ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











An administrator has been tasked with configuring decryption policies,

Which decryption best practice should they consider?

A.
Consider the local, legal, and regulatory implications and how they affect which traffic can be decrypted.
A.
Consider the local, legal, and regulatory implications and how they affect which traffic can be decrypted.
Answers
B.
Decrypt all traffic that traverses the firewall so that it can be scanned for threats.
B.
Decrypt all traffic that traverses the firewall so that it can be scanned for threats.
Answers
C.
Place firewalls where administrators can opt to bypass the firewall when needed.
C.
Place firewalls where administrators can opt to bypass the firewall when needed.
Answers
D.
Create forward proxy decryption rules without Decryption profiles for unsanctioned applications.
D.
Create forward proxy decryption rules without Decryption profiles for unsanctioned applications.
Answers
Suggested answer: A

Explanation:

The best decryption best practice that the administrator should consider isA: Consider the local, legal, and regulatory implications and how they affect which traffic can be decrypted.This is because decryption involves intercepting and inspecting encrypted traffic, which may raise privacy and compliance issues depending on the jurisdiction and the type of traffic1.Therefore, the administrator should be aware of the local, legal, and regulatory implications and how they affect which traffic can be decrypted, and follow the appropriate guidelines and policies to ensure that decryption is done in a lawful and ethical manner1.

An engineer needs to configure a standardized template for all Panorama-managed firewalls. These settings will be configured on a template named 'Global' and will be included in all template stacks.

Which three settings can be configured in this template? (Choose three.)

A.
Log Forwarding profile
A.
Log Forwarding profile
Answers
B.
SSL decryption exclusion
B.
SSL decryption exclusion
Answers
C.
Email scheduler
C.
Email scheduler
Answers
D.
Login banner
D.
Login banner
Answers
E.
Dynamic updates
E.
Dynamic updates
Answers
Suggested answer: B, D, E

Explanation:

A template is a set of configuration options that can be applied to one or more firewalls or virtual systems managed by Panorama.A template can include settings from the Device and Network tabs on the firewall web interface, such as login banner, SSL decryption exclusion, and dynamic updates4. These settings can be configured in a template named ''Global'' and included in all template stacks.A template stack is a group of templates that Panorama pushes to managed firewalls in an ordered hierarchy4.Reference:Manage Templates and Template Stacks, PCNSE Study Guide (page 50)

An engineer is monitoring an active/active high availability (HA) firewall pair.

Which HA firewall state describes the firewall that is currently processing traffic?

A.
Initial
A.
Initial
Answers
B.
Passive
B.
Passive
Answers
C.
Active
C.
Active
Answers
D.
Active-primary
D.
Active-primary
Answers
Suggested answer: D

Explanation:


When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?

A.
Set the passive link state to shutdown'.
A.
Set the passive link state to shutdown'.
Answers
B.
Disable config sync.
B.
Disable config sync.
Answers
C.
Disable the HA2 link.
C.
Disable the HA2 link.
Answers
D.
Disable HA.
D.
Disable HA.
Answers
Suggested answer: B

Explanation:

To prevent the import from affecting ongoing traffic when you import the configuration of an HA pair into Panorama, you should disable config sync on both firewalls. Config sync is a feature that enables the firewalls in an HA pair to synchronize their configurations and maintain consistency. However, when you import the configuration of an HA pair into Panorama, you want to avoid any changes to the firewall configuration until you verify and commit the imported configuration on Panorama.Therefore, you should disable config sync before importing the configuration, and re-enable it after committing the changes on Panorama12.Reference:Migrate a Firewall HA Pair to Panorama Management, PCNSE Study Guide (page 50)

An engineer is troubleshooting a traffic-routing issue.

What is the correct packet-flow sequence?

A.
PBF > Zone Protection Profiles > Packet Buffer Protection
A.
PBF > Zone Protection Profiles > Packet Buffer Protection
Answers
B.
BGP > PBF > NAT
B.
BGP > PBF > NAT
Answers
C.
PBF > Static route > Security policy enforcement
C.
PBF > Static route > Security policy enforcement
Answers
D.
NAT > Security policy enforcement > OSPF
D.
NAT > Security policy enforcement > OSPF
Answers
Suggested answer: C

Explanation:

The correct packet-flow sequence is C. PBF > Static route > Security policy enforcement. This sequence describes the order of operations that the firewall performs when processing a packet. PBF stands for Policy-Based Forwarding, which is a feature that allows the firewall to override the routing table and forward traffic based on the source and destination addresses, application, user, or service. PBF is evaluated before the static route lookup, which is the default method of forwarding traffic based on the destination address and the longest prefix match.Security policy enforcement is the stage where the firewall applies the security policy rules to allow or block traffic based on various criteria, such as zone, address, port, user, application, etc12.Reference:Policy-Based Forwarding,Packet Flow Sequence in PAN-OS

A consultant advises a client on designing an explicit Web Proxy deployment on PAN-OS 11 0 The client currently uses RADIUS authentication in their environment

Which two pieces of information should the consultant provide regarding Web Proxy authentication? (Choose two.)

A.
Kerberos or SAML authentication need to be configured
A.
Kerberos or SAML authentication need to be configured
Answers
B.
LDAP or TACACS+ authentication need to be configured
B.
LDAP or TACACS+ authentication need to be configured
Answers
C.
RADIUS is only supported for a transparent Web Proxy.
C.
RADIUS is only supported for a transparent Web Proxy.
Answers
D.
RADIUS is not supported for explicit or transparent Web Proxy
D.
RADIUS is not supported for explicit or transparent Web Proxy
Answers
Suggested answer: A, D

Explanation:

For explicit Web Proxy deployment on PAN-OS, Palo Alto Networks currently supports Kerberos and SAML as authentication methods. RADIUS is not supported for explicit or transparent Web Proxy authentication on Palo Alto Networks appliances, which means that if the client is currently using RADIUS, they will need to configure an alternate supported authentication method. LDAP or TACACS+ authentication is not directly supported for Web Proxy authentication in PAN-OS. For more information on supported Web Proxy authentication methods, please refer to the latest Palo Alto Networks 'PAN-OS Web Interface Reference Guide'.

A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.

How should email log forwarding be configured to achieve this goal?

A.
With the relevant configuration log filter inside Device > Log Settings
A.
With the relevant configuration log filter inside Device > Log Settings
Answers
B.
With the relevant system log filter inside Objects > Log Forwarding
B.
With the relevant system log filter inside Objects > Log Forwarding
Answers
C.
With the relevant system log filter inside Device > Log Settings
C.
With the relevant system log filter inside Device > Log Settings
Answers
D.
With the relevant configuration log filter inside Objects > Log Forwarding
D.
With the relevant configuration log filter inside Objects > Log Forwarding
Answers
Suggested answer: C

Explanation:

To generate email alerts when decryption rules are changed in a Palo Alto Networks firewall, you would configure email log forwarding based on specific system logs that capture changes to decryption policies. This is done by setting up log forwarding profiles with filters that match events related to decryption rule modifications. These profiles are then applied to the relevant log types within the firewall's log settings.

To specifically monitor for changes to decryption rules, you would navigate to the Device > Log Settings section of the firewall's web interface. Here, you can configure log forwarding for system logs, which capture configuration changes among other system-level events. By creating a filter that looks for logs associated with decryption rule changes, and associating this filter with an email server profile, the firewall can automatically send out email alerts whenever a decryption rule is modified.

This setup ensures that the security team is promptly notified of any changes to the decryption policies, allowing for quick review and action if the changes were unauthorized or unintended. It is an essential part of maintaining the security posture of the network and ensuring compliance with organizational policies on encrypted traffic inspection.

A firewall administrator is configuring an IPSec tunnel between Site A and Site B. The Site A firewall uses a DHCP assigned address on the outside interface of the firewall, and the Site B firewall uses a static IP address assigned to the outside interface of the firewall. However, the use of dynamic peering is not working.

Refer to the two sets of configuration settings provided. Which two changes will allow the configurations to work? (Choose two.)

Site A configuration:

A.
Enable NAT Traversal on Site B firewall
A.
Enable NAT Traversal on Site B firewall
Answers
B.
Configure Local Identification on Site firewall
B.
Configure Local Identification on Site firewall
Answers
C.
Disable passive mode on Site A firewall
C.
Disable passive mode on Site A firewall
Answers
D.
Match IKE version on both firewalls.
D.
Match IKE version on both firewalls.
Answers
Suggested answer: C, D

Explanation:

The image shows an IKE Gateway configuration where Site B is set to IKEv1 only mode, and passive mode is not enabled. For dynamic peering to work when Site A is using a DHCP assigned address:

Passive mode on Site A needs to be disabled. In passive mode, the firewall will not initiate the IKE negotiation and will only respond to negotiation requests from the peer. Since Site A has a dynamic IP, it must be able to initiate the connection to Site B, which has a static IP.

Matching the IKE version between Site A and Site B is also necessary for successful IPSec tunnel establishment. Since Site B is set to IKEv1 only mode, Site A also needs to be configured to use IKEv1 to ensure that both sites are using the same version for the IKE negotiation process.

NAT Traversal is used when there are NAT devices between the two endpoints, but there's no indication that this is the case here. Additionally, local identification on Site A is not necessarily related to the issue with dynamic peering not working.

A firewall administrator configures the HIP profiles on the edge firewall where GlobalProtect is enabled, and adds the profiles to security rules. The administrator wants to redistribute the HIP reports to the data center firewalls to apply the same access restrictions using HIP profiles. However, the administrator can only see the HIP match logs on the edge firewall but not on the data center firewall

What are two reasons why the administrator is not seeing HIP match logs on the data center firewall? (Choose two.)

A.
Log Forwarding Profile is configured but not added to security rules in the data center firewall.
A.
Log Forwarding Profile is configured but not added to security rules in the data center firewall.
Answers
B.
HIP profiles are configured but not added to security rules in the data center firewall.
B.
HIP profiles are configured but not added to security rules in the data center firewall.
Answers
C.
User ID is not enabled in the Zone where the users are coming from in the data center firewall.
C.
User ID is not enabled in the Zone where the users are coming from in the data center firewall.
Answers
D.
HIP Match log forwarding is not configured under Log Settings in the device tab.
D.
HIP Match log forwarding is not configured under Log Settings in the device tab.
Answers
Suggested answer: B, C

Explanation:

For HIP match logs to be visible on the data center firewall, the following conditions must be met:

HIP profiles added to security rules: HIP profiles must be applied to security rules on the data center firewall to enforce access restrictions based on the received HIP reports. If the HIP profiles are not associated with the security rules, the firewall will not evaluate traffic against these profiles, and consequently, no HIP match logs will be generated.

User-ID enabled on the incoming zone: User-ID must be enabled on the zone where the users are located in the data center firewall. The User-ID feature is responsible for mapping IP addresses to user names, which is critical for applying policies based on user identity and, by extension, for HIP-based policy enforcement.

The other options (A and D) are related to logging and log forwarding but would not directly impact the generation or visibility of HIP match logs on the data center firewall itself.

Why are external zones required to be configured on a Palo Alto Networks NGFW in an environment with multiple virtual systems?

A.
To allow traffic between zones in different virtual systems without the traffic leaving the appliance
A.
To allow traffic between zones in different virtual systems without the traffic leaving the appliance
Answers
B.
To allow traffic between zones in different virtual systems while the traffic is leaving the appliance
B.
To allow traffic between zones in different virtual systems while the traffic is leaving the appliance
Answers
C.
External zones are required because the same external zone can be used on different virtual systems
C.
External zones are required because the same external zone can be used on different virtual systems
Answers
D.
Multiple external zones are required in each virtual system to allow the communications between virtual systems
D.
Multiple external zones are required in each virtual system to allow the communications between virtual systems
Answers
Suggested answer: B

Explanation:


Total 426 questions
Go to page: of 43