ExamGecko
Home / Palo Alto Networks / PCNSE / List of questions
Ask Question

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 23

List of questions

Question 221

Report Export Collapse

An administrator would like to determine which action the firewall will take for a specific CVE. Given the screenshot below, where should the administrator navigate to view this information?

Palo Alto Networks PCNSE image Question 221 54458 09232024001220000000

The profile rule action
The profile rule action
CVE column
CVE column
Exceptions lab
Exceptions lab
The profile rule threat name
The profile rule threat name
Suggested answer: C
Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClMnCAK

asked 23/09/2024
Kelvin Galabuzi
44 questions

Question 222

Report Export Collapse

When using SSH keys for CLI authentication for firewall administration, which method is used for authorization?

Local
Local
LDAP
LDAP
Kerberos
Kerberos
Radius
Radius
Suggested answer: A
Explanation:

When using SSH keys for CLI authentication for firewall administration, the method used for authorization is local. This is described in the Palo Alto Networks PCNSE Study Guide in Chapter 4:

Authentication and Authorization, under the section "CLI Authentication with SSH Keys":

"SSH keys use public key cryptography to authenticate users, but they do not provide a mechanism for authorization. Therefore, when using SSH keys for CLI authentication, authorization is always performed locally on the firewall."

asked 23/09/2024
Tiziano Riezzo
55 questions

Question 223

Report Export Collapse

An administrator Just enabled HA Heartbeat Backup on two devices However, the status on tie firewall's dashboard is showing as down High Availability.

What could an administrator do to troubleshoot the issue?

Goto Device > High Availability> General > HA Pair Settings > Setup and configuring the peer IP for heartbeat backup
Goto Device > High Availability> General > HA Pair Settings > Setup and configuring the peer IP for heartbeat backup
Check peer IP address In the permit list In Device > Setup > Management > Interfaces > Management Interface Settings
Check peer IP address In the permit list In Device > Setup > Management > Interfaces > Management Interface Settings
Go to Device > High Availability > HA Communications> General> and check the Heartbeat Backup under Election Settings
Go to Device > High Availability > HA Communications> General> and check the Heartbeat Backup under Election Settings
Check peer IP address for heartbeat backup to Device > High Availability > HA Communications > Packet Forwarding settings.
Check peer IP address for heartbeat backup to Device > High Availability > HA Communications > Packet Forwarding settings.
Suggested answer: B
Explanation:

If the HA status is showing as down after enabling HA Heartbeat Backup on two devices, an administrator could troubleshoot the issue by checking the peer IP address in the permit list in Device > Setup > Management > Interfaces > Management Interface Settings. This is described in the Palo Alto Networks PCNSE Study Guide in Chapter 7: High Availability, under the section "Configure Heartbeat Backup for Redundancy":

"Verify that the management interface's permitted IP addresses on each peer includes the IP address of the other peer's Heartbeat Backup interface."

asked 23/09/2024
Kyle Roarick
39 questions

Question 224

Report Export Collapse

A company has configured GlobalProtect to allow their users to work from home. A decrease in performance for remote workers has been reported during peak-use hours.

Which two steps are likely to mitigate the issue? (Choose TWO)

Exclude video traffic
Exclude video traffic
Enable decryption
Enable decryption
Block traffic that is not work-related
Block traffic that is not work-related
Create a Tunnel Inspection policy
Create a Tunnel Inspection policy
Suggested answer: A, C
Explanation:

This is because excluding video traffic from being sent over the VPN will reduce the amount of bandwidth being used during peak hours, allowing more bandwidth to be available for other types of traffic. Blocking non-work related traffic will also reduce the amount of bandwidth being used, further freeing up bandwidth for work-related traffic.

Enabling decryption and creating a Tunnel Inspection policy are not likely to mitigate the issue of decreased performance during peak-use hours, as they do not directly address the issue of limited bandwidth availability during these times.

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PP3ICAW

asked 23/09/2024
Tudy smith
26 questions

Question 225

Report Export Collapse

An administrator is configuring a Panorama device group

Which two objects are configurable? (Choose two )

DNS Proxy
DNS Proxy
Address groups
Address groups
SSL/TLS roles
SSL/TLS roles
URL Filtering profiles
URL Filtering profiles
Suggested answer: B, D
Explanation:

URL filtering is a feature in Palo Alto Networks firewalls that allows administrators to block access to specific URLs [1]. This feature can be configured via four different objects: Custom URL categories in URL Filtering profiles, PAN-DB URL categories in URL Filtering profiles, External Dynamic Lists (EDL) in URL Filtering profiles, and Custom URL categories in Security policy rules. The evaluation order for URL filtering is: Custom URL categories in URL Filtering profile, PAN-DB URL categories in URL Filtering profile, EDL in URL Filtering profile, and Custom URL category in Security policy rule. This information can be found in the Palo Alto Networks PCNSE Study Guide, which can be accessed here:

https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/resource-library/palo-altonetworks-pcnse-study-guide.html.

asked 23/09/2024
Chan Park
42 questions

Question 226

Report Export Collapse

A network security administrator wants to configure SSL inbound inspection.

Which three components are necessary for inspecting the HTTPS traffic as it enters the firewall?

(Choose three.)

An SSL/TLS Service profile
An SSL/TLS Service profile
The web server's security certificate with the private key
The web server's security certificate with the private key
A Decryption profile
A Decryption profile
A Decryption policy
A Decryption policy
The client's security certificate with the private key
The client's security certificate with the private key
Suggested answer: B, C, D
Explanation:

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-inboundinspection

asked 23/09/2024
NEURONES TECHNOLOGIES
47 questions

Question 227

Report Export Collapse

A network security administrator has been tasked with deploying User-ID in their organization.

What are three valid methods of collecting User-ID information in a network? (Choose three.)

Windows User-ID agent
Windows User-ID agent
GlobalProtect
GlobalProtect
XMLAPI
XMLAPI
External dynamic list
External dynamic list
Dynamic user groups
Dynamic user groups
Suggested answer: A, B, C
Explanation:

User-ID is a feature that enables the firewall to identify users and groups based on their IP addresses, usernames, or other attributes.

There are three valid methods of collecting User-ID information in a network:

Windows User-ID agent: This is a software agent that runs on a Windows server and collects user mapping information from Active Directory, Exchange servers, or other sources.

GlobalProtect: This is a VPN solution that provides secure remote access for users and devices. It also collects user mapping information from endpoints that connect to the firewall using GlobalProtect.

XMLAPI: This is an application programming interface that allows third-party applications or scripts to send user mapping information to the firewall using XML format.

asked 23/09/2024
Mr. Michael Mettam
33 questions

Question 228

Report Export Collapse

What steps should a user take to increase the NAT oversubscription rate from the default platform setting?

Navigate to Device > Setup > TCP Settings > NAT Oversubscription Rate
Navigate to Device > Setup > TCP Settings > NAT Oversubscription Rate
Navigate to Policies > NAT > Destination Address Translation > Dynamic IP (with session distribution)
Navigate to Policies > NAT > Destination Address Translation > Dynamic IP (with session distribution)
Navigate to Policies > NAT > Source Address Translation > Dynamic IP (with session distribution)
Navigate to Policies > NAT > Source Address Translation > Dynamic IP (with session distribution)
Navigate to Device > Setup > Session Settings > NAT Oversubscription Rate
Navigate to Device > Setup > Session Settings > NAT Oversubscription Rate
Suggested answer: D
Explanation:

NAT oversubscription is a feature that allows you to reuse a translated IP address and port for multiple source devices. This can help you conserve public IP addresses and increase the number of sessions that can be translated by a NAT rule.

asked 23/09/2024
JEAN-MARIE HERMANT
34 questions

Question 229

Report Export Collapse

A network administrator is trying to prevent domain username and password submissions to phishing sites on some allowed URL categories Which set of steps does the administrator need to take in the URL Filtering profile to prevent credential phishing on the firewall?

Choose the URL categories on Site Access column and set action to block Click the User credential Detection tab and select IP User Mapping Commit
Choose the URL categories on Site Access column and set action to block Click the User credential Detection tab and select IP User Mapping Commit
Choose the URL categories in the User Credential Submission column and set action to block Select the User credential Detection tab and select use IP User Mapping Commit
Choose the URL categories in the User Credential Submission column and set action to block Select the User credential Detection tab and select use IP User Mapping Commit
Choose the URL categories in the User Credential Submission column and set action to block Select the URL filtering settings and enable Domain Credential Filter Commit
Choose the URL categories in the User Credential Submission column and set action to block Select the URL filtering settings and enable Domain Credential Filter Commit
Choose the URL categories in the User Credential Submission column and set action to block Select the User credential Detection tab and select Use Domain Credential Filter Commit
Choose the URL categories in the User Credential Submission column and set action to block Select the User credential Detection tab and select Use Domain Credential Filter Commit
Suggested answer: D
asked 23/09/2024
Anirban Ganguly
55 questions

Question 230

Report Export Collapse

An engineer is deploying multiple firewalls with common configuration in Panorama.

What are two benefits of using nested device groups? (Choose two.)

Inherit settings from the Shared group
Inherit settings from the Shared group
Inherit IPSec crypto profiles
Inherit IPSec crypto profiles
Inherit all Security policy rules and objects
Inherit all Security policy rules and objects
Inherit parent Security policy rules and objects
Inherit parent Security policy rules and objects
Suggested answer: B, D
Explanation:

B. Inherit IPSec crypto profiles

This is correct because IPSec crypto profiles are one of the objects that can be inherited from a parent device group1. You can also create IPSec crypto profiles for use in shared or device group policy1.

D. Inherit parent Security policy rules and objects

This is correct because Security policy rules and objects are also inheritable from a parent device group1. You can also create Security policy rules and objects for use in shared or device group policy1.

asked 23/09/2024
ce temp2
50 questions
Total 470 questions
Go to page: of 47
Search

Related questions