ExamGecko

PCNSE: Palo Alto Networks Certified Network Security Engineer

Palo Alto Networks Certified Network Security Engineer Exam Questions: 470
Palo Alto Networks Certified Network Security Engineer   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS
This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Before an administrator of a VM-500 can enable DoS and zone protection, what actions need to be taken?

A.
Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection
A.
Measure and monitor the CPU consumption of the firewall data plane to ensure that each firewall is properly sized to support DoS and zone protection
Answers
B.
Create a zone protection profile with flood protection configured to defend an entire egress zone against SYN. ICMP ICMPv6, UDP. and other IP flood attacks
B.
Create a zone protection profile with flood protection configured to defend an entire egress zone against SYN. ICMP ICMPv6, UDP. and other IP flood attacks
Answers
C.
Add a WildFire subscription to activate DoS and zone protection features
C.
Add a WildFire subscription to activate DoS and zone protection features
Answers
D.
Replace the hardware firewall because DoS and zone protection are not available with VM-Series systems
D.
Replace the hardware firewall because DoS and zone protection are not available with VM-Series systems
Answers
Suggested answer: A

Explanation:

1 - https://docs.paloaltonetworks.com/best-practices/8-1/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices/deploy-dos-and-zone-protection-using-bestpractices.html#:~:text=DoS%20and%20Zone%20Protection%20help,device%20at%20the%20internet%20perimeter.

2 - https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/zone-protection-and-dosprotection/zone-defense/take-baseline-cps-measurements-for-setting-flood-thresholds/how-to-measure-cps.html

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/zone-protection-and-dosprotection.html

asked 23/09/2024
Federico Miliacca
33 questions

Phase two of a VPN will not establish a connection. The peer is using a policy-based VPN configuration. What part of the configuration should the engineer verify'?

A.
PAN-OS versions
A.
PAN-OS versions
Answers
B.
Proxy-IDs
B.
Proxy-IDs
Answers
C.
IKE Crypto Profile
C.
IKE Crypto Profile
Answers
D.
Security policy
D.
Security policy
Answers
Suggested answer: B

Explanation:

Proxy-ID is a parameter that identifies the traffic that needs to be encrypted and tunneled in an IPSec VPN. Proxy-ID consists of the local and remote IP addresses, protocols, and ports. Proxy-ID is used when the peer is using a policy-based VPN configuration, which allows specifying the Proxy-ID settings manually. If the Proxy-ID settings do not match on both peers, the phase two of the VPN will not establish a connection. Therefore, the correct answer is B.

The other options are not parts of the configuration that the engineer should verify for phase two of a VPN:

PAN-OS versions: This option is not relevant for phase two of a VPN. PAN-OS versions are the software versions that run on Palo Alto Networks firewalls. They do not affect the VPN connection establishment, as long as they support the same VPN features and protocols2.

IKE Crypto Profile: This option is not relevant for phase two of a VPN. IKE Crypto Profile is a parameter that defines the encryption and authentication algorithms for IKE negotiation. IKE negotiation is part of phase one of the VPN, not phase two3.

Security policy: This option is not relevant for phase two of a VPN. Security policy is a rule that allows or denies traffic based on various criteria, such as source, destination, application, user, and service. Security policy does not affect the VPN connection establishment, but only the traffic that passes through the VPN tunnel4.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpn/site-to-sitevpn/set-up-a-site-to-site-vpn-between-two-firewalls/policy-based-vpn 2:

https://docs.paloaltonetworks.com/pan-os.html 3:

https://docs.paloaltonetworks.com/pan-os/91/pan-os-admin/vpn/site-to-site-vpn-concepts/internet-key-exchange-ike-for-vpn/methods-ofsecuring-ipsec-vpn-tunnels-ike-phase-2 4:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/policy/security-policy.html

asked 23/09/2024
Wissem M'RAD
37 questions

During the process of developing a decryption strategy and evaluating which websites are required for corporate users to access, several sites have been identified that cannot be decrypted due to technical reasons. In this case, the technical reason is unsupported ciphers. Traffic to these sites will therefore be blocked if decrypted How should the engineer proceed?

A.
Allow the firewall to block the sites to improve the security posture
A.
Allow the firewall to block the sites to improve the security posture
Answers
B.
Add the sites to the SSL Decryption Exclusion list to exempt them from decryption
B.
Add the sites to the SSL Decryption Exclusion list to exempt them from decryption
Answers
C.
Install the unsupported cipher into the firewall to allow the sites to be decrypted
C.
Install the unsupported cipher into the firewall to allow the sites to be decrypted
Answers
D.
Create a Security policy to allow access to those sites
D.
Create a Security policy to allow access to those sites
Answers
Suggested answer: B

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/decryption-exclusions Traffic that breaks decryption for technical reasons, such as using a pinned certificate, an incomplete certificate chain, unsupported ciphers, or mutual authentication (attempting to decrypt the traffic results in blocking the traffic). Palo Alto Networks provides a predefined SSL Decryption Exclusion list (DeviceCertificate ManagementSSL Decryption Exclusion) that excludes hosts with applications and services that are known to break decryption technically from SSL Decryption by default. If you encounter sites that break decryption technically and are not on the SSL Decryption Exclusion list, you can add them to list manually by server hostname. The firewall blocks sites whose applications and services break decryption technically unless you add them to the SSL Decryption Exclusion list.

asked 23/09/2024
Gerhard Seher
28 questions

If a URL is in multiple custom URL categories with different actions, which action will take priority?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

What is a correct statement regarding administrative authentication using external services with a local authorization method?

A.
Prior to PAN-OS 10.2. an administrator used the firewall to manage role assignments, but access domains have not been supported by this method.
A.
Prior to PAN-OS 10.2. an administrator used the firewall to manage role assignments, but access domains have not been supported by this method.
Answers
B.
Starting with PAN-OS 10.2. an administrator needs to configure Cloud Identity Engine to use external authentication services for administrative authentication.
B.
Starting with PAN-OS 10.2. an administrator needs to configure Cloud Identity Engine to use external authentication services for administrative authentication.
Answers
C.
The administrative accounts you define locally on the firewall serve as references to the accounts defined on an external authentication server.
C.
The administrative accounts you define locally on the firewall serve as references to the accounts defined on an external authentication server.
Answers
D.
The administrative accounts you define on an external authentication server serve as references to the accounts defined locally on the firewall.
D.
The administrative accounts you define on an external authentication server serve as references to the accounts defined locally on the firewall.
Answers
Suggested answer: C

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/firewall-administration/manage- firewall-administrators/administrative-authentication

asked 23/09/2024
shridhar deshpande
40 questions

You are auditing the work of a co-worker and need to verify that they have matched the Palo Alto Networks Best Practices for Anti-Spyware Profiles.

For which three severity levels should single-packet captures be enabled to meet the Best Practice standard? (Choose three.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

An administrator configures a site-to-site IPsec VPN tunnel between a PA-850 and an external customer on their policy-based VPN devices.

What should an administrator configure to route interesting traffic through the VPN tunnel?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A company requires that a specific set of ciphers be used when remotely managing their Palo Alto Networks appliances. Which profile should be configured in order to achieve this?

A.
SSH Service profile
A.
SSH Service profile
Answers
B.
SSL/TLS Service profile
B.
SSL/TLS Service profile
Answers
C.
Decryption profile
C.
Decryption profile
Answers
D.
Certificate profile
D.
Certificate profile
Answers
Suggested answer: A

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configure- an-ssh-service-profile

asked 23/09/2024
javier mungaray
34 questions

When you navigate to Network: > GlobalProtect > Portals > Method section, which three options are available? (Choose three )

A.
user-logon (always on)
A.
user-logon (always on)
Answers
B.
pre-logon then on-demand
B.
pre-logon then on-demand
Answers
C.
on-demand (manual user initiated connection)
C.
on-demand (manual user initiated connection)
Answers
D.
post-logon (always on)
D.
post-logon (always on)
Answers
E.
certificate-logon
E.
certificate-logon
Answers
Suggested answer: A, B, C

Explanation:

The Method section of the GlobalProtect portal configuration allows you to specify how users connect to the portal. The options are: user-logon (always on): The agent connects to the portal as soon as the user logs in to the endpoint. pre-logon then on-demand: The agent connects to the portal before the user logs in to the endpoint and then switches to on-demand mode after the user logs in. on-demand (manual user initiated connection): The agent connects to the portal only when the user initiates the connection manually. Reference: https://docs.paloaltonetworks.com/pan-os/10-1/pan- os-admin/globalprotect/configure-the-globalprotect-portal/configure-the-agent/configure-the-app- tab.html

asked 23/09/2024
Jeremiah Gem Galeon
43 questions

When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member