ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











A network engineer is troubleshooting a VPN and wants to verify whether the decapsulation/encapsulation counters are increasing. Which CLI command should the engineer run?

A.
Show vpn tunnel name | match encap
A.
Show vpn tunnel name | match encap
Answers
B.
Show vpn flow name <tunnel name>
B.
Show vpn flow name <tunnel name>
Answers
C.
Show running tunnel flow lookup
C.
Show running tunnel flow lookup
Answers
D.
Show vpn ipsec-sa tunnel <tunnel name>
D.
Show vpn ipsec-sa tunnel <tunnel name>
Answers
Suggested answer: B

Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC

A network administrator is troubleshooting an issue with Phase 2 of an IPSec VPN tunnel. The administrator determines that the lifetime needs to be changed to match the peer.

Where should this change be made?

A.
IKE Gateway profile
A.
IKE Gateway profile
Answers
B.
IPSec Crypto profile
B.
IPSec Crypto profile
Answers
C.
IPSec Tunnel settings
C.
IPSec Tunnel settings
Answers
D.
IKE Crypto profile
D.
IKE Crypto profile
Answers
Suggested answer: B

Explanation:

The **IKE crypto profile** is used to set up the encryption and authentication algorithms used for the key exchange process in IKE Phase 1, and lifetime of the keys, which specifies how long the keys are valid. To invoke the profile, you must attach it to the IKE Gateway configuration. The **IPSec crypto profile** is invoked in IKE Phase 2. It specifies how the data is secured within the tunnel when Auto Key IKE is used to automatically generate keys for the IKE SAs.

How does Panorama prompt VMWare NSX to quarantine an infected VM?

A.
Email Server Profile
A.
Email Server Profile
Answers
B.
Syslog Sewer Profile
B.
Syslog Sewer Profile
Answers
C.
SNMP Server Profile
C.
SNMP Server Profile
Answers
D.
HTTP Server Profile
D.
HTTP Server Profile
Answers
Suggested answer: D

Explanation:

https://docs.paloaltonetworks.com/vm-series/10-0/vm-series-deployment/set-up-the-vm-series- firewall-on-nsx/set-up-the-vm-series-firewall-on-vmware-nsx/dynamically-quarantine-infected- guests.html#id8e9a242e-e038-4ba2-b0ea-eaaf53690be0

Given the screenshot, how did the firewall handle the traffic?

A.
Traffic was allowed by policy but denied by profile as encrypted.
A.
Traffic was allowed by policy but denied by profile as encrypted.
Answers
B.
Traffic was allowed by policy but denied by profile as a threat
B.
Traffic was allowed by policy but denied by profile as a threat
Answers
C.
Traffic was allowed by profile but denied by policy as a threat.
C.
Traffic was allowed by profile but denied by policy as a threat.
Answers
D.
Traffic was allowed by policy but denied by profile as a nonstandard port.
D.
Traffic was allowed by policy but denied by profile as a nonstandard port.
Answers
Suggested answer: B

Explanation:

The screenshot shows the threat log which records the traffic that matches a threat signature or is blocked by a security profile. The log entry indicates that the traffic was allowed by the security policy rule "Allow-All" but was denied by the vulnerability protection profile "strict" as a threat. The threat name is "Microsoft Windows SMBv1 Multiple Vulnerabilities (MS17-010: EternalBlue)" and the action is "reset-both" which means that the firewall reset both the client and server connections.Reference: : https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/monitoring/use-syslog- for-monitoring/syslog-field-descriptions/threat-log-fields

A user at an external system with the IP address 65.124.57.5 queries the DNS server at 4. 2.2.2 for the IP address of the web server, www,xyz.com. The DNS server returns an address of 172.16.15.1

In order to reach Ire web server, which Security rule and NAT rule must be configured on the firewall?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: C

Explanation:

The addresses used in destination NAT rules always refer to the original IP address in the packet (that is, the pre-translated address). The destination zone in the NAT rule is determined after the route lookup of the destination IP address in the original packet (that is, the pre-NAT destination IP address). The addresses in the security policy also refer to the IP address in the original packet (that is, the pre-NAT address). However, the destination zone is the zone where the end host is physically connected. In other words, the destination zone in the security rule is determined after the routelookup of the post-NAT destination IP address. https://docs.paloaltonetworks.com/pan-os/9-1/pan- os-admin/networking/nat/ nat-configuration-examples/destination-nat-exampleone-to-one-mapping

An administrator is receiving complaints about application performance degradation. After checking the ACC. the administrator observes that there Is an excessive amount of SSL traffic

Which three elements should the administrator configure to address this issue? (Choose three.)

A.
QoS on the ingress Interface for the traffic flows
A.
QoS on the ingress Interface for the traffic flows
Answers
B.
An Application Override policy for the SSL traffic
B.
An Application Override policy for the SSL traffic
Answers
C.
A QoS policy for each application ID
C.
A QoS policy for each application ID
Answers
D.
A QoS profile defining traffic classes
D.
A QoS profile defining traffic classes
Answers
E.
QoS on the egress interface for the traffic flows
E.
QoS on the egress interface for the traffic flows
Answers
Suggested answer: A, D, E

Explanation:

To address the issue of excessive SSL traffic, the administrator should configure QoS on both the ingress and egress interfaces for the traffic flows. This will allow the administrator to control the bandwidth allocation and priority of different applications based on their QoS classes. The administrator should also define a QoS profile that specifies the traffic classes and their guaranteed bandwidth percentages. The QoS profile can then be applied to a QoS policy rule that matches the SSL traffic based on source and destination zones or other criteria. Reference: :https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/quality-of-service/configure-qos

A company has configured a URL Filtering profile with override action on their firewall. Which two profiles are needed to complete the configuration? (Choose two)

A.
SSL/TLS Service
A.
SSL/TLS Service
Answers
B.
HTTP Server
B.
HTTP Server
Answers
C.
Decryption
C.
Decryption
Answers
D.
Interface Management
D.
Interface Management
Answers
Suggested answer: A, D

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/allow-password-access- to-certain-sites#id7e63ce07-8b30-4506-a1e3-5800303954e

An administrator accidentally closed the commit window/screen before the commit was finished.

Which two options could the administrator use to verify the progress or success of that commit task?

(Choose two.)

A.
System Logs
A.
System Logs
Answers
B.
Task Manager
B.
Task Manager
Answers
C.
Traffic Logs
C.
Traffic Logs
Answers
D.
Configuration Logs
D.
Configuration Logs
Answers
Suggested answer: A, B

Explanation:

A. System Logs: The system logs contain information about various events that occur on the firewall, including the commit process. The administrator can review the system logs to verify whether the commit completed successfully or whether there were any errors or warnings during the commit process.

B. Task Manager: The task manager displays a list of all active tasks on the firewall, including the commit task. The administrator can use the task manager to check the status of the commit task, including whether it is in progress, completed successfully, or failed.

The same route appears in the routing table three times using three different protocols Which mechanism determines how the firewall chooses which route to use?

A.
Administrative distance
A.
Administrative distance
Answers
B.
Round Robin load balancing
B.
Round Robin load balancing
Answers
C.
Order in the routing table
C.
Order in the routing table
Answers
D.
Metric
D.
Metric
Answers
Suggested answer: A

Explanation:

Administrative distance is the measure of trustworthiness of a routing protocol. It is used to determine the best path when multiple routes to the same destination exist. The route with the lowest administrative distance is chosen as the best route.

When the same route appears in the routing table three times using three different protocols, the mechanism that determines which route the firewall chooses to use is the administrative distance.

This is explained in the Palo Alto Networks PCNSE Study Guide in Chapter 6: Routing, under the section "Route Selection":

"Administrative distance is a value assigned to each protocol that the firewall uses to determine which route to use if multiple protocols provide routes to the same destination. The route with the lowest administrative distance is preferred."

An administrator is configuring SSL decryption and needs 10 ensure that all certificates for both SSL Inbound inspection and SSL Forward Proxy are installed properly on the firewall. When certificates are being imported to the firewall for these purposes, which three certificates require a private key?

(Choose three.)

A.
Forward Untrust certificate
A.
Forward Untrust certificate
Answers
B.
Forward Trust certificate
B.
Forward Trust certificate
Answers
C.
Enterprise Root CA certificate
C.
Enterprise Root CA certificate
Answers
D.
End-entity (leaf) certificate
D.
End-entity (leaf) certificate
Answers
E.
Intermediate certificate(s)
E.
Intermediate certificate(s)
Answers
Suggested answer: A, B, D

Explanation:

This is discussed in the Palo Alto Networks PCNSE Study Guide in Chapter 9: Decryption, under the section "SSL Forward Proxy and Inbound Inspection Certificates":

"When importing SSL decryption certificates, you need to provide private keys for the forward trust, forward untrust, and end-entity (leaf) certificates. You do not need to provide private keys for the root CA and intermediate certificates."

Total 426 questions
Go to page: of 43