ExamGecko
Ask Question

PCNSC: Palo Alto Networks Certified Network Security Consultant

Exam Questions:
60
 Learners
  2.370
Last Updated
February - 2025
Language
English
2 Quizzes
PDF | VPLUS
This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Palo Alto Networks PCNSC Practice Tests

Related questions

An existing customer who has deployed several Palo Alto Networks Next-Generation Firewalls would like to start using Device-ID to obtain policy rule recommendations They have also purchased a Support license, a Threat license a URL Filtering license, and a WildFire license for each firewall

What additional license do they need to purchase'?

Become a Premium Member for full access
  Unlock Premium Member

A customer is adding a new site-to-site tunnel from a Palo Alto Networks NGFW to a third party with a policy based VPN peer After the initial configuration is completed and the changes are committed, phase 2 fails to establish

Which two changes may be required to fix the issue? (Choose two)

Verity that the certificate used tor authentication is installed.
Verity that the certificate used tor authentication is installed.
Verify that PFS is enabled on both ends
Verify that PFS is enabled on both ends
Enable the NAT Traversal advanced option.
Enable the NAT Traversal advanced option.
Add proxy IDs to the iPsec tunnel configuration
Add proxy IDs to the iPsec tunnel configuration
Suggested answer: B, D

Explanation:

When configuring a site-to-site VPN between a Palo Alto Networks Next-Generation Firewall (NGFW) and a third-party device with a policy-based VPN peer, Phase 2 failures can often be attributed to configuration mismatches or missing parameters. Here are the two changes that may be required to fix the issue:

B . Verify that PFS is enabled on both ends: Perfect Forward Secrecy (PFS) is a method that ensures the security of cryptographic keys. Both ends of the VPN tunnel need to agree on whether PFS is used. If PFS is enabled on one side but not the other, Phase 2 will fail. Verify the PFS settings and ensure they are matched on both the Palo Alto firewall and the third-party VPN device.

D . Add proxy IDs to the IPsec tunnel configuration: Proxy IDs (or traffic selectors) define the specific local and remote IP ranges that are allowed to communicate through the VPN tunnel. They are particularly crucial when dealing with policy-based VPNs. If the proxy IDs are not correctly configured, Phase 2 negotiations will fail. Add the appropriate proxy IDs to the IPsec tunnel configuration to match the policy-based VPN settings of the third-party device.

Palo Alto Networks - Configuring Site-to-Site VPN Between Palo Alto Networks and a Third-Party Firewall: https://docs.paloaltonetworks.com

Palo Alto Networks - VPN Configuration Guidelines: https://knowledgebase.paloaltonetworks.com

asked 23/09/2024
Kees den Dekker
43 questions

Which of the following WildFire action settings will ensure that a malicious file is quarantined and prevented from spreading?

Become a Premium Member for full access
  Unlock Premium Member

How can you verify that a new security policy is correctly blocking traffic without disrupting the network?

Become a Premium Member for full access
  Unlock Premium Member

A customer's Palo Alto Networks NGFW currently has only one security policy allowing all traffic They have identified that this is a substantial security risk and have heard that the Expedition tool can help them extract security policies from an 'allow any' rule

What should the consultant say about Expedition?

Expedition cannot parse log files and therefore cannot be used for this purpose
Expedition cannot parse log files and therefore cannot be used for this purpose
By using the Machine Learning feature Expedition can parse the traffic log files related to the polcy and extract security rules for matching traffic
By using the Machine Learning feature Expedition can parse the traffic log files related to the polcy and extract security rules for matching traffic
Live firewall traffic can be viewed on Expedition when connected to a firewall, and Expedition can automatically create and push policies to the firewall
Live firewall traffic can be viewed on Expedition when connected to a firewall, and Expedition can automatically create and push policies to the firewall
The log files can be viewed on Expedition, and right-clicking a log entry gives the option to create security policy from the log entry.
The log files can be viewed on Expedition, and right-clicking a log entry gives the option to create security policy from the log entry.
Suggested answer: B

Explanation:

The Expedition tool can help the customer extract security policies from an 'allow any' rule by using its Machine Learning feature:

B . By using the Machine Learning feature, Expedition can parse the traffic log files related to the policy and extract security rules for matching traffic

Expedition can analyze traffic log files and apply machine learning algorithms to suggest security policies that match the observed traffic patterns. This helps in creating a more secure and granular policy set from a broad 'allow any' rule.

Palo Alto Networks - Expedition Documentation: https://live.paloaltonetworks.com/t5/expedition-migration-tool/ct-p/migration_tool

Palo Alto Networks - Using Machine Learning in Expedition: https://live.paloaltonetworks.com/t5/expedition-articles/expedition-machine-learning-overview/ta-p/260401

asked 23/09/2024
Petros Kapouleas
46 questions

What is the maximum number of virtual systems supported by a Palo Alto Networks VM-300 firewall?

Become a Premium Member for full access
  Unlock Premium Member

Which firewall interface type allows you to non-disruptively monitor traffic coming from a port operating in promiscuous mode?

Become a Premium Member for full access
  Unlock Premium Member

Which touting configuration should you recommend lo a customer who wishes lo actively use multiple pathways to the same destination?

Become a Premium Member for full access
  Unlock Premium Member

In an HA (High Availability) setup, what is the purpose of the HA3 link?

Synchronize session state information
Synchronize session state information
Synchronize configuration changes
Synchronize configuration changes
Exchange heartbeats between the devices
Exchange heartbeats between the devices
Transmit HA control traffic
Transmit HA control traffic
Suggested answer: A
asked 23/09/2024
Mita Balija
41 questions

Which of the following is NOT a benefit of using App-ID?

Identifies applications running on non-standard ports
Identifies applications running on non-standard ports
Blocks application traffic that uses dynamic ports
Blocks application traffic that uses dynamic ports
Reduces the attack surface by allowing only required applications
Reduces the attack surface by allowing only required applications
Ensures consistent bandwidth allocation for all applications
Ensures consistent bandwidth allocation for all applications
Suggested answer: D
asked 23/09/2024
ERIK BURDETT
42 questions