Palo Alto Networks PCNSE Exam Practice Questions (P. 2)
- Full Access (619 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which method will dynamically register tags on the Palo Alto Networks NGFW?
- ARestful API or the VMware API on the firewall or on the User-ID agent or the ready-only domain controller (RODC)
- BRestful API or the VMware API on the firewall or on the User-ID agent
- CXML API or the VMware API on the firewall or on the User-ID agent or the CLI
- DXML API or the VM Monitoring agent on the NGFW or on the User-ID agentMost Voted
Correct Answer:
D
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/register-ip-addresses-and-tags-dynamically
D
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/register-ip-addresses-and-tags-dynamically
send
light_mode
delete
Question #12
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?
- AConfigure the option for ג€Thresholdג€.Most Voted
- BDisable automatic updates during weekdays.
- CAutomatically ג€download onlyג€ and then install Applications and Threats later, after the administrator approves the update.
- DAutomatically ג€download and installג€ but with the ג€disable new applicationsג€ option used.
Correct Answer:
A
A

The correct approach to scheduling an Applications and Threats dynamic update while introducing a delay in the installation is by setting up a threshold that dictates how long the system should wait before proceeding with the installation after the update has been downloaded. This allows an administrator to configure an automatic delay, ensuring that updates are not immediately applied, providing a window to address any potential compatibility or security concerns. This setup can be crucial for maintaining stability and security in sensitive or high-stakes environments.
send
light_mode
delete
Question #13
To connect the Palo Alto Networks firewall to AutoFocus, which setting must be enabled?
- ADevice>Setup>Services>AutoFocus
- BDevice> Setup>Management >AutoFocusMost Voted
- CAutoFocus is enabled by default on the Palo Alto Networks NGFW
- DDevice>Setup>WildFire>AutoFocus
- EDevice>Setup> Management> Logging and Reporting Settings
Correct Answer:
B
Reference:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/getting-started/enable-autofocus-threat-intelligence
B
Reference:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/getting-started/enable-autofocus-threat-intelligence
send
light_mode
delete
Question #14
An administrator encountered problems with inbound decryption. Which option should the administrator investigate as part of triage?
- ASecurity policy rule allowing SSL to the target serverMost Voted
- BFirewall connectivity to a CRL
- CRoot certificate imported into the firewall with ג€Trustג€ enabled
- DImportation of a certificate from an HSM
Correct Answer:
A
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/configure-ssl-inbound-inspection
A
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/configure-ssl-inbound-inspection
send
light_mode
delete
Question #15
Which two virtualization platforms officially support the deployment of Palo Alto Networks VM-Series firewalls? (Choose two.)
- ARed Hat Enterprise Virtualization (RHEV)
- BKernel Virtualization Module (KVM)Most Voted
- CBoot Strap Virtualization Module (BSVM)
- DMicrosoft Hyper-VMost Voted
Correct Answer:
BD
Reference:
https://www.paloaltonetworks.com/products/secure-the-network/virtualized-next-generation-firewall/vm-series
BD
Reference:
https://www.paloaltonetworks.com/products/secure-the-network/virtualized-next-generation-firewall/vm-series
send
light_mode
delete
Question #16
Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OSֲ® software?
- AXML APIMost Voted
- BPort Mapping
- CClient Probing
- DServer Monitoring
Correct Answer:
D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users
D
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users
send
light_mode
delete
Question #17
Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?
- Aweb-browsing and 443Most Voted
- BSSL and 80
- CSSL and 443
- Dweb-browsing and 80
Correct Answer:
A
A

The correct answer is indeed A. Initially, traffic to https://www.microsoft.com is identified as SSL due to its encrypted nature on port 443. Once decrypted by the firewall's SSL decryption feature, the application is recognized as web-browsing while still using port 443. This phenomenon is referred to as application shift, where post-decryption, the true nature of the application is revealed without altering the service port. Thus, decrypted packets from the website appear as "web-browsing" and continue to use port 443 in the Traffic log. This detailed explanation aligns perfectly with how Palo Alto Networks products handle encrypted traffic.
send
light_mode
delete
Question #18
Which PAN-OSֲ® policy must you configure to force a user to provide additional credentials before he is allowed to access an internal application that contains highly-sensitive business data?
- ASecurity policy
- BDecryption policy
- CAuthentication policyMost Voted
- DApplication Override policy
Correct Answer:
C
C

To properly control access to sensitive internal applications, configuring an Authentication policy on PAN-OS is essential. This policy mandates users to authenticate themselves whenever they try to access specified services or applications. By setting up rules within this policy, administrators can specify the required authentication method, such as passwords, biometric verification, or multi-factor authentication, effectively safeguarding sensitive data by ensuring that only authorized users gain access.
send
light_mode
delete
Question #19
A Security policy rule is configured with a Vulnerability Protection Profile and an action of `Deny`.
Which action will this cause configuration on the matched traffic?
Which action will this cause configuration on the matched traffic?
- AThe configuration is invalid. The Profile Settings section will be grayed out when the Action is set to ג€Denyג€.
- BThe configuration will allow the matched session unless a vulnerability signature is detected. The ג€Denyג€ action will supersede the per-severity defined actions defined in the associated Vulnerability Protection Profile.
- CThe configuration is invalid. It will cause the firewall to skip this Security policy rule. A warning will be displayed during a commit.
- DThe configuration is valid. It will cause the firewall to deny the matched sessions. Any configured Security Profiles have no effect if the Security policy rule action is set to ג€Denyג€.Most Voted
Correct Answer:
D
Reference:
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/security-policy/security-policy-actions
D
Reference:
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/security-policy/security-policy-actions
send
light_mode
delete
Question #20
A user's traffic traversing a Palo Alto Networks NGFW sometimes can reach http://www.company.com. At other times the session times out. The NGFW has been configured with a PBF rule that the user's traffic matches when it goes to http://www.company.com.
How can the firewall be configured automatically disable the PBF rule if the next hop goes down?
How can the firewall be configured automatically disable the PBF rule if the next hop goes down?
- ACreate and add a Monitor Profile with an action of Wait Recover in the PBF rule in question.
- BCreate and add a Monitor Profile with an action of Fail Over in the PBF rule in question.Most Voted
- CEnable and configure a Link Monitoring Profile for the external interface of the firewall.
- DConfigure path monitoring for the next hop gateway on the default route in the virtual router.
Correct Answer:
B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/network/network-network-profiles-monitor#
B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/network/network-network-profiles-monitor#
send
light_mode
delete
All Pages