ExamGecko
Home / Palo Alto Networks / PCNSE / List of questions
Ask Question

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 21

List of questions

Question 201

Report Export Collapse

A network engineer is troubleshooting a VPN and wants to verify whether the decapsulation/encapsulation counters are increasing. Which CLI command should the engineer run?

Show vpn tunnel name | match encap
Show vpn tunnel name | match encap
Show vpn flow name <tunnel name>
Show vpn flow name <tunnel name>
Show running tunnel flow lookup
Show running tunnel flow lookup
Show vpn ipsec-sa tunnel <tunnel name>
Show vpn ipsec-sa tunnel <tunnel name>
Suggested answer: B
Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC

asked 23/09/2024
soufiane chafik
45 questions

Question 202

Report Export Collapse

A network administrator is troubleshooting an issue with Phase 2 of an IPSec VPN tunnel. The administrator determines that the lifetime needs to be changed to match the peer.

Where should this change be made?

IKE Gateway profile
IKE Gateway profile
IPSec Crypto profile
IPSec Crypto profile
IPSec Tunnel settings
IPSec Tunnel settings
IKE Crypto profile
IKE Crypto profile
Suggested answer: B
Explanation:

The **IKE crypto profile** is used to set up the encryption and authentication algorithms used for the key exchange process in IKE Phase 1, and lifetime of the keys, which specifies how long the keys are valid. To invoke the profile, you must attach it to the IKE Gateway configuration. The **IPSec crypto profile** is invoked in IKE Phase 2. It specifies how the data is secured within the tunnel when Auto Key IKE is used to automatically generate keys for the IKE SAs.

asked 23/09/2024
Musoke Kamuzze
33 questions

Question 203

Report Export Collapse

How does Panorama prompt VMWare NSX to quarantine an infected VM?

Email Server Profile
Email Server Profile
Syslog Sewer Profile
Syslog Sewer Profile
SNMP Server Profile
SNMP Server Profile
HTTP Server Profile
HTTP Server Profile
Suggested answer: D
Explanation:

https://docs.paloaltonetworks.com/vm-series/10-0/vm-series-deployment/set-up-the-vm-series- firewall-on-nsx/set-up-the-vm-series-firewall-on-vmware-nsx/dynamically-quarantine-infected- guests.html#id8e9a242e-e038-4ba2-b0ea-eaaf53690be0

asked 23/09/2024
Patrick Evelinton de Souza Borges
40 questions

Question 204

Report Export Collapse

Given the screenshot, how did the firewall handle the traffic?

Palo Alto Networks PCNSE image Question 204 54441 09232024001220000000

Traffic was allowed by policy but denied by profile as encrypted.
Traffic was allowed by policy but denied by profile as encrypted.
Traffic was allowed by policy but denied by profile as a threat
Traffic was allowed by policy but denied by profile as a threat
Traffic was allowed by profile but denied by policy as a threat.
Traffic was allowed by profile but denied by policy as a threat.
Traffic was allowed by policy but denied by profile as a nonstandard port.
Traffic was allowed by policy but denied by profile as a nonstandard port.
Suggested answer: B
Explanation:

The screenshot shows the threat log which records the traffic that matches a threat signature or is blocked by a security profile. The log entry indicates that the traffic was allowed by the security policy rule "Allow-All" but was denied by the vulnerability protection profile "strict" as a threat. The threat name is "Microsoft Windows SMBv1 Multiple Vulnerabilities (MS17-010: EternalBlue)" and the action is "reset-both" which means that the firewall reset both the client and server connections.Reference: : https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/monitoring/use-syslog- for-monitoring/syslog-field-descriptions/threat-log-fields

asked 23/09/2024
gareth warner
24 questions

Question 205

Report Export Collapse

A user at an external system with the IP address 65.124.57.5 queries the DNS server at 4. 2.2.2 for the IP address of the web server, www,xyz.com. The DNS server returns an address of 172.16.15.1

In order to reach Ire web server, which Security rule and NAT rule must be configured on the firewall?

Palo Alto Networks PCNSE image Question 205 54442 09232024001220000000

Suggested answer: C
Explanation:

The addresses used in destination NAT rules always refer to the original IP address in the packet (that is, the pre-translated address). The destination zone in the NAT rule is determined after the route lookup of the destination IP address in the original packet (that is, the pre-NAT destination IP address). The addresses in the security policy also refer to the IP address in the original packet (that is, the pre-NAT address). However, the destination zone is the zone where the end host is physically connected. In other words, the destination zone in the security rule is determined after the routelookup of the post-NAT destination IP address. https://docs.paloaltonetworks.com/pan-os/9-1/pan- os-admin/networking/nat/ nat-configuration-examples/destination-nat-exampleone-to-one-mapping

asked 23/09/2024
Arndt Langer
46 questions

Question 206

Report Export Collapse

An administrator is receiving complaints about application performance degradation. After checking the ACC. the administrator observes that there Is an excessive amount of SSL traffic

Which three elements should the administrator configure to address this issue? (Choose three.)

QoS on the ingress Interface for the traffic flows
QoS on the ingress Interface for the traffic flows
An Application Override policy for the SSL traffic
An Application Override policy for the SSL traffic
A QoS policy for each application ID
A QoS policy for each application ID
A QoS profile defining traffic classes
A QoS profile defining traffic classes
QoS on the egress interface for the traffic flows
QoS on the egress interface for the traffic flows
Suggested answer: A, D, E
Explanation:

To address the issue of excessive SSL traffic, the administrator should configure QoS on both the ingress and egress interfaces for the traffic flows. This will allow the administrator to control the bandwidth allocation and priority of different applications based on their QoS classes. The administrator should also define a QoS profile that specifies the traffic classes and their guaranteed bandwidth percentages. The QoS profile can then be applied to a QoS policy rule that matches the SSL traffic based on source and destination zones or other criteria. Reference: :https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/quality-of-service/configure-qos

asked 23/09/2024
Kameron Katoku
50 questions

Question 207

Report Export Collapse

A company has configured a URL Filtering profile with override action on their firewall. Which two profiles are needed to complete the configuration? (Choose two)

SSL/TLS Service
SSL/TLS Service
HTTP Server
HTTP Server
Decryption
Decryption
Interface Management
Interface Management
Suggested answer: A, D
Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/allow-password-access- to-certain-sites#id7e63ce07-8b30-4506-a1e3-5800303954e

asked 23/09/2024
Olusola Adebayo
46 questions

Question 208

Report Export Collapse

An administrator accidentally closed the commit window/screen before the commit was finished.

Which two options could the administrator use to verify the progress or success of that commit task?

(Choose two.)

System Logs
System Logs
Task Manager
Task Manager
Traffic Logs
Traffic Logs
Configuration Logs
Configuration Logs
Suggested answer: A, B
Explanation:

A. System Logs: The system logs contain information about various events that occur on the firewall, including the commit process. The administrator can review the system logs to verify whether the commit completed successfully or whether there were any errors or warnings during the commit process.

B. Task Manager: The task manager displays a list of all active tasks on the firewall, including the commit task. The administrator can use the task manager to check the status of the commit task, including whether it is in progress, completed successfully, or failed.

asked 23/09/2024
Marcelo Oliveira
42 questions

Question 209

Report Export Collapse

The same route appears in the routing table three times using three different protocols Which mechanism determines how the firewall chooses which route to use?

Administrative distance
Administrative distance
Round Robin load balancing
Round Robin load balancing
Order in the routing table
Order in the routing table
Metric
Metric
Suggested answer: A
Explanation:

Administrative distance is the measure of trustworthiness of a routing protocol. It is used to determine the best path when multiple routes to the same destination exist. The route with the lowest administrative distance is chosen as the best route.

When the same route appears in the routing table three times using three different protocols, the mechanism that determines which route the firewall chooses to use is the administrative distance.

This is explained in the Palo Alto Networks PCNSE Study Guide in Chapter 6: Routing, under the section "Route Selection":

"Administrative distance is a value assigned to each protocol that the firewall uses to determine which route to use if multiple protocols provide routes to the same destination. The route with the lowest administrative distance is preferred."

asked 23/09/2024
Louis Reeves
51 questions

Question 210

Report Export Collapse

An administrator is configuring SSL decryption and needs 10 ensure that all certificates for both SSL Inbound inspection and SSL Forward Proxy are installed properly on the firewall. When certificates are being imported to the firewall for these purposes, which three certificates require a private key?

(Choose three.)

Forward Untrust certificate
Forward Untrust certificate
Forward Trust certificate
Forward Trust certificate
Enterprise Root CA certificate
Enterprise Root CA certificate
End-entity (leaf) certificate
End-entity (leaf) certificate
Intermediate certificate(s)
Intermediate certificate(s)
Suggested answer: A, B, D
Explanation:

This is discussed in the Palo Alto Networks PCNSE Study Guide in Chapter 9: Decryption, under the section "SSL Forward Proxy and Inbound Inspection Certificates":

"When importing SSL decryption certificates, you need to provide private keys for the forward trust, forward untrust, and end-entity (leaf) certificates. You do not need to provide private keys for the root CA and intermediate certificates."

asked 23/09/2024
Alberto Paniagua
34 questions
Total 470 questions
Go to page: of 47
Search

Related questions