ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Which three methods are supported for split tunneling in the GlobalProtect Gateway? (Choose three.)

A.
Video Streaming Application
A.
Video Streaming Application
Answers
B.
Destination Domain
B.
Destination Domain
Answers
C.
Client Application Process
C.
Client Application Process
Answers
D.
Source Domain
D.
Source Domain
Answers
E.
URL Category
E.
URL Category
Answers
Suggested answer: B, C, E

Explanation:

The GlobalProtect Gateway supports three methods for split tunneling23:

Access Route ó You can define a list of IP addresses or subnets that are accessible through the VPN tunnel. All other traffic goes directly to the internet.

Domain and Application ó You can define a list of domains or applications that are accessible through the VPN tunnel. All other traffic goes directly to the internet. You can also use this method to exclude specific domains or applications from the VPN tunnel.

Video Traffic ó You can exclude video streaming traffic from the VPN tunnel based on predefined categories or custom URLs. This method reduces latency and jitter for video streaming applications.

An engineer discovers the management interface is not routable to the User-ID agent What configuration is needed to allow the firewall to communicate to the User-ID agent?

A.
Create a NAT policy for the User-ID agent server
A.
Create a NAT policy for the User-ID agent server
Answers
B.
Add a Policy Based Forwarding (PBF) policy to the User-ID agent IP
B.
Add a Policy Based Forwarding (PBF) policy to the User-ID agent IP
Answers
C.
Create a custom service route for the UID Agent
C.
Create a custom service route for the UID Agent
Answers
D.
Add a static route to the virtual router
D.
Add a static route to the virtual router
Answers
Suggested answer: C

Explanation:

To allow the firewall to communicate with the User-ID agent, you need to configure a custom service route for the UID Agent23. A custom service route allows you to specify which interface and source IP address the firewall uses to connect to a specific destination service. By default, the firewall uses its management interface for services such as User-ID, but you can override this behavior by creating a custom service route.

To configure a custom service route for the UID Agent, you need to do the following steps:

Go to Device > Setup > Services and click Service Route Configuration.

In the Service column, select User-ID Agent from the drop-down list.

In the Interface column, select an interface that can reach the User-ID agent server from the dropdown list.

In the Source Address column, select an IP address that belongs to that interface from the drop-down list.

Click OK and Commit your changes.

The correct answer is C. Create a custom service route for UID Agent

Which log type will help the engineer verify whether packet buffer protection was activated?

A.
Data Filtering
A.
Data Filtering
Answers
B.
Configuration
B.
Configuration
Answers
C.
Threat
C.
Threat
Answers
D.
Traffic
D.
Traffic
Answers
Suggested answer: C

Explanation:

The log type that will help the engineer verify whether packet buffer protection was activated is Threat Logs. Threat Logs are logs generated by the Palo Alto Networks firewall when it detects a malicious activity on the network. These logs contain information about the source, destination, and type of threat detected. They also contain information about the packet buffer protection that was activated in response to the detected threat. This information can help the engineer verify that packet buffer protection was activated and determine which actions were taken in response to the detected threat. Packet buffer protection is a feature that prevents packet buffer exhaustion by dropping packets, discarding sessions, or blocking source IP addresses when the packet buffer utilization exceeds a certain threshold. The firewall records these events in the threat log with different threat IDs andnames1. The system log also records an alert event when the packet buffer congestion reaches thealert threshold2. The other types of logs do not show packet buffer protection events. Reference: 1:https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/zone-defense/packet-buffer-protection 2: https://docs.paloaltonetworks.com/pan-os/10- 2/pan-os-admin/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/system-log-fields

Which GlobalProtect gateway selling is required to enable split-tunneling by access route, destination domain, and application?

A.
No Direct Access to local networks
A.
No Direct Access to local networks
Answers
B.
Tunnel mode
B.
Tunnel mode
Answers
C.
iPSec mode
C.
iPSec mode
Answers
D.
Satellite mode
D.
Satellite mode
Answers
Suggested answer: B

Explanation:

To enable split-tunneling by access route, destination domain, and application, you need to configure a split tunnel based on the domain and application on your GlobalProtect gateway2. This allows you to specify which domains and applications are included or excluded from the VPN tunnel.

Which three multi-factor authentication methods can be used to authenticate access to the firewall?

(Choose three.)

A.
One-time password
A.
One-time password
Answers
B.
User certificate
B.
User certificate
Answers
C.
Voice
C.
Voice
Answers
D.
SMS
D.
SMS
Answers
E.
Fingerprint
E.
Fingerprint
Answers
Suggested answer: A, B, D

Explanation:

These three methods are examples of multi-factor authentication that can be used to authenticate access to the firewall. A one-time password is a code that is generated by an authentication app or sent by email or SMS and expires after a single use. A user certificate is a digital credential that is issued by a trusted authority and stored on the user's device. SMS is a text message that is sent tothe user's phone number with a code or a link to verify their identity1. The other methods are notsupported by the firewall for multi-factor authentication. Voice and fingerprint are biometric factorsthat require special hardware and software to capture and analyze. Reference: 1: https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi- factor-authentication

A firewall administrator is investigating high packet buffer utilization in the company firewall. After looking at the threat logs and seeing many flood attacks coming from a single source that are dropped a by the firewall, the administrator decides to enable packet butter protection to protect against similar attacks.

The administrator enables packet buffer protection globally in the firewall but still sees a high packet buffer utilization rate.

What else should the administrator do to stop packet buffers from being overflowed?

A.
Add the default Vulnerability Protection profile to all security rules that allow traffic from outside.
A.
Add the default Vulnerability Protection profile to all security rules that allow traffic from outside.
Answers
B.
Enable packet buffer protection for the affected zones.
B.
Enable packet buffer protection for the affected zones.
Answers
C.
Add a Zone Protection profile to the affected zones.
C.
Add a Zone Protection profile to the affected zones.
Answers
D.
Apply DOS profile to security rules allow traffic from outside.
D.
Apply DOS profile to security rules allow traffic from outside.
Answers
Suggested answer: B

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dosprotection/zone-defense/packet-buffer-protection

Which CLI command displays the physical media that are connected to ethernet1/8?

A.
> show system state filter-pretty sys.si.p8.stats
A.
> show system state filter-pretty sys.si.p8.stats
Answers
B.
> show system state filter-pretty sys.sl.p8.phy
B.
> show system state filter-pretty sys.sl.p8.phy
Answers
C.
> show interface ethernet1/8
C.
> show interface ethernet1/8
Answers
D.
> show system state filter-pretty sys.sl.p8.med
D.
> show system state filter-pretty sys.sl.p8.med
Answers
Suggested answer: B

Explanation:

Example output:

> show system state filter-pretty sys.s1.p1.phy

sys.s1.p1.phy: {

link-partner: { },

media: CAT5,

type: Ethernet,

}

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cld3CAC

Which time determines how long the passive firewall will wait before taking over as the active firewall alter losing communications with the HA peer?

A.
Heartbeat Interval
A.
Heartbeat Interval
Answers
B.
Additional Master Hold Up Time
B.
Additional Master Hold Up Time
Answers
C.
Promotion Hold Time
C.
Promotion Hold Time
Answers
D.
Monitor Fall Hold Up Time
D.
Monitor Fall Hold Up Time
Answers
Suggested answer: C

Explanation:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/ha-concepts/ha- timers

An engineer must configure the Decryption Broker feature. To which router must the engineer assign the decryption forwarding interfaces that are used in Decryption Broker security chain?

A.
A virtual router that has no additional interfaces for passing data-type traffic and no other configured routes than those used for the security chain.
A.
A virtual router that has no additional interfaces for passing data-type traffic and no other configured routes than those used for the security chain.
Answers
B.
The default virtual router. If there is no default virtual router , the engineer must create one during setup.
B.
The default virtual router. If there is no default virtual router , the engineer must create one during setup.
Answers
C.
A virtual router that is configured with at least one dynamic routing protocol and has at least one entry in the RIB
C.
A virtual router that is configured with at least one dynamic routing protocol and has at least one entry in the RIB
Answers
D.
The virtual router that routes the traffic that the Decryption Broker security chain inspects.
D.
The virtual router that routes the traffic that the Decryption Broker security chain inspects.
Answers
Suggested answer: D

Explanation:

Decryption Broker is a feature that allows you to use a Palo Alto Networks firewall as a decryption broker for other security devices in your network1. It works by decrypting traffic on one interface and forwarding it to another interface where it can be inspected by other devices before being reencrypted and sent to its destination2. The firewall acts as a transparent bridge between the two interfaces and does not change the source or destination IP addresses of the traffic2.

To configure Decryption Broker, you need to assign decryption forwarding interfaces (DFIs) to the virtual router that routes the traffic that you want to inspect. The DFIs are used to forward decrypted traffic from one interface to another in a security chain3. A security chain is a set of devices that perform different security functions on the same traffic flow3. You can have multiple security chains for different types of traffic or different segments of your network3.

The reason why you need to assign DFIs to the virtual router that routes the traffic is because Decryption Broker uses routing tables to determine which DFI belongs to which security chain and how to forward traffic between them2. If you assign DFIs to a different virtual router than the one that routes the traffic, Decryption Broker will not be able to find them or forward traffic correctly2.

An administrator wants to enable WildFire inline machine learning. Which three file types does WildFire inline ML analyze?

(Choose three.)

A.
MS Office
A.
MS Office
Answers
B.
ELF
B.
ELF
Answers
C.
Powershell scripts
C.
Powershell scripts
Answers
D.
VBscripts
D.
VBscripts
Answers
E.
APK
E.
APK
Answers
Suggested answer: A, B, C
Total 426 questions
Go to page: of 43