ExamGecko
Home / Palo Alto Networks / PCNSE / List of questions
Ask Question

Palo Alto Networks PCNSE Practice Test - Questions Answers, Page 48

Add to Whishlist

List of questions

Question 471

Report Export Collapse

What must be taken into consideration when preparing a log forwarding design for all of a customer's deployed Palo Alto Networks firewalls?

Become a Premium Member for full access
  Unlock Premium Member

Question 472

Report Export Collapse

An auditor is evaluating the configuration of Panorama and notices a discrepancy between the Panorama template and the local firewall configuration. When overriding the firewall configuration pushed from Panorama, what should you consider?

Become a Premium Member for full access
  Unlock Premium Member

Question 473

Report Export Collapse

Panorama is being used to upgrade the PAN-OS version on a pair of firewalls in an active/passive high availability (HA) configuration. The Palo Alto Networks best practice upgrade steps have been completed in Panorama (Panorama upgraded, backups made, content updates, and disabling 'Preemptive' pushed), and the firewalls are ready for upgrade. What is the next best step to minimize downtime and ensure a smooth transition?

Become a Premium Member for full access
  Unlock Premium Member

Question 474

Report Export Collapse

Users have reported an issue when they are trying to access a server on your network. The requests aren't taking the expected route. You discover that there are two different static routes on the firewall for the server. What is used to determine which route has priority?

Become a Premium Member for full access
  Unlock Premium Member

Question 475

Report Export Collapse

A customer requires that virtual systems with separate virtual routers can communicate with one another within a Palo Alto Networks firewall. In addition to confirming Security policies, which three configurations will accomplish this goal? (Choose three)

Become a Premium Member for full access
  Unlock Premium Member

Question 476

Report Export Collapse

A firewall architect is attempting to install a new Palo Alto Networks NGFW. The company has previously had issues moving all administrative functions onto a data plane interface to meet the design limitations of the environment. The architect is able to access the device for HTTPS and SSH; however, the NGFW can neither validate licensing nor get updates. Which action taken by the architect will resolve this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 477

Report Export Collapse

A company CISO updates the business Security policy to identify vulnerable assets and services and deploy protection for quantum-related attacks. As a part of this update, the firewall team is reviewing the cryptography used by any devices they manage. The firewall architect is reviewing the Palo Alto Networks NGFWs for their VPN tunnel configurations. It is noted in the review that the NGFWs are running PAN-OS 11.2. Which two NGFW settings could the firewall architect recommend to deploy protections per the new policy? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 478

Report Export Collapse

How can a firewall be set up to automatically block users as soon as they are found to exhibit malicious behavior via a threat log?

Become a Premium Member for full access
  Unlock Premium Member

Question 479

Report Export Collapse

A firewall engineer is migrating port-based rules to application-based rules by using the Policy Optimizer. The engineer needs to ensure that the new application-based rules are future-proofed, and that they will continue to match if the existing signatures for a specific application are expanded with new child applications. Which action will meet the requirement while ensuring that traffic unrelated to the specific application is not matched?

Become a Premium Member for full access
  Unlock Premium Member

Question 480

Report Export Collapse

The vulnerability protection profile of an on-premises Palo Alto Networks firewall is triggering on a common Threat ID, and it has been determined to be a false positive. The issue causes an outage of a critical service. When the vulnerability protection profile is opened to add the exception, the Threat ID is missing. Which action will most efficiently find and implement the exception?

Become a Premium Member for full access
  Unlock Premium Member
Total 499 questions
Go to page: of 50
Search

Related questions