ExamGecko

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











When backing up and saving configuration files, what is achieved using only the firewall and is not available in Panorama?

A.
Export device state
A.
Export device state
Answers
B.
Load configuration version
B.
Load configuration version
Answers
C.
Load named configuration snapshot
C.
Load named configuration snapshot
Answers
D.
Save candidate config
D.
Save candidate config
Answers
Suggested answer: A

An engineer is reviewing policies after a PAN-OS upgrade What are the two differences between Highlight Unused Rules and the Rule Usage Hit counters immediately after a reboot?

A.
Highlight Unused Rules will highlight all rules.
A.
Highlight Unused Rules will highlight all rules.
Answers
B.
Highlight Unused Rules will highlight zero rules.
B.
Highlight Unused Rules will highlight zero rules.
Answers
C.
Rule Usage Hit counter will not be reset
C.
Rule Usage Hit counter will not be reset
Answers
D.
Rule Usage Hit counter will reset
D.
Rule Usage Hit counter will reset
Answers
Suggested answer: A, C

An administrator needs to gather information about the CPU utilization on both the management plane and the data plane. Where does the administrator view the desired data?

A.
Support > Resources
A.
Support > Resources
Answers
B.
Application Command and Control Center
B.
Application Command and Control Center
Answers
C.
Resources Widget on the Dashboard
C.
Resources Widget on the Dashboard
Answers
D.
Monitor > Utilization
D.
Monitor > Utilization
Answers
Suggested answer: C

Which are valid ACC GlobalProtect Activity tab widgets? (Choose two.)

A.
Successful GlobalProtect Deployed Activity
A.
Successful GlobalProtect Deployed Activity
Answers
B.
GlobalProtect Deployment Activity
B.
GlobalProtect Deployment Activity
Answers
C.
GlobalProtect Quarantine Activity
C.
GlobalProtect Quarantine Activity
Answers
D.
Successful GlobalProtect Connection Activity
D.
Successful GlobalProtect Connection Activity
Answers
Suggested answer: B, D

Which link is responsible for synchronizing sessions between high availability (HA) peers?

A.
HA1
A.
HA1
Answers
B.
HA3
B.
HA3
Answers
C.
HA4
C.
HA4
Answers
D.
HA2
D.
HA2
Answers
Suggested answer: D

What are three prerequisites for credential phishing prevention to function? (Choose three.)

A.
In the URL filtering profile, use the drop-down list to enable user credential detection.
A.
In the URL filtering profile, use the drop-down list to enable user credential detection.
Answers
B.
Enable Device-ID in the zone.
B.
Enable Device-ID in the zone.
Answers
C.
Select the action for Site Access for each category.
C.
Select the action for Site Access for each category.
Answers
D.
Add the URL filtering profile to one or more Security policy rules.
D.
Add the URL filtering profile to one or more Security policy rules.
Answers
E.
Set phishing category to block in the URL Filtering profile.
E.
Set phishing category to block in the URL Filtering profile.
Answers
Suggested answer: A, D, E

An engineer is tasked with decrypting web traffic in an environment without an established PKI When using a self-signed certificate generated on the firewall which type of certificate should be in? approved web traffic?

A.
An Enterprise Root CA certificate
A.
An Enterprise Root CA certificate
Answers
B.
The same certificate as the Forward Trust certificate
B.
The same certificate as the Forward Trust certificate
Answers
C.
A Public Root CA certificate
C.
A Public Root CA certificate
Answers
D.
The same certificate as the Forward Untrust certificate
D.
The same certificate as the Forward Untrust certificate
Answers
Suggested answer: B

A network security engineer is going to enable Zone Protection on several security zones How can the engineer ensure that Zone Protection events appear in the firewall's logs?

A.
Select the check box 'Log packet-based attack events' in the Zone Protection profile
A.
Select the check box 'Log packet-based attack events' in the Zone Protection profile
Answers
B.
No action is needed Zone Protection events appear in the threat logs by default
B.
No action is needed Zone Protection events appear in the threat logs by default
Answers
C.
Select the check box 'Log Zone Protection events' in the Content-ID settings of the firewall
C.
Select the check box 'Log Zone Protection events' in the Content-ID settings of the firewall
Answers
D.
Access the CLI in each firewall and enter the command set system setting additional-threat-log on
D.
Access the CLI in each firewall and enter the command set system setting additional-threat-log on
Answers
Suggested answer: A

A firewall engineer is managing a Palo Alto Networks NGFW that does not have the DHCP server on DHCP agent configuration. Which interface mode can the broadcast DHCP traffic?

A.
Virtual ware
A.
Virtual ware
Answers
B.
Tap
B.
Tap
Answers
C.
Layer 2
C.
Layer 2
Answers
D.
Layer 3
D.
Layer 3
Answers
Suggested answer: B

What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure an SSL/TLS connection'?

A.
certificates
A.
certificates
Answers
B.
profiles
B.
profiles
Answers
C.
link state
C.
link state
Answers
D.
stateful firewall connection
D.
stateful firewall connection
Answers
Suggested answer: A
Total 426 questions
Go to page: of 43