ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











An administrator has purchased WildFire subscriptions for 90 firewalls globally.

What should the administrator consider with regards to the WildFire infra-structure?

A.
To comply with data privacy regulations, WildFire signatures and ver-dicts are not shared globally.
A.
To comply with data privacy regulations, WildFire signatures and ver-dicts are not shared globally.
Answers
B.
Palo Alto Networks owns and maintains one global cloud and four WildFire regional clouds.
B.
Palo Alto Networks owns and maintains one global cloud and four WildFire regional clouds.
Answers
C.
Each WildFire cloud analyzes samples and generates malware signatures and verdicts independently of the other WildFire clouds.
C.
Each WildFire cloud analyzes samples and generates malware signatures and verdicts independently of the other WildFire clouds.
Answers
D.
The WildFire Global Cloud only provides bare metal analysis.
D.
The WildFire Global Cloud only provides bare metal analysis.
Answers
Suggested answer: B

Explanation:

According to the Palo Alto Networks website1, there are five WildFire public clouds that customers can choose from based on their location and data privacy requirements: WildFire Global Cloud (U.S.), WildFire Europe Cloud, WildFire Japan Cloud, WildFire Singapore Cloud, and WildFire United Kingdom Cloud. Additionally, there are three more regional public clouds that are available as of PAN-OS 10.0: WildFire Canada Cloud, WildFire Australia Cloud, and WildFire Germany

Cloud2. Therefore, the correct answer is B. Reference: 1:

https://www.paloaltonetworks.com/network-security/wildfire 2:

https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/wildfire-overview/wildfiredeployments/wildfire-global-cloud

An administrator connected a new fiber cable and transceiver to interface Ethernetl/l on a Palo Alto Networks firewall. However, the link does not seem to be coming up.

If an administrator were to troubleshoot, how would they confirm the transceiver type, tx-power, rxpower, vendor name, and part number via the CLI?

A.
show system state filter sw.dev.interface.config
A.
show system state filter sw.dev.interface.config
Answers
B.
show chassis status slot s1
B.
show chassis status slot s1
Answers
C.
show system state filter-pretty sys.s1.*
C.
show system state filter-pretty sys.s1.*
Answers
D.
show system state filter ethernet1/1
D.
show system state filter ethernet1/1
Answers
Suggested answer: D

Explanation:

According to the Palo Alto Networks documentation1, the command show system state filter displays the current state of the system and allows you to filter the output by a specific keyword. The keyword ethernet1/1 matches the interface name that the administrator wants to troubleshoot. The output of this command will show information about the transceiver type, tx-power, rx-power, vendor name, and part number for that interface2. Therefore, the correct answer is D. Reference: 1:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-cli-quick-start/use-the-cli/find-a-command 2:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFmCAK

A remote administrator needs access to the firewall on an untrust interface. Which three options would you configure on an Interface Management profile to secure management access? (Choose three.)

A.
Permitted IP Addresses
A.
Permitted IP Addresses
Answers
B.
SSH
B.
SSH
Answers
C.
https
C.
https
Answers
D.
User-ID
D.
User-ID
Answers
E.
HTTP
E.
HTTP
Answers
Suggested answer: A, B, C

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/getting-started/best-practices-forsecuring-administrative-access

Which two factors should be considered when sizing a decryption firewall de-ployment? (Choose two.)

A.
Number of blocked sessions
A.
Number of blocked sessions
Answers
B.
TLS protocol version
B.
TLS protocol version
Answers
C.
Encryption algorithm
C.
Encryption algorithm
Answers
D.
Number of security zones in decryption policies
D.
Number of security zones in decryption policies
Answers
Suggested answer: B, C

Explanation:

According to the Palo Alto Networks documentation1, decryption consumes firewall CPU resources, so it is important to evaluate the amount of SSL decryption that the firewall deployment can support. Two factors that affect the CPU consumption are the TLS protocol version and the encryption algorithm used by the encrypted traffic. The newer versions of TLS (such as TLS 1.3) and the stronger encryption algorithms (such as AES-256-GCM) require more CPU resources to decrypt than the older versions and weaker algorithms. Therefore, the correct answer is B and C.

The other options are not relevant or important for sizing a decryption firewall deployment: Number of blocked sessions: This option refers to the number of sessions that the firewall blocks based on Security policy rules. It does not affect the decryption performance or resource consumption.

Number of security zones in decryption policies: This option refers to the number of security zones that are used to define the source and destination of the traffic to be decrypted. It does not affect the decryption performance or resource consumption.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/prepare-todeploy-decryption/size-the-decryption-firewall-deployment

Which operation will impact the performance of the management plane?

A.
Decrypting SSL sessions
A.
Decrypting SSL sessions
Answers
B.
Generating a SaaS Application report
B.
Generating a SaaS Application report
Answers
C.
Enabling DoS protection
C.
Enabling DoS protection
Answers
D.
Enabling packet buffer protection
D.
Enabling packet buffer protection
Answers
Suggested answer: B

Explanation:

According to the Palo Alto Networks documentation1, generating a SaaS Application report can impact the performance of the management plane because it requires querying and processing a large amount of log data. Therefore, the correct answer is B.

The other options are not related to the management plane performance:

Decrypting SSL sessions: This option affects the data plane performance, not the management plane performance. Decrypting SSL sessions consumes CPU resources on the data plane, which handles traffic processing and security enforcement2.

Enabling DoS protection: This option also affects the data plane performance, not the management plane performance. Enabling DoS protection allows the firewall to detect and prevent denial-ofservice (DoS) attacks by monitoring and limiting the rate of sessions and packets3.

Enabling packet buffer protection: This option also affects the data plane performance, not the management plane performance. Enabling packet buffer protection allows the firewall to monitor and control the packet buffer usage on each interface to prevent buffer exhaustion and packet drops4.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/monitoring/use-theapplication-command-center-acc/acc-saas-applications 2:

https://docs.paloaltonetworks.com/panos/9-1/pan-os-admin/decryption/decryption-concepts/how-decryption-works 3:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-denial-ofservice-dos-attacks 4:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/networking/configure-packet-buffer-protection

Which three items must be configured to implement application override? (Choose three )

A.
Custom app
A.
Custom app
Answers
B.
Security policy rule
B.
Security policy rule
Answers
C.
Application override policy rule
C.
Application override policy rule
Answers
D.
Decryption policy rule
D.
Decryption policy rule
Answers
E.
Application filter
E.
Application filter
Answers
Suggested answer: A, B, C

Explanation:

According to the Palo Alto Networks documentation1, application override is where the firewall is configured to override the normal application identification (App-ID) of specific traffic passing through the firewall. To implement application override, the following items must be configured: Custom app: This is a user-defined application that is used to identify the traffic that needs to be overridden. It is recommended to create a custom app for the application override policy, rather than using a predefined app that may have different default ports and threat inspection capabilities2.

Security policy rule: This is a rule that allows the traffic that matches the custom app through the firewall. The security policy rule must use the custom app as the application filter and specify the source and destination zones, addresses, and users as needed2.

Application override policy rule: This is a rule that defines the criteria for overriding the App-ID of the traffic. The application override policy rule must use the custom app as the application filter and specify the source and destination zones, addresses, ports, and protocols as needed2. The other options are not required or relevant for implementing application override:

Decryption policy rule: This is a rule that defines the criteria for decrypting encrypted traffic. It is not related to application override, although decryption may be needed to identify some applications that use encryption.

Application filter: This is an object that groups applications based on various criteria, such as category, subcategory, technology, or risk. It is not an item that must be configured for application override, although it can be used as a reference in security policy rules or custom apps.

Reference: 1: https://live.paloaltonetworks.com/t5/blogs/tips-amp-tricks-how-to-create-anapplication-override/ba-p/451872 2:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVLCA0 :

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryptionconcepts/how-decryption-works : https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/app-id/manage-custom-or-unknown-applications/create-an-application-filter

After implementing a new NGFW, a firewall engineer sees a VoIP traffic issue going through the firewall After troubleshooting the engineer finds that the firewall performs NAT on the voice packets payload and opens dynamic pinholes for media ports

What can the engineer do to solve the VoIP traffic issue?

A.
Disable ALG under H.323 application
A.
Disable ALG under H.323 application
Answers
B.
Increase the TCP timeout under H.323 application
B.
Increase the TCP timeout under H.323 application
Answers
C.
Increase the TCP timeout under SIP application
C.
Increase the TCP timeout under SIP application
Answers
D.
Disable ALG under SIP application
D.
Disable ALG under SIP application
Answers
Suggested answer: D

Explanation:

According to the Palo Alto Networks documentation1, application-level gateway (ALG) is a feature that allows the firewall to inspect and modify the payload of some protocols, such as SIP, to enable NAT traversal and firewall policy enforcement. However, ALG can also cause issues with some VoIP implementations, such as modifying the SIP headers incorrectly or opening unnecessary pinholes for media ports. Therefore, disabling ALG under SIP application can help solve the VoIP traffic issue by preventing the firewall from altering the voice packets payload and opening dynamic pinholes2.

Therefore, the correct answer is D.

The other options are not relevant or helpful for solving the VoIP traffic issue:

Disable ALG under H.323 application: This option would disable ALG for H.323 protocol, which is another VoIP protocol, but not the one used in this scenario. The scenario mentions SIP as the signaling protocol, so disabling ALG under

H.323 application would have no effect on the VoIP traffic issue.

Increase the TCP timeout under H.323 application: This option would increase the TCP timeout for H.323 protocol, which is another VoIP protocol, but not the one used in this scenario. The scenario mentions SIP as the signaling protocol, which uses UDP by default, so increasing the TCP timeout under H.323 application would have no effect on the VoIP traffic issue.

Increase the TCP timeout under SIP application: This option would increase the TCP timeout for SIP protocol, which is the signaling protocol used in this scenario. However, SIP uses UDP by default, so increasing the TCP timeout would have no effect on the VoIP traffic issue. Moreover, increasing the TCP timeout would not address the problem of NAT on the voice packets payload and dynamic pinholes for media ports.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/disable-the-sipapplication-level-gateway-alg 2:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEsCAK

An administrator receives the following error message:

"IKE phase-2 negotiation failed when processing Proxy ID. Received local id 192.168 33 33/24 type IPv4 address protocol 0 port 0, received remote id 172.16 33.33/24 type IPv4 address protocol 0 port 0."

How should the administrator identify the root cause of this error message?

A.
In the IKE Gateway configuration, verify that the IP address for each VPN peer is accurate
A.
In the IKE Gateway configuration, verify that the IP address for each VPN peer is accurate
Answers
B.
Verify that the IP addresses can be pinged and that routing issues are not causing the connection failure
B.
Verify that the IP addresses can be pinged and that routing issues are not causing the connection failure
Answers
C.
Check whether the VPN peer on one end is set up correctly using policy-based VPN
C.
Check whether the VPN peer on one end is set up correctly using policy-based VPN
Answers
D.
In the IPSec Crypto profile configuration, verify that PFS is either enabled on both VPN peers or disabled on both VPN peers.
D.
In the IPSec Crypto profile configuration, verify that PFS is either enabled on both VPN peers or disabled on both VPN peers.
Answers
Suggested answer: C

Explanation:

According to the Palo Alto Networks documentation1, the error message "IKE phase-2 negotiation failed when processing Proxy ID" indicates that there is a mismatch between the Proxy ID settings on the two VPN peers. Proxy ID is used to identify the traffic that needs to be encrypted and tunneled. It consists of the local and remote IP addresses, protocols, and ports. If the Proxy ID settings do not match on both VPN peers, the phase-2 negotiation will fail. Therefore, the administrator should check whether the VPN peer on one end is set up correctly using policy-based VPN, which allows specifying the Proxy ID settings manually2. Therefore, the correct answer is C.

The other options are not relevant or helpful for identifying the root cause of this error message:

In the IKE Gateway configuration, verify that the IP address for each VPN peer is accurate: This option would help to identify the root cause of a phase-1 negotiation failure, not a phase-2 negotiation failure. The IP address for each VPN peer is used to establish the IKE gateway, which is part of the phase-1 negotiation. If the IP address is inaccurate, the phase-1 negotiation will fail and the error message will be different.

Verify that the IP addresses can be pinged and that routing issues are not causing the connection failure: This option would also help to identify the root cause of a phase-1 negotiation failure, not a phase-2 negotiation failure. The ability to ping and route between the IP addresses of the VPN peers is a prerequisite for establishing the IKE gateway, which is part of the phase-1 negotiation. If there are routing issues or connectivity problems, the phase-1 negotiation will fail and the error message will be different.

In the IPSec Crypto profile configuration, verify that PFS is either enabled on both VPN peers or disabled on both VPN peers: This option would help to identify the root cause of a different phase-2 negotiation failure, not the one related to Proxy ID mismatch. PFS stands for Perfect Forward Secrecy, which is an option to generate a new encryption key for each IPSec session. If PFS is enabled on one

VPN peer but disabled on another, the phase-2 negotiation will fail and the error message will be "IKEv2 IPSec SA negotiation failed. Invalid syntax."3.

Reference: 1:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbXCAS 2:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpn/site-to-site-vpn/set-up-a-site-tosite-vpn-between-two-firewalls/policy-based-vpn 3:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClZSCA0

Based on the graphic which statement accurately describes the output shown in the Server Monitoring panel?

A.
The User-ID agent is connected to a domain controller labeled lab-client
A.
The User-ID agent is connected to a domain controller labeled lab-client
Answers
B.
The host lab-client has been found by a domain controller
B.
The host lab-client has been found by a domain controller
Answers
C.
The host lab-client has been found by the User-ID agent.
C.
The host lab-client has been found by the User-ID agent.
Answers
D.
The User-ID aaent is connected to the firewall labeled lab-client
D.
The User-ID aaent is connected to the firewall labeled lab-client
Answers
Suggested answer: A

Explanation:

According to the Palo Alto Networks documentation, the Server Monitoring panel displays the status of the servers that the User-ID agent monitors for user mapping information. The graphic shows that the User-ID agent is connected to a server with the IP address 10.1.1.10 and the name lab-client, which is a domain controller (DC) according to the Type column. Therefore, the correct answer is A.

The other options are inaccurate or incorrect based on the graphic:

The host lab-client has been found by a domain controller: This option is inaccurate because labclient is not a host, but a domain controller itself. The graphic does not show any information about hosts being found by domain controllers.

The host lab-client has been found by the User-ID agent: This option is incorrect because lab-client is not a host, but a domain controller itself. The graphic shows that the User-ID agent is connected to lab-client, not that it has found it.

The User-ID agent is connected to the firewall labeled lab-client: This option is incorrect because labclient is not a firewall, but a domain controller. The graphic shows that the User-ID agent is connected to lab-client as a server, not as a firewall.

Reference: : https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/useridentification/device-user-identification-user-id-agents/user-id-agent-monitoring/server-monitoring

To ensure that a Security policy has the highest priority, how should an administrator configure a Security policy in the device group hierarchy?

A.
Add the policy to the target device group and apply a master device to the device group.
A.
Add the policy to the target device group and apply a master device to the device group.
Answers
B.
Reference the targeted device's templates in the target device group.
B.
Reference the targeted device's templates in the target device group.
Answers
C.
Clone the security policy and add it to the other device groups.
C.
Clone the security policy and add it to the other device groups.
Answers
D.
Add the policy in the shared device group as a pre-rule
D.
Add the policy in the shared device group as a pre-rule
Answers
Suggested answer: D

Explanation:

According to the Palo Alto Networks documentation1, the shared device group is a special device group that contains policies and objects that apply to all firewalls managed by Panorama. The policies in the shared device group can be configured as pre-rules or post-rules, which determine their priority relative to the policies in other device groups. Pre-rules have higher priority than the policies in other device groups, while post-rules have lower priority. Therefore, to ensure that a Security policy has the highest priority, the administrator should configure it in the shared device group as a pre-rule. Therefore, the correct answer is D.

The other options are not relevant or effective for ensuring that a Security policy has the highest priority:

Add the policy to the target device group and apply a master device to the device group: This option would add the policy to a specific device group, which is a subset of firewalls managed by Panorama.

The policy would only apply to the firewalls in that device group, not to all firewalls. Moreover, applying a master device to the device group does not affect the priority of the policy, but only allows synchronizing configuration changes across devices in the same device group2.

Reference the targeted device's templates in the target device group: This option would reference the templates that contain network and device settings for the targeted devices in the target device group. It does not affect the Security policy or its priority, but only allows applying consistent configuration settings across devices in the same device group3.

Clone the security policy and add it to the other device groups: This option would create copies of the security policy and add them to different device groups. However, this would not ensure that the policy has the highest priority, because it would still depend on whether it is configured as a pre-rule or a post-rule within each device group. Moreover, this option would create redundant and potentially conflicting policies across different device groups.

Reference: 1: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/panoramaoverview/centralized-firewall-configuration-and-update-management/device-groups/device-grouppolicies 2:

https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/panoramaoverview/centralized-firewall-configuration-and-update-management/device-groups/synchronizeconfiguration-changes-across-devices-in-a-device-group 3:

https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/panoramaoverview/centralized-firewall-configuration-and-update-management/templates-and-templatestacks/reference-the-targeted-devices-templates-in-the-target-device-group

Total 426 questions
Go to page: of 43