ExamGecko
Home / Palo Alto Networks / PCNSE / List of questions
Ask Question

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

A network security administrator wants to begin inspecting bulk user HTTPS traffic flows egressingout of the internet edge firewall. Which certificate is the best choice to configure as an SSL ForwardTrust certificate?

Become a Premium Member for full access
  Unlock Premium Member

Question 182

Report Export Collapse

During a laptop-replacement project, remote users must be able to establish a GlobalProtect VPN connection to the corporate network before logging in to their new Windows 10 endpoints.

The new laptops have the 5.2.10 GlobalProtect Agent installed, so the administrator chooses to use the Connect Before Logon feature to solve this issue.

What must be configured to enable the Connect Before Logon feature?

Become a Premium Member for full access
  Unlock Premium Member

Question 183

Report Export Collapse

The decision to upgrade to PAN-OS 10.2 has been approved. The engineer begins the process by upgrading the Panorama servers, but gets an error when trying to install.

When performing an upgrade on Panorama to PAN-OS 10.2, what is the potential cause of a failed install?

Become a Premium Member for full access
  Unlock Premium Member

Question 184

Report Export Collapse

An engineer needs to collect User-ID mappings from the company's existing proxies.

What two methods can be used to pull this data from third party proxies? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 185

Report Export Collapse

Refer to the exhibit.

Palo Alto Networks PCNSE image Question 185 54422 09232024001220000000

Using the above screenshot of the ACC, what is the best method to set a global filter, narrow down Blocked User Activity, and locate the user(s) that could be compromised by a botnet?

Become a Premium Member for full access
  Unlock Premium Member

Question 186

Report Export Collapse

An administrator creates an application-based security policy rule and commits the change to the firewall. Which two methods should be used to identify the dependent applications for the respective rule? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 187

Report Export Collapse

What happens when an A/P firewall cluster synchronizes IPsec tunnel security associations (SAs)?

Become a Premium Member for full access
  Unlock Premium Member

Question 188

Report Export Collapse

An engineer is designing a deployment of multi-vsys firewalls.

What must be taken into consideration when designing the device group structure?

Become a Premium Member for full access
  Unlock Premium Member

Question 189

Report Export Collapse

An administrator creates a custom application containing Layer 7 signatures. The latest application and threat dynamic update is downloaded to the same firewall. The update contains an application that matches the same traffic signatures as the custom application.

Which application will be used to identify traffic traversing the firewall?

Become a Premium Member for full access
  Unlock Premium Member

Question 190

Report Export Collapse

What happens, by default, when the GlobalProtect app fails to establish an IPSec tunnel to the GlobalProtect gateway?

Become a Premium Member for full access
  Unlock Premium Member
Total 499 questions
Go to page: of 50
Search

Related questions