ExamGecko
Home / Palo Alto Networks / PCNSE / List of questions
Ask Question

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

During the implementation of SSL Forward Proxy decryption, an administrator imports the company's Enterprise Root CA and Intermediate CA certificates onto the firewall. The company's Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company's Intermediate CA.

Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 112

Report Export Collapse

How would an administrator configure a Bidirectional Forwarding Detection profile for BGP after enabling the Advance Routing Engine run on PAN-OS 10.2?

Become a Premium Member for full access
  Unlock Premium Member

Question 113

Report Export Collapse

An administrator has configured a pair of firewalls using high availability in Active/Passive mode.

Path Monitoring has been enabled with a Failure Condition of "any." A path group is configured with Failure Condition of "all" and contains a destination IP of 8.8.8.8 and 4.2.2.2 with a Ping Interval of 500ms and a Ping count of 3.

Which scenario will cause the Active firewall to fail over?

Become a Premium Member for full access
  Unlock Premium Member

Question 114

Report Export Collapse

With the default TCP and UDP settings on the firewall, what will be the identified application in the following session?

Palo Alto Networks PCNSE image Question 114 54351 09232024001219000000

Become a Premium Member for full access
  Unlock Premium Member

Question 115

Report Export Collapse

Which profile generates a packet threat type found in threat logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 116

Report Export Collapse

A client wants to detect the use of weak and manufacturer-default passwords for loT devices. Which option will help the customer?

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

A firewall administrator notices that many Host Sweep scan attacks are being allowed through the firewall sourced from the outside zone. What should the firewall administrator do to mitigate this type of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

An engineer needs to permit XML API access to a firewall for automation on a network segment that is routed through a Layer 3 subinterface on a Palo Alto Networks firewall. However, this network segment cannot access the dedicated management interface due to the Security policy.

Without changing the existing access to the management interface, how can the engineer fulfill this request?

Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

An engineer needs to see how many existing SSL decryption sessions are traversing a firewall What command should be used?

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

Which steps should an engineer take to forward system logs to email?

Become a Premium Member for full access
  Unlock Premium Member
Total 499 questions
Go to page: of 50
Search

Related questions