ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











Given the following snippet of a WildFire submission log did the end-user get access to the requested information and why or why not?

A.
Yes, because the action is set to alert
A.
Yes, because the action is set to alert
Answers
B.
No, because this is an example from a defeated phishing attack
B.
No, because this is an example from a defeated phishing attack
Answers
C.
No, because the severity is high and the verdict is malicious.
C.
No, because the severity is high and the verdict is malicious.
Answers
D.
Yes, because the action is set to allow.
D.
Yes, because the action is set to allow.
Answers
Suggested answer: D

Explanation:

As long as the action is set to allow, then it will still allow it. Threats that have the ability to become critical but have mitigating factors; for example, they may be difficult to exploit, do not result in elevated privileges, or do not have a large victim pool. WildFire Submissions log entries with a malicious verdict and an action set to allow are logged as High.

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/monitoring/view-and-managelogs/log-types-and-severity-levels/threat-logs#id5cea1511-a153-4005-9d5f-ab2482e838ae

When an engineer configures an active/active high availability pair, which two links can they use?

(Choose two)

A.
HSCI-C
A.
HSCI-C
Answers
B.
Console Backup
B.
Console Backup
Answers
C.
HA3
C.
HA3
Answers
D.
HA2 backup
D.
HA2 backup
Answers
Suggested answer: C, D

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/high-availability/set-up-activeactiveha/prerequisites-for-activeactive-ha

According to the Palo Alto Networks documentation1, an active/active high availability pair requires four links to communicate and synchronize state information: HA1, HA2, HA3, and HSCI. HA1 and HA2 are the same as in active/passive mode, where HA1 is used for control plane synchronization and HA2 is used for data plane synchronization. However, in active/active mode, there are two additional links:

HA3: This link is used for session setup synchronization between the two firewalls. It allows the firewalls to share information about new sessions that they create, so that they can forward packets for the same session if needed.

HSCI: This link is used for session owner synchronization between the two firewalls. It allows the firewalls to determine which firewall is responsible for processing packets for a given session.

Both HA3 and HSCI links can use either a dedicated interface or a subinterface. Therefore, the correct answer is C and D.

The other options are not valid links for an active/active high availability pair:

HSCI-C: This option is not a valid link name. HSCI stands for High-Speed Chassis Interconnect, which is a physical cable that connects two firewalls in a chassis-based system. It is not related to active/active high availability.

Console Backup: This option is not a valid link name. Console backup is a feature that allows accessing the console port of a firewall remotely through another firewall in an HA pair. It is not related to active/active high availability.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/set-upactiveactive-ha/configure-activeactive-ha

Which new PAN-OS 11.0 feature supports Pv6 traffic?

A.
DHCPv6 Client with Prefix Delegation
A.
DHCPv6 Client with Prefix Delegation
Answers
B.
OSPF
B.
OSPF
Answers
C.
DHCP Server
C.
DHCP Server
Answers
D.
IKEvI
D.
IKEvI
Answers
Suggested answer: A

Explanation:

According to the Palo Alto Networks documentation1, DHCPv6 Client with Prefix Delegation is a new feature in PAN-OS 11.0 that supports IPv6 traffic. This feature allows configuring an interface as a DHCPv6 client with prefix delegation, which enables the interface to obtain an IPv6 prefix from a DHCPv6 server and assign IPv6 addresses to other interfaces on the firewall or downstream devices.

Therefore, the correct answer is A.

The other options are not new features in PAN-OS 11.0 that support IPv6 traffic:

OSPF: This option is not a new feature in PAN-OS 11.0. OSPF is a routing protocol that supports both IPv4 and IPv6 traffic. It has been supported by PAN-OS since version 4.12.

DHCP Server: This option is not a new feature in PAN-OS 11.0. DHCP Server is a feature that allows the firewall to act as a DHCP server and assign IP addresses to clients. It supports both IPv4 and IPv6 traffic. It has been supported by

PAN-OS since version 5.03.

IKEv1: This option is not a new feature in PAN-OS 11.0. IKEv1 is a protocol that supports both IPv4 and IPv6 traffic for establishing VPN tunnels. It has been supported by PAN-OS since version 3.04.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networkingfeatures/dhcpv6-client-with-prefix-delegation 2:

https://docs.paloaltonetworks.com/pan-os/91/pan-os-admin/networking/routing/open-shortest-path-first-ospf 3:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/dhcp/configure-a-dhcpserver 4:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpn/set-up-site-to-sitevpn/set-up-an-ike-gateway

Information Security is enforcing group-based policies by using security-event monitoring on Windows User-ID agents for IP-to-User mapping in the network. During the rollout, Information Security identified a gap for users authenticating to their VPN and wireless networks. Root cause analysis showed that users were authenticating via RADIUS and that authentication events were not captured on the domain controllers that were being monitored Information Security found that authentication events existed on the Identity Management solution (IDM). There did not appear to be direct integration between PAN-OS and the IDM solution

How can Information Security extract and learn iP-to-user mapping information from authentication events for VPN and wireless users?

A.
Add domain controllers that might be missing to perform security-event monitoring for VPN and wireless users.
A.
Add domain controllers that might be missing to perform security-event monitoring for VPN and wireless users.
Answers
B.
Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over TLS.
B.
Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over TLS.
Answers
C.
Configure the User-ID XML API on PAN-OS firewalls to pull the authentication events directly from the IDM solution
C.
Configure the User-ID XML API on PAN-OS firewalls to pull the authentication events directly from the IDM solution
Answers
D.
Configure the Windows User-ID agents to monitor the VPN concentrators and wireless controllers for IP-to-User mapping.
D.
Configure the Windows User-ID agents to monitor the VPN concentrators and wireless controllers for IP-to-User mapping.
Answers
Suggested answer: C

Explanation:

According to the Palo Alto Networks documentation1, the User-ID XML API is a feature that allows external systems to send user mapping information to the firewall or Panorama using XML messages over HTTPS. The User-ID XML API can be used to integrate with third-party identity management solutions (IDM) that can provide authentication events for VPN and wireless users. Therefore, the correct answer is C.

The other options are not effective or relevant for extracting and learning IP-to-user mapping information from authentication events for VPN and wireless users:

Add domain controllers that might be missing to perform security-event monitoring for VPN and wireless users: This option would not help because the root cause analysis showed that authentication events were not captured on the domain controllers that were being monitored.

Adding more domain controllers would not change this fact, unless they were configured to receive authentication events from RADIUS servers, which is not mentioned in the scenario.

Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over TLS: This option would not help because it assumes that the IDM solution can send Syslog messages over TLS, which is not mentioned in the scenario.

Moreover, Syslog messages are less reliable and secure than XML messages for user mapping information. Configure the Windows User-ID agents to monitor the VPN concentrators and wireless controllers for IP-to-User mapping: This option would not help because it assumes that the VPN concentrators and wireless controllers can provide IP-to-User mapping information, which is not mentioned in the scenario. Moreover, this option would require additional configuration and maintenance of Windows

User-ID agents, which may not be feasible or scalable.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-ipaddresses-to-users/send-user-mappings-to-user-id-using-the-xml-api

A company has recently migrated their branch office's PA-220S to a centralized Panorama. This Panorama manages a number of PA-7000 Series and PA-5200 Series devices All device group and template configuration is managed solely within Panorama

They notice that commit times have drastically increased for the PA-220S after the migration

What can they do to reduce commit times?

A.
Disable "Share Unused Address and Service Objects with Devices" in Panorama Settings.
A.
Disable "Share Unused Address and Service Objects with Devices" in Panorama Settings.
Answers
B.
Update the apps and threat version using device-deployment
B.
Update the apps and threat version using device-deployment
Answers
C.
Perform a device group push using the "merge with device candidate config" option
C.
Perform a device group push using the "merge with device candidate config" option
Answers
D.
Use "export or push device config bundle" to ensure that the firewall is integrated with the Panorama config.
D.
Use "export or push device config bundle" to ensure that the firewall is integrated with the Panorama config.
Answers
Suggested answer: A

Explanation:

According to the Palo Alto Networks documentation1, disabling "Share Unused Address and Service Objects with Devices" in Panorama Settings is a possible solution to reduce commit times for firewalls managed by Panorama. This option prevents Panorama from pushing address and service objects that are not used in any policy rules to the firewalls, which can reduce the size of the configuration and improve the commit performance. Therefore, the correct answer is A.

The other options are not relevant or effective for reducing commit times:

Update the apps and threat version using device-deployment: This option would not help because it is not related to the commit process. Updating the apps and threat version using device-deployment is a feature that allows Panorama to distribute content updates to firewalls without requiring a commit2.

Perform a device group push using the "merge with device candidate config" option: This option would not help because it is not related to the commit performance. Performing a device group push using the "merge with device candidate config" option is a feature that allows Panorama to merge the local changes on a firewall with the Panorama configuration without overwriting them3.

Use "export or push device config bundle" to ensure that the firewall is integrated with the Panorama config: This option would not help because it is not related to the commit performance. Using "export or push device config bundle" is a feature that allows Panorama to export or push a complete configuration bundle to a firewall, which can be useful for troubleshooting or migrating configurations4.

Reference: 1:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CleLCAS 2: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/managefirewalls/manage-content-updates-on-managed-firewalls/update-the-apps-and-threats-versionusing-device-deployment 3:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewalladministration/manage-firewalls/manage-firewall-configurations/perform-a-device-group-pushusing-the-merge-with-device-candidate-config-option 4:

https://docs.paloaltonetworks.com/panos/9-1/pan-os-admin/firewall-administration/manage-firewalls/manage-firewall-configurations/useexport-or-push-device-config-bundle-to-ensure-that-the-firewall-is-integrated-with-the-panoramaconfig

In a template, which two objects can be configured? (Choose two.)

A.
SD-WAN path quality profile
A.
SD-WAN path quality profile
Answers
B.
Monitor profile
B.
Monitor profile
Answers
C.
IPsec tunnel
C.
IPsec tunnel
Answers
D.
Application group
D.
Application group
Answers
Suggested answer: A

Explanation:

According to the Palo Alto Networks documentation1, a template is a set of configuration settings that you can apply to firewalls or Panorama managed collectors. A template can contain settings for network and device configuration, such as interfaces, zones, virtual routers, DNS, NTP, logging, and more. Therefore, the correct answer is A and B.

The other options are not objects that can be configured in a template:

IPsec tunnel: This option is not an object that can be configured in a template. IPsec tunnel is a feature that allows establishing secure VPN connections between firewalls or other devices. IPsec tunnel configuration is part of the policy configuration, not the network or device configuration2.

Application group: This option is not an object that can be configured in a template. Application group is an object that groups applications based on various criteria, such as category, subcategory, technology, or risk. Application group configuration is part of the object configuration, not the network or device configuration3.

Reference: 1: https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/managefirewalls/manage-templates-and-template-stacks/manage-templates 2:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpn/site-to-site-vpn/set-up-a-site-tosite-vpn-between-two-firewalls 3:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/app-id/manage-custom-or-unknown-applications/create-an-application-group

Phase two of a VPN will not establish a connection. The peer is using a policy-based VPN configuration. What part of the configuration should the engineer verify'?

A.
PAN-OS versions
A.
PAN-OS versions
Answers
B.
Proxy-IDs
B.
Proxy-IDs
Answers
C.
IKE Crypto Profile
C.
IKE Crypto Profile
Answers
D.
Security policy
D.
Security policy
Answers
Suggested answer: B

Explanation:

Proxy-ID is a parameter that identifies the traffic that needs to be encrypted and tunneled in an IPSec VPN. Proxy-ID consists of the local and remote IP addresses, protocols, and ports. Proxy-ID is used when the peer is using a policy-based VPN configuration, which allows specifying the Proxy-ID settings manually. If the Proxy-ID settings do not match on both peers, the phase two of the VPN will not establish a connection. Therefore, the correct answer is B.

The other options are not parts of the configuration that the engineer should verify for phase two of a VPN:

PAN-OS versions: This option is not relevant for phase two of a VPN. PAN-OS versions are the software versions that run on Palo Alto Networks firewalls. They do not affect the VPN connection establishment, as long as they support the same VPN features and protocols2.

IKE Crypto Profile: This option is not relevant for phase two of a VPN. IKE Crypto Profile is a parameter that defines the encryption and authentication algorithms for IKE negotiation. IKE negotiation is part of phase one of the VPN, not phase two3.

Security policy: This option is not relevant for phase two of a VPN. Security policy is a rule that allows or denies traffic based on various criteria, such as source, destination, application, user, and service. Security policy does not affect the VPN connection establishment, but only the traffic that passes through the VPN tunnel4.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpn/site-to-sitevpn/set-up-a-site-to-site-vpn-between-two-firewalls/policy-based-vpn 2:

https://docs.paloaltonetworks.com/pan-os.html 3:

https://docs.paloaltonetworks.com/pan-os/91/pan-os-admin/vpn/site-to-site-vpn-concepts/internet-key-exchange-ike-for-vpn/methods-ofsecuring-ipsec-vpn-tunnels-ike-phase-2 4:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/policy/security-policy.html

Which three external authentication services can the firewall use to authenticate admins into the Palo Alto Networks NGFW without creating administrator account on the firewall? (Choose three.)

A.
RADIUS
A.
RADIUS
Answers
B.
TACACS+
B.
TACACS+
Answers
C.
Kerberos
C.
Kerberos
Answers
D.
LDAP
D.
LDAP
Answers
E.
SAML
E.
SAML
Answers
Suggested answer: A, B, E

Explanation:

According to the Palo Alto Networks documentation1, the firewall can use three external authentication services to authenticate admins into the Palo Alto Networks NGFW without creating administrator accounts on the firewall: RADIUS, TACACS+, and SAML. These services allow the firewall to verify the credentials of admins against an external server and grant them access based on their assigned roles and permissions. Therefore, the correct answer is A, B, and E.

The other options are not external authentication services that the firewall can use to authenticate admins:

Kerberos: This option is not an external authentication service that the firewall can use to authenticate admins. Kerberos is a protocol that allows users to access network resources using a single sign-on mechanism. The firewall can use

Kerberos to authenticate users for GlobalProtect VPN or Captive Portal, but not for admin access2.

LDAP: This option is not an external authentication service that the firewall can use to authenticate admins. LDAP is a protocol that allows querying and modifying directory services over a network. The firewall can use LDAP to retrieve user and group information from an external server, but not to authenticate admins3.

Reference: 1: https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/authentication/authentication-types/external-authentication-services 2:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authenticationtypes/kerberos-authentication 3:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-osadmin/user-id/map-ip-addresses-to-users/map-ip-addresses-to-users-using-an-ldap-server

ln a security-first network, what is the recommended threshold value for apps and threats to be dynamically updated?

A.
1 to 4 hours
A.
1 to 4 hours
Answers
B.
6 to 12 hours
B.
6 to 12 hours
Answers
C.
24 hours
C.
24 hours
Answers
D.
36 hours
D.
36 hours
Answers
Suggested answer: A

Explanation:

According to the best practices for content updates for security-first networks, the recommended threshold value for apps and threats to be dynamically updated is 1 to 4 hours. This ensures that the network is protected against the latest threats and exploits as soon as possible. Reference: 1 Best Practices for Content UpdatesóSecurity-First - Palo Alto Networks https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/software-and-content-updates/bestpractices-for-app-and-threat-content-updates/best-practices-security-first

Which DoS Protection Profile detects and prevents session exhaustion attacks against specific destinations?

A.
Resource Protection
A.
Resource Protection
Answers
B.
TCP Port Scan Protection
B.
TCP Port Scan Protection
Answers
C.
Packet Based Attack Protection
C.
Packet Based Attack Protection
Answers
D.
Packet Buffer Protection
D.
Packet Buffer Protection
Answers
Suggested answer: A

Explanation:

According to the documentation, resource protection detects and prevents session exhaustion attacks against specific destinations. This type of attack uses a large number of hosts to establish as many fully established sessions as possible to consume all of a system's resources. Resource protection defines the maximum number of concurrent connections for a destination IP address or zone. Reference: 1 Security Profile: DoS Protection Profile - Palo Alto Networks

https://docs.paloaltonetworks.com/network-security/security-policy/security-profiles/securityprofile-dos-protection-profile

Total 426 questions
Go to page: of 43