ExamGecko
Home / Palo Alto Networks / PCNSC / List of questions
Ask Question

Palo Alto Networks PCNSC Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

TAC has requested a PCAP on your Panorama lo see why the DNS app is having intermittent issues resolving FODN What is the appropriate CLI command1*

tcp dump snaplen 53 filter 'tcp 53'
tcp dump snaplen 53 filter 'tcp 53'
tcpdump snaplen 0 filter 'port 53'
tcpdump snaplen 0 filter 'port 53'
tcp dump snap-en 0 filter 'app dns'
tcp dump snap-en 0 filter 'app dns'
tcpdump snaplen 53 filter 'port 53'
tcpdump snaplen 53 filter 'port 53'
Suggested answer: B
Explanation:

To capture a PCAP on your Panorama to troubleshoot DNS resolution issues, the appropriate CLI command is:

B . tcpdump snaplen 0 filter 'port 53'

This command captures packets with no size limit (snaplen 0) and filters the traffic for port 53, which is used by DNS. This is the most straightforward and comprehensive way to capture all DNS traffic for analysis.

Palo Alto Networks - Using tcpdump on PAN-OS: https://knowledgebase.paloaltonetworks.com

Palo Alto Networks - Troubleshooting Network Connectivity Issues: https://docs.paloaltonetworks.com

asked 23/09/2024
Hassene SAADI
44 questions

Question 2

Report Export Collapse

Examine the configured Security policy rule Which day one/Iron Skillet Security Profile Group is used to secure the traffic that is permitted through this rule?

Palo Alto Networks PCNSC image Question 2 54179 09232024001206000000

Inbound
Inbound
Outbound
Outbound
Internal
Internal
Detautl
Detautl
Suggested answer: C
Explanation:

The security policy rule shown in the image is configured to permit traffic from a source zone LAN-User-Zone to a destination zone Server-Zone. The applications allowed include tftp, ssl, and web-browsing, and the action is allow. According to Iron Skillet day one configurations, which provide best practice security profiles for immediate deployment, the relevant security profile group used to secure internal traffic like this is the Internal profile group.

Iron Skillet provides predefined configuration templates including security profile groups like Internal, External, and others to quickly secure traffic according to typical deployment scenarios.

Palo Alto Networks - Iron Skillet Documentation: https://github.com/PaloAltoNetworks/iron-skillet

asked 23/09/2024
Ramesh K
48 questions

Question 3

Report Export Collapse

Which of the following is a primary use case for the Decryption Broker feature?

Managing multiple decryption rules
Managing multiple decryption rules
Sharing decrypted traffic with multiple security appliances
Sharing decrypted traffic with multiple security appliances
Decrypting outbound SSL traffic
Decrypting outbound SSL traffic
Aggregating traffic logs from different sources
Aggregating traffic logs from different sources
Suggested answer: B
asked 23/09/2024
Tarnauceanu Diana
43 questions

Question 4

Report Export Collapse

How can you ensure that a Palo Alto Networks firewall does not block traffic during a software update?

Enable the Suspend Traffic During Upgrade option
Enable the Suspend Traffic During Upgrade option
Schedule the upgrade during a maintenance window
Schedule the upgrade during a maintenance window
Configure session synchronization
Configure session synchronization
Use the High Availability feature
Use the High Availability feature
Suggested answer: B
asked 23/09/2024
Rajiv Ranjan
56 questions

Question 5

Report Export Collapse

Which CLI command is used to verify the high availability state of a Palo Alto Networks firewall?

show high-availability state
show high-availability state
show ha state
show ha state
show ha status
show ha status
show high-availability status
show high-availability status
Suggested answer: C
asked 23/09/2024
Gina Diaz
38 questions

Question 6

Report Export Collapse

In Panorama, what is the correct order of precedence for security policies?

Device group pre-rules, shared pre-rules, local rules, device group post-rules, shared post-rules
Device group pre-rules, shared pre-rules, local rules, device group post-rules, shared post-rules
Shared pre-rules, device group pre-rules, local rules, shared post-rules, device group post-rules
Shared pre-rules, device group pre-rules, local rules, shared post-rules, device group post-rules
Shared pre-rules, device group pre-rules, local rules, device group post-rules, shared post-rules
Shared pre-rules, device group pre-rules, local rules, device group post-rules, shared post-rules
Device group pre-rules, shared pre-rules, local rules, shared post-rules, device group post-rules
Device group pre-rules, shared pre-rules, local rules, shared post-rules, device group post-rules
Suggested answer: C
asked 23/09/2024
miquel martin leiva
46 questions

Question 7

Report Export Collapse

A firewall that was previously connected lo a User-ID agent server now shows disconnected What is the likely cause?

The server has stopped listening on port 2010
The server has stopped listening on port 2010
The Domain Controller service account has been locked out
The Domain Controller service account has been locked out
The agent is not running
The agent is not running
The firewall was upgraded to a PAN-OS version that is not compatible with the agent version
The firewall was upgraded to a PAN-OS version that is not compatible with the agent version
Suggested answer: D
Explanation:

If a firewall that was previously connected to a User-ID agent server now shows disconnected, the likely cause is:

D . The firewall was upgraded to a PAN-OS version that is not compatible with the agent version

When a firewall is upgraded to a new version of PAN-OS, there can be compatibility issues with the existing User-ID agent if it is not updated accordingly. This can result in the firewall being unable to communicate with the User-ID agent, showing it as disconnected.

Palo Alto Networks - User-ID Agent Compatibility: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/user-id/user-id-agent

asked 23/09/2024
Bruno Piovan
31 questions

Question 8

Report Export Collapse

A customer's Palo Alto Networks NGFW currently has only one security policy allowing all traffic They have identified that this is a substantial security risk and have heard that the Expedition tool can help them extract security policies from an 'allow any' rule

What should the consultant say about Expedition?

Expedition cannot parse log files and therefore cannot be used for this purpose
Expedition cannot parse log files and therefore cannot be used for this purpose
By using the Machine Learning feature Expedition can parse the traffic log files related to the polcy and extract security rules for matching traffic
By using the Machine Learning feature Expedition can parse the traffic log files related to the polcy and extract security rules for matching traffic
Live firewall traffic can be viewed on Expedition when connected to a firewall, and Expedition can automatically create and push policies to the firewall
Live firewall traffic can be viewed on Expedition when connected to a firewall, and Expedition can automatically create and push policies to the firewall
The log files can be viewed on Expedition, and right-clicking a log entry gives the option to create security policy from the log entry.
The log files can be viewed on Expedition, and right-clicking a log entry gives the option to create security policy from the log entry.
Suggested answer: B
Explanation:

The Expedition tool can help the customer extract security policies from an 'allow any' rule by using its Machine Learning feature:

B . By using the Machine Learning feature, Expedition can parse the traffic log files related to the policy and extract security rules for matching traffic

Expedition can analyze traffic log files and apply machine learning algorithms to suggest security policies that match the observed traffic patterns. This helps in creating a more secure and granular policy set from a broad 'allow any' rule.

Palo Alto Networks - Expedition Documentation: https://live.paloaltonetworks.com/t5/expedition-migration-tool/ct-p/migration_tool

Palo Alto Networks - Using Machine Learning in Expedition: https://live.paloaltonetworks.com/t5/expedition-articles/expedition-machine-learning-overview/ta-p/260401

asked 23/09/2024
Petros Kapouleas
50 questions

Question 9

Report Export Collapse

In an environment using User-ID, what role does the User-ID agent play?

It assigns IP addresses to users
It assigns IP addresses to users
It maps user identities to IP addresses
It maps user identities to IP addresses
It inspects traffic for malicious content
It inspects traffic for malicious content
It enforces security policies based on IP addresses
It enforces security policies based on IP addresses
Suggested answer: B
asked 23/09/2024
George Morales
54 questions

Question 10

Report Export Collapse

Which two types of security profiles are recommended to protect against known and unknown threats? (Choose two)

Antivirus
Antivirus
URL Filtering
URL Filtering
Anti-Spyware
Anti-Spyware
File Blocking
File Blocking
Suggested answer: A, C
asked 23/09/2024
Alexandra Peralta Reyes
49 questions
Total 60 questions
Go to page: of 6

Related questions