passive deployment that provides configuration synchronization and some runtime data synchronization such as IPSec security associations. It does not support any session synchronization (HA2), and therefore does not offer stateful failover.”

Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface- help/device/device-high-availability/ha-lite



Question 8:

Which User-ID method maps IP address to usernames for users connecting through a web proxy that has already authenticated the user?

A. Client Probing

B. Port mapping

C. Server monitoring

D. Syslog listening

Correct Answer: D

To obtain user mappings from existing network services that authenticate users–such as wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC) mechanisms–Configure User-ID to Monitor Syslog Senders for User Mapping.While you can configure either the Windows agent or the PAN-OS integrated User-ID agent on the firewall to listen for authentication syslog messages from the network services, because only the PAN-OS integrated agent supports syslog listening over TLS, it is the preferred configuration. https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/user-id-overview.html https://docs.paloaltonetworks.com/pan-os/8-1/ pan-os-admin/user-id/map-ip-addresses-to- users



Question 9:

Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)

A. inherit address-objects from templates

B. define a common standard template configuration for firewalls

C. standardize server profiles and authentication configuration across all stacks

D. standardize log-forwarding profiles for security polices across all stacks

Correct Answer: BC

Template stacks simplify management because they allow you to define a common base configuration for all devices attached to the template stack and they give you the ability to layer templates to create a combined configuration.



Question 10:

Refer to the exhibit.

An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and HOST B (10.1.1.101) receives SSH traffic.)

Which two security policy rules will accomplish this configuration? (Choose two.)

A. Untrust (Any) to DMZ (10.1.1.100.10.1.1.101), ssh, web-browsing – Allow

B. Untrust (Any) to DMZ (1.1.1.100), web-browsing – Allow

C. Untrust (Any) to Untrust (10.1.1.1), web-browsing – Allow

D. Untrust (Any) to Untrust (10.1.1.1), SSH – Allow

E. Untrust (Any) to DMZ (1.1.1.100), SSH – Allow

Correct Answer: BE

https://docs.paloaltonetworks.com/pan-os/8-0/pan-os- admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-many- mapping#



Question 11:

If an administrator wants to decrypt SMTP traffic and possesses the server\’s certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?

A. TLS Bidirectional Inspection

B. SSL Inbound Inspection

C. SSH Forward Proxy

D. SMTP Inbound Decryption

Correct Answer: B

Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan- os/decryption/configure-ssl-inbound-inspection

1.

SSL Forward Proxy – Inside to Outside (To the the internet)

2.

SSL Inbound Proxy – Outside to Inside (usually towards a hosted webserver in your net)

3.

SSH Forward Proxy – As is states, for SSH traffic. The important one to remember for this type of decryption is that no certs are required.



Question 12:

What is a key step in implementing WildFire best practices?

A. In a mission-critical network, increase the WildFire size limits to the maximum value

B. In a security-first network set the WildFire size limits to the minimum value

C. Configure the firewall to retrieve content updates every minute

D. Ensure that a Threat Prevention subscription is active

Correct Answer: D



Question 13:

An administrator has enabled OSPF on a virtual router on the NGFW. OSPF is not adding new routes to the virtual router. Which two options enable the administrator to troubleshoot this issue? (Choose two.)

A. View Runtime Stats in the virtual router.

B. View System logs.

C. Add a redistribution profile to forward as BGP updates.

D. Perform a traffic pcap at the routing stage.

Correct Answer: AB

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CldcCAC



Question 14:

What are three types of Decryption Policy rules? (Choose three.)

A. SSL Inbound Inspection

B. SSH Proxy

C. SSL Forward Proxy

D. Decryption Broker

E. Decryption Mirror

Correct Answer: ABC

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/define-traffic-to- decrypt/create-a-decryption-policy-rule



Question 15:

What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure an SSL/TLS connection?

A. link state

B. stateful firewall connection

C. certificates

D. profiles

Correct Answer: C

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os- admin/decryption/decryptionoverview.html#:~:text=SSL%20decryption%20(both%20forward%20proxy,secure%20an%2 0SSL%2FTLS%20connection.


Leave a Reply

Your email address will not be published. Required fields are marked *