ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











If a URL is in multiple custom URL categories with different actions, which action will take priority?

A.
Allow
A.
Allow
Answers
B.
Override
B.
Override
Answers
C.
Block
C.
Block
Answers
D.
Alert
D.
Alert
Answers
Suggested answer: C

Explanation:

When a URL matches multiple categories, the category chosen is the one that has the most severe action defined below (block being most severe and allow least severe).

1 block

2 override

3 continue

4 alert

5 allow

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClsmCAC

Which three options does Panorama offer for deploying dynamic updates to its managed devices? (Choose three.)

A.
Check dependencies
A.
Check dependencies
Answers
B.
Schedules
B.
Schedules
Answers
C.
Verify
C.
Verify
Answers
D.
Revert content
D.
Revert content
Answers
E.
Install
E.
Install
Answers
Suggested answer: B, D, E

Explanation:

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/panorama-web-interface/panorama-device-deployment/manage-software-and-content-updates

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/panorama-web-interface/panorama-device-deployment/panorama-dynamic-updates-revert-content

Given the following snippet of a WildFire submission log, did the end user successfully download a file?

A.
No, because the URL generated an alert.
A.
No, because the URL generated an alert.
Answers
B.
Yes, because both the web-browsing application and the flash file have the 'alert' action.
B.
Yes, because both the web-browsing application and the flash file have the 'alert' action.
Answers
C.
Yes, because the final action is set to 'allow.''
C.
Yes, because the final action is set to 'allow.''
Answers
D.
No, because the action for the wildfire-virus is 'reset-both.'
D.
No, because the action for the wildfire-virus is 'reset-both.'
Answers
Suggested answer: D

Explanation:

Based on the snippet of the WildFire submission log provided, it appears that the end user was able to successfully download a file. The key indicator here is that the final action for the web-browsing application and the flash file is set to ''allow.'' This means that despite any alerts or other actions taken earlier in the process, the ultimate decision was to allow the file to be downloaded.

Which two key exchange algorithms consume the most resources when decrypting SSL traffic? (Choose two.)

A.
ECDSA
A.
ECDSA
Answers
B.
ECDHE
B.
ECDHE
Answers
C.
RSA
C.
RSA
Answers
D.
DHE
D.
DHE
Answers
Suggested answer: B, D

Explanation:

The two key exchange algorithms that consume the most resources when decrypting SSL traffic are ECDHE and DHE. These are both Diffie-Hellman based algorithms that enable perfect forward secrecy (PFS), which means that they generate a new and unique session key for each SSL/TLS session, and do not reuse any previous keys. This enhances the security of the encrypted communication, but also increases the computational cost and complexity of the key exchange process. ECDHE stands for Elliptic Curve Diffie-Hellman Ephemeral, which uses elliptic curve cryptography (ECC) to generate the session key. DHE stands for Diffie-Hellman Ephemeral, which uses modular arithmetic to generate the session key.Both ECDHE and DHE require more CPU and memory resources than RSA, which is a non-PFS algorithm that uses public and private keys to encrypt and decrypt the session key123.Reference:Key Exchange Algorithms,Best Practices for Enabling SSL Decryption, PCNSE Study Guide (page 60)

An engineer troubleshoots a high availability (HA) link that is unreliable.

Where can the engineer view what time the interface went down?

A.
Monitor > Logs > System
A.
Monitor > Logs > System
Answers
B.
Device > High Availability > Active/Passive Settings
B.
Device > High Availability > Active/Passive Settings
Answers
C.
Monitor > Logs > Traffic
C.
Monitor > Logs > Traffic
Answers
D.
Dashboard > Widgets > High Availability
D.
Dashboard > Widgets > High Availability
Answers
Suggested answer: C

Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oNlUCAU&lang=en_US

An engineer troubleshoots a Panorama-managed firewall that is unable to reach the DNS servers configured via a global template. As a troubleshooting step, the engineer needs to configure a local DNS server in place of the template value.

Which two actions can be taken to ensure that only the specific firewall is affected during this process? (Choose two )

A.
Configure the DNS server locally on the firewall.
A.
Configure the DNS server locally on the firewall.
Answers
B.
Change the DNS server on the global template.
B.
Change the DNS server on the global template.
Answers
C.
Override the DNS server on the template stack.
C.
Override the DNS server on the template stack.
Answers
D.
Configure a service route for DNS on a different interface.
D.
Configure a service route for DNS on a different interface.
Answers
Suggested answer: A, C

Explanation:

To override a device and network setting applied by a template, you can either configure the setting locally on the firewall or override the setting on the template stack. Configuring the setting locally on the firewall will copy the setting to the local configuration of the device and will no longer be controlled by the template. Overriding the setting on the template stack will apply the setting to all the firewalls that are assigned to the template stack, unless the setting is also overridden locally on a firewall. Changing the setting on the global template will affect all the firewalls that inherit the setting from the template, which is not desirable in this scenario. Configuring a service route for DNS on a different interface will not change the DNS server address, but only the interface that the firewall uses to reach the DNS server.Reference:

Override a Template Setting

How to override panorama pushed template configuration on the local firewall

Overriding Panorama Template settings

If an administrator wants to apply QoS to traffic based on source, what must be specified in a QoS policy rule?

A.
Post-NAT destination address
A.
Post-NAT destination address
Answers
B.
Pre-NAT destination address
B.
Pre-NAT destination address
Answers
C.
Post-NAT source address
C.
Post-NAT source address
Answers
D.
Pre-NAT source address
D.
Pre-NAT source address
Answers
Suggested answer: C

Explanation:

If an administrator wants to apply QoS to traffic based on source, they must specify the post-NAT source address in a QoS policy rule. This is because QoS is enforced on traffic as it egresses the firewall, and the firewall applies NAT rules before QoS rules. Therefore, the firewall will match the QoS policy rule based on the translated source address, not the original source address. If the administrator uses the pre-NAT source address in the QoS policy rule, the firewall will not be able to identify the traffic correctly and apply the desired QoS treatment.Reference:

QoS Policy

Configure QoS

An engineer is configuring a Protection profile to defend specific endpoints and resources against malicious activity.

The profile is configured to provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet.

Which profile is the engineer configuring?

A.
Packet Buffer Protection
A.
Packet Buffer Protection
Answers
B.
Zone Protection
B.
Zone Protection
Answers
C.
Vulnerability Protection
C.
Vulnerability Protection
Answers
D.
DoS Protection
D.
DoS Protection
Answers
Suggested answer: D

Explanation:

The engineer is configuring a DoS Protection profile to defend specific endpoints and resources against malicious activity. A DoS Protection profile is a feature that enables the firewall to detect and prevent denial-of-service (DoS) attacks that attempt to overwhelm network resources or disrupt services. A DoS Protection profile can provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet, such as web servers, DNS servers, or VPN gateways.A DoS Protection profile can be applied to a security policy rule that matches the traffic to and from the protected systems, and can specify the thresholds and actions for different types of flood attacks, such as SYN, UDP, ICMP, or other IP floods12.Reference:DoS Protection, PCNSE Study Guide (page 58)

An engineer is monitoring an active/active high availability (HA) firewall pair.

Which HA firewall state describes the firewall that is experiencing a failure of a monitored path?

A.
Initial
A.
Initial
Answers
B.
Tentative
B.
Tentative
Answers
C.
Passive
C.
Passive
Answers
D.
Active-secondary
D.
Active-secondary
Answers
Suggested answer: B

Explanation:

In an active/active high availability (HA) firewall pair, when a firewall experiences a failure of a monitored path, it enters the ''Tentative'' state1. This state indicates that the firewall is synchronizing sessions and configurations from its peer due to a failure or a change in monitored objects such as a link or path. The firewall in this state is not fully functional but is working towards resuming normal operations by syncing with its peer. Therefore, the correct answer is B. Tentative.

You are auditing the work of a co-worker and need to verify that they have matched the Palo Alto Networks Best Practices for Anti-Spyware Profiles.

For which three severity levels should single-packet captures be enabled to meet the Best Practice standard? (Choose three.)

A.
Low
A.
Low
Answers
B.
High
B.
High
Answers
C.
Critical
C.
Critical
Answers
D.
Informational
D.
Informational
Answers
E.
Medium
E.
Medium
Answers
Suggested answer: B, C, E

Explanation:

https://docs.paloaltonetworks.com/best-practices/10-2/data-center-best-practices/data-center-best-practice-security-policy/how-to-create-data-center-best-practice-security-profiles/create-the-data-center-best-practice-anti-spyware-profile

The Palo Alto Networks Best Practices for Anti-Spyware Profiles recommend enabling single-packet captures (PCAP) for medium, high, and critical severity threats. This allows for capturing the first packet of the malicious traffic for further analysis and investigation.PCAP should not be enabled for low and informational severity threats, as they generate a relatively high volume of traffic and are not particularly useful compared to potential threats2.Reference:Create the Data Center Best Practice Anti-Spyware Profile,Security Profile: Anti-Spyware, PCNSE Study Guide (page 57)

Total 426 questions
Go to page: of 43