ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port?


A.
The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-2.
A.
The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-2.
Answers
B.
The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-l and Spermitted-subnet-2.
B.
The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-l and Spermitted-subnet-2.
Answers
C.
The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-l.
C.
The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-l.
Answers
D.
The firewall will allow HTTP, Telnet, SNMP, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-l and $permitted-subnet-2.
D.
The firewall will allow HTTP, Telnet, SNMP, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-l and $permitted-subnet-2.
Answers
Suggested answer: C

An engineer is configuring a firewall with three interfaces:

* MGT connects to a switch with internet access.

* Ethernet1/1 connects to an edge router.

* Ethernet1/2 connects to a visualization network.

The engineer needs to configure dynamic updates to use a dataplane interface for internet traffic. What should be configured in Setup > Services > Service Route Configuration

to allow this traffic?

A.
Set DNS and Palo Alto Networks Services to use the ethernet1/1 source interface.
A.
Set DNS and Palo Alto Networks Services to use the ethernet1/1 source interface.
Answers
B.
Set DNS and Palo Alto Networks Services to use the ethernet1/2 source interface.
B.
Set DNS and Palo Alto Networks Services to use the ethernet1/2 source interface.
Answers
C.
Set DNS and Palo Alto Networks Services to use the MGT source interface.
C.
Set DNS and Palo Alto Networks Services to use the MGT source interface.
Answers
D.
Set DDNS and Palo Alto Networks Services to use the MGT source interface
D.
Set DDNS and Palo Alto Networks Services to use the MGT source interface
Answers
Suggested answer: A

Which type of policy in Palo Alto Networks firewalls can use Device-ID as a match condition?

A.
NAT
A.
NAT
Answers
B.
DOS protection
B.
DOS protection
Answers
C.
QoS
C.
QoS
Answers
D.
Tunnel inspection
D.
Tunnel inspection
Answers
Suggested answer: B

A company wants to add threat prevention to the network without redesigning the network routing.

What are two best practice deployment modes for the firewall? (Choose two.)

A.
VirtualWire
A.
VirtualWire
Answers
B.
Layer3
B.
Layer3
Answers
C.
TAP
C.
TAP
Answers
D.
Layer2
D.
Layer2
Answers
Suggested answer: A, D

Explanation:

VirtualWire and Layer2 deployment modes allow the firewall to act as a bump in the wire without changing the existing network routing. In VirtualWire mode,

the firewall bridges two interfaces and passes traffic between them without any IP-layer processing. In Layer2 mode, the firewall acts as a transparent switch and

processes traffic at Layer2 of the OSI model. Reference:

https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/networking/configure-interfaces/virtual-wire-deployments.html

An administrator is using Panorama to manage multiple firewalls. After upgrading all devices to the latest PAN-OS software, the administrator enables log forwarding from the firewalls to Panorama.

However, pre-existing logs from the firewalls are not appearing in Panorama.

Which action should be taken to enable the firewalls to send their pre-existing logs to Panorama?

A.
Export the log database.
A.
Export the log database.
Answers
B.
Use the import option to pull logs.
B.
Use the import option to pull logs.
Answers
C.
Use the scp logdb export command.
C.
Use the scp logdb export command.
Answers
D.
Use the ACC to consolidate the logs.
D.
Use the ACC to consolidate the logs.
Answers
Suggested answer: B

Explanation:

The import option allows the administrator to pull logs from the firewalls to Panorama. This option is useful when the firewalls have pre-existing logs that were

not forwarded to Panorama before. The import option can be configured on Panorama by selecting Device > Log Collection > Import Logs. Reference:

https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-log-collection/configure-log-forwarding-to-panorama/import-logs-from-firewallsto-panorama.html


An engineer configures a specific service route in an environment with multiple virtual systems instead of using the inherited global service route configuration.

What type of service route can be used for this configuration?

A.
IPv6 Source or Destination Address
A.
IPv6 Source or Destination Address
Answers
B.
Destination-Based Service Route
B.
Destination-Based Service Route
Answers
C.
IPv4 Source Interface
C.
IPv4 Source Interface
Answers
D.
Inherit Global Setting
D.
Inherit Global Setting
Answers
Suggested answer: C

Explanation:

The IPv4 Source Interface service route allows the administrator to specify a source interface for a service based on the virtual system. This option overrides the

inherited global service route configuration and provides more granular control over the service routes for each virtual system. Reference:

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/virtual-systems/customize-service-routes-for-a-virtual-system.html


A firewall engineer creates a NAT rule to translate IP address 1.1.1.10 to 192.168.1.10. The engineer also plans to enable DNS rewrite so that the firewall rewrites the IPv4 address in a DNS response based on the original destination IP address and translated destination IP address configured for the rule. The engineer wants the firewall to rewrite a DNS response of 1.1.1.10 to 192.168.1.10.

What should the engineer do to complete the configuration?

A.
Create a U-Turn NAT to translate the destination IP address 192.168.1.10 to 1.1.1.10 with the destination port equal to UDP/53.
A.
Create a U-Turn NAT to translate the destination IP address 192.168.1.10 to 1.1.1.10 with the destination port equal to UDP/53.
Answers
B.
Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Forward.
B.
Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Forward.
Answers
C.
Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Reverse.
C.
Enable DNS rewrite under the destination address translation in the Translated Packet section of the NAT rule with the direction Reverse.
Answers
D.
Create a U-Turn NAT to translate the destination IP address 1.1.1.10 to 192.168.1.10 with the destination port equal to UDP/53.
D.
Create a U-Turn NAT to translate the destination IP address 1.1.1.10 to 192.168.1.10 with the destination port equal to UDP/53.
Answers
Suggested answer: B

Explanation:

If the DNS response matches the Original Destination Address in the rule, translate the DNS response using the same translation the rule uses. For example, if the rule translates IP address 1.1.1.10 to 192.168.1.10, the firewall rewrites a DNS response of 1.1.1.10 to 192.168.1.10. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/source-nat-and-destination-nat/destination-nat-dns-rewrite-use-cases#id0d85db1b-05b9-4956-a467-f71d558263bb

An organization wants to begin decrypting guest and BYOD traffic.

Which NGFW feature can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted?

A.
Authentication Portal
A.
Authentication Portal
Answers
B.
SSL Decryption profile
B.
SSL Decryption profile
Answers
C.
SSL decryption policy
C.
SSL decryption policy
Answers
D.
comfort pages
D.
comfort pages
Answers
Suggested answer: A

Explanation:

An authentication portal is a feature that can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted. An authentication portal is a web page that the firewall displays to users who need to authenticate before accessing the network or the internet. The authentication portal can be customized to include a welcome message, a login prompt, a disclaimer, a certificate download link, and a logout button.The authentication portal can also be configured to use different authentication methods, such as local database, RADIUS, LDAP, Kerberos, or SAML1.By using an authentication portal, the firewall can redirect BYOD users to a web page where they can learn about the decryption policy, download and install the CA certificate, and agree to the terms of use before accessing the network or the internet2.

An SSL decryption profile is not a feature that can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted. An SSL decryption profile is a set of options that define how the firewall handles SSL/TLS traffic that it decrypts.An SSL decryption profile can include settings such as certificate verification, unsupported protocol handling, session caching, session resumption, algorithm selection, etc3. An SSL decryption profile does not provide any user identification or notification functions.

An SSL decryption policy is not a feature that can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted. An SSL decryption policy is a set of rules that determine which traffic the firewall decrypts based on various criteria, such as source and destination zones, addresses, users, applications, services, etc.An SSL decryption policy can also specify which type of decryption to apply to the traffic, such as SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy4. An SSL decryption policy does not provide any user identification or notification functions.

Comfort pages are not a feature that can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted. Comfort pages are web pages that the firewall displays to users when it blocks or fails to decrypt certain traffic due to security policy or technical reasons.Comfort pages can include information such as the reason for blocking or failing to decrypt the traffic, the URL of the original site, the firewall serial number, etc5. Comfort pages do not provide any user identification or notification functions before decrypting the traffic.

After switching to a different WAN connection, users have reported that various websites will not load, and timeouts are occurring. The web servers work fine from other locations.

The firewall engineer discovers that some return traffic from these web servers is not reaching the users behind the firewall. The engineer later concludes that the maximum transmission unit (MTU) on an upstream router interface is set to 1400 bytes.

The engineer reviews the following CLI output for ethernet1/1.

Which setting should be modified on ethernet1/1 to remedy this problem?

A.
Lower the interface MTU value below 1500.
A.
Lower the interface MTU value below 1500.
Answers
B.
Enable the Ignore IPv4 Don't Fragment (DF) setting.
B.
Enable the Ignore IPv4 Don't Fragment (DF) setting.
Answers
C.
Change the subnet mask from /23 to /24.
C.
Change the subnet mask from /23 to /24.
Answers
D.
Adjust the TCP maximum segment size (MSS) value. *
D.
Adjust the TCP maximum segment size (MSS) value. *
Answers
Suggested answer: D

Explanation:


An engineer is reviewing the following high availability (HA) settings to understand a recent HAfailover event.

Which timer determines the frequency between packets sent to verify that the HA functionality on the other HA firewall is operational?

A.
Monitor Fail Hold Up Time
A.
Monitor Fail Hold Up Time
Answers
B.
Promotion Hold Time
B.
Promotion Hold Time
Answers
C.
Heartbeat Interval
C.
Heartbeat Interval
Answers
D.
Hello Interval
D.
Hello Interval
Answers
Suggested answer: D

Explanation:

The timer that determines the frequency between packets sent to verify that the HA functionality on the other HA firewall is operational is the Hello Interval. The Hello Interval is the interval in milliseconds between hello packets that are sent to check the HA status of the peer firewall. The default value for the Hello Interval is 8000 ms for all platforms, and the range is 8000-60000 ms.If the firewall does not receive a hello packet from its peer within the specified interval, it will declare the peer as failed and initiate a failover12.Reference:HA Timers,Layer 3 High Availability with Optimal Failover Times Best Practices

Total 426 questions
Go to page: of 43