ExamGecko
Home / Palo Alto Networks / PCNSE / List of questions
Ask Question

Palo Alto Networks PCNSE Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

DRAG DROP

Match each type of DoS attack to an example of that type of attack.


Palo Alto Networks PCNSE image Question 1 54238 09232024121219000
Correct answer: Palo Alto Networks PCNSE image answer Question 1 54238 09232024121219000
Explanation:

Reference: https://www.hackingarticles.in/dos-penetration-testing-part-1/#:~:text=Protocol%2DBased%20Attack%3A%20This%20kind,unresponsive%20to%20other%20legitimate%20requests

asked 23/09/2024
Sheng-Feng Zhang
36 questions

Question 2

Report Export Collapse

DRAG DROP

Below are the steps in the workflow for creating a Best Practice Assessment in a firewall and Panorama configuration. Place the steps in order.


Palo Alto Networks PCNSE image Question 2 54239 09232024121219000
Correct answer: Palo Alto Networks PCNSE image answer Question 2 54239 09232024121219000
Explanation:

Step 1. In either the NGFW or in Panorama, on the Operations/Support tab, download the technical support file.

Step 2. Log in to the Customer Support Portal (CSP) and navigate to Tools > Best Practice Assessment.

Step 3. Upload or drag and drop the technical support file.

Step 4. Map the zone type and area of the architecture to each zone.

Step 5.Follow the steps to download the BPA report bundle.

Reference:

https://www.paloaltonetworks.com/resources/videos/how-to-run-a-bpa

asked 23/09/2024
Katherine Messick
37 questions

Question 3

Report Export Collapse

When using certificate authentication for firewall administration, which method is used for authorization?

Radius
Radius
LDAP
LDAP
Kerberos
Kerberos
Local
Local
Suggested answer: D
Explanation:

Authentication: Certificates Authorization: Local The administrative accounts are local to the firewall, but authentication to the web interface is based on client certificates. You use the firewall to manage role assignments but access domains are not supported.

asked 23/09/2024
Son Pham Hong
44 questions

Question 4

Report Export Collapse

A network administrator wants to use a certificate for the SSL/TLS Service Profile.

Which type of certificate should the administrator use?

certificate authority (CA) certificate
certificate authority (CA) certificate
client certificate
client certificate
machine certificate
machine certificate
server certificate
server certificate
Suggested answer: D
Explanation:

Use only signed certificates, not CA certificates, in SSL/TLS service profiles.

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configurean-ssltls-service-profile.html

A server certificate is used for the SSL/TLS Service Profile. The server certificate identifies the firewall to clients that initiate SSL/TLS connections to it. Reference: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/certificates-and-keys/server-certificates

asked 23/09/2024
Balvant Variya
37 questions

Question 5

Report Export Collapse

Using multiple templates in a stack to manage many firewalls provides which two advantages?

(Choose two.)

inherit address-objects from templates
inherit address-objects from templates
define a common standard template configuration for firewalls
define a common standard template configuration for firewalls
standardize server profiles and authentication configuration across all stacks
standardize server profiles and authentication configuration across all stacks
standardize log-forwarding profiles for security polices across all stacks
standardize log-forwarding profiles for security polices across all stacks
Suggested answer: B, C
Explanation:

Using multiple templates in a stack to manage many firewalls provides the advantages of defining a common standard template configuration for firewalls and standardizing server profiles and authentication configuration across all stacks.

A template stack is a container for multiple templates that you can assign to firewalls and firewall groups. The templates in a stack are prioritized so that the settings in a higher-priority template override the same settings in a lower-priority template.This allows you to create a hierarchy of templates that define common settings for all firewalls and specific settings for different groups of firewalls. Reference:https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/ manage-firewalls/manage- templates-and-template-stacks

asked 23/09/2024
Marc Casin Martinez
41 questions

Question 6

Report Export Collapse

A network security engineer is attempting to peer a virtual router on a PAN-OS firewall with an external router using the BGP protocol. The peer relationship is not establishing.

What command could the engineer run to see the current state of the BGP state between the two devices?

show routing protocol bgp state
show routing protocol bgp state
show routing protocol bgp peer
show routing protocol bgp peer
show routing protocol bgp summary
show routing protocol bgp summary
show routing protocol bgp rib-out
show routing protocol bgp rib-out
Suggested answer: C
Explanation:

The show routing protocol bgp summary command displays the current state of the BGP peer relationship between the firewall and other BGP routers. The output includes the peer IP address, AS number, uptime, prefix count, state, and status codes. Reference:https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-cli-quick-start/use-the-cli/show-the- routing-table-and-statistics

asked 23/09/2024
Harry Vervelde
40 questions

Question 7

Report Export Collapse

A network security engineer must implement Quality of Service policies to ensure specific levels of delivery guarantees for various applications in the environment They want to ensure that they know as much as they can about QoS before deploying.

Which statement about the QoS feature is correct?

QoS is only supported on firewalls that have a single virtual system configured
QoS is only supported on firewalls that have a single virtual system configured
QoS can be used in conjunction with SSL decryption
QoS can be used in conjunction with SSL decryption
QoS is only supported on hardware firewalls
QoS is only supported on hardware firewalls
QoS can be used on firewalls with multiple virtual systems configured
QoS can be used on firewalls with multiple virtual systems configured
Suggested answer: D
Explanation:

The correct answer is D - QoS can be used on firewalls with multiple virtual systems configured. QoS is a feature that enables network administrators to prioritize and manage network traffic to ensure that critical applications receive the necessary bandwidth and quality of service. This feature can be used on firewalls with multiple virtual systems, allowing administrators to configure policies on a per-Virtual System basis. Additionally, QoS can be used in conjunction with SSL decryption to ensure that applications running over SSL receive appropriate treatment.

asked 23/09/2024
Hector Quintero
47 questions

Question 8

Report Export Collapse

Which statement regarding HA timer settings is true?

Use the Recommended profile for typical failover timer settings
Use the Recommended profile for typical failover timer settings
Use the Moderate profile for typical failover timer settings
Use the Moderate profile for typical failover timer settings
Use the Aggressive profile for slower failover timer settings.
Use the Aggressive profile for slower failover timer settings.
Use the Critical profile for faster failover timer settings.
Use the Critical profile for faster failover timer settings.
Suggested answer: A
Explanation:

The Recommended profile is the default profile that provides typical failover timer settings for most deployments. The other profiles are designed for specific scenarios where faster or slower failover isdesired. Reference: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/high- availability/ha-concepts/ha-timers

asked 23/09/2024
Luis Hernaiz
40 questions

Question 9

Report Export Collapse

When you navigate to Network: > GlobalProtect > Portals > Method section, which three options are available? (Choose three )

user-logon (always on)
user-logon (always on)
pre-logon then on-demand
pre-logon then on-demand
on-demand (manual user initiated connection)
on-demand (manual user initiated connection)
post-logon (always on)
post-logon (always on)
certificate-logon
certificate-logon
Suggested answer: A, B, C
Explanation:

The Method section of the GlobalProtect portal configuration allows you to specify how users connect to the portal. The options are: user-logon (always on): The agent connects to the portal as soon as the user logs in to the endpoint. pre-logon then on-demand: The agent connects to the portal before the user logs in to the endpoint and then switches to on-demand mode after the user logs in. on-demand (manual user initiated connection): The agent connects to the portal only when the user initiates the connection manually. Reference: https://docs.paloaltonetworks.com/pan-os/10-1/pan- os-admin/globalprotect/configure-the-globalprotect-portal/configure-the-agent/configure-the-app- tab.html

asked 23/09/2024
Jeremiah Gem Galeon
43 questions

Question 10

Report Export Collapse

An engineer must configure the Decryption Broker feature

Which Decryption Broker security chain supports bi-directional traffic flow?

Layer 2 security chain
Layer 2 security chain
Layer 3 security chain
Layer 3 security chain
Transparent Bridge security chain
Transparent Bridge security chain
Transparent Proxy security chain
Transparent Proxy security chain
Suggested answer: B
Explanation:

Together, the primary and secondary interfaces form a pair of decryption forwarding interfaces. Only interfaces that you have enabled to be Decrypt Forward interfaces are displayed here. Your security chain type (Layer 3 or Transparent Bridge) and the traffic flow direction (unidirectional or bidirectional) determine which of the two interfaces forwards allowed, clear text traffic to the security chain, and which interface receives the traffic back from the security chain after it has undergone additional enforcement.

asked 23/09/2024
SERGIO MELOSEVICH
45 questions
Total 470 questions
Go to page: of 47

Related questions