==

Palo Alto Networks - PCNSE Practice Questions





Test - PCNSE Practice Questions


PCNSE Practice Questions 




Question 1 of 60. 
Why is “Browsing to IP domains” an event that appears in the Botnet report?

Only a newly-created website could have an IP address but not a URL, and newly- created websites are statistically more likely to provide command-and-control services that connect to malware.  
IP domains are frequently used by command-and-control servers that have been blocked from becoming part of either a DNS domain or a Windows domain.  
Web browsing to an IP address instead of a URL may indicate an attempt to avoid proper categorization when traffic passes through a URL Filtering system.  
Web browsing to an IP address is not possible and is an indicator of a possible attempt to tunnel other applications through TCP port 80.  


Mark for follow up



Question 2 of 60. 
A network administrator needs to view the default action for a specific spyware signature. The administrator follows the tabs and menus through Objects > Security Profiles > Anti-Spyware, and selects the default Profile. What should be done next?

Nothing more is necessary. The actions already will be displayed with their default values.  
Click the Rules tab and then look for rules with "default" in the Action column.  
Click the Exceptions tab and then click Show all signatures.  
The default actions will be displayed in the Action column.  


Mark for follow up



Question 3 of 60. 
Which feature of the Palo Alto Networks firewall was designed to minimize network latency on the data plane?

Multi-Pass Packet Stream Processing Engine  
Single-Pass Parallel Processing Architecture  
Automated Dynamic Content Update Scheduler  
Standard XML-formatted configuration file  


Mark for follow up



Question 4 of 60. 
A company uses Active Directory and RADIUS to capture User-ID information and implement user-based policies to control web access. Many Linux and Mac computers in the environment that do not have IP-address-to-user mappings. What is the best way to collect user information for those systems?

Install the User-ID agent on the systems to collect user information  
Install a Terminal Services agent in the environment  
Load the GlobalProtect client and connect to the company GlobalProtect environment  
Use Captive Portal to capture user information  


Mark for follow up



Question 5 of 60. 

Each week, a company wants to know the list of employees in the "mgt" group who are the biggest users of network bandwidth. Assume that the "mgt" group is properly configured on the company's Domain Controller, and that User-ID also is configured correctly. The firewall administrator starts to create the Custom report shown above: What must the administrator do or change to complete this Custom report?

'Application Statistics' must be selected from the 'Database' option.  
'Last 24 Hrs' must be selected from the 'Time Frame' option.  
'Source User' must be selected from the 'Available Columns' option.  
Explicitly set the 'Sort By' option.  


Mark for follow up



Question 6 of 60. 
Which two authentication methods are supported in PAN-OS software when using SSH to manage a device? (Choose two.)

PublicKeyAuthentication  
RADIUS  
Certificate-basedAuthentication  
NTLM  
   

Mark for follow up



Question 7 of 60. 
A website is presenting an RSA 2048-bit key. By default, what will the size of the key in the certificate sent by the firewall to the client be when doing SSL Decryption?

2048 bits  
1024 bits  
4096 bits  
512 bits  


Mark for follow up



Question 8 of 60. 
A Palo Alto Networks firewall has been configured with multiple virtual systems and is administered by multiple personnel. Several administrators are logged into the firewall and are making configuration changes to separate virtual systems at the same time. Which option will ensure that no single administrator's changes are interrupted or undone by another administrator while still allowing all administrators to complete their changes prior to issuing a commit?

One administrator sets a shared configuration lock and each administrator sets a commit lock.  
Each administrator sets a shared configuration lock.  
Each administrator sets a configuration and commit lock for the vsys to which they are making changes.  
Each administrator sets a shared commit lock.  


Mark for follow up



Question 9 of 60. 
The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? (Choose two.)

URLFiltering  
GlobalProtect Data File  
PAN-OS  
Threat Prevention  
App-ID  
   

Mark for follow up



Question 10 of 60. 
Which Panorama feature allows for aggregated device logs to be forwarded to an external security information and event management (SIEM) system?

Scheduled Log Aggregation and Forwarding  
Device Group Log Forwarding Profiles  
Collector Log Forwarding for Collector Groups  
Log Forwarding Profile  


Mark for follow up



Question 11 of 60. 
American Textile Corporation has acquired Fab Fabric Limited. American Textile uses a SIP-based VoIP phone system, which has been working well through a Palo Alto Networks firewall. However, integrating Fab Fabric's SIP phone system into American Textile's network has not been successful. The network security administrator for the combined company determines that the firewall is the cause of the failed phone system integration. Which action will disable the Application Level Gateway (ALG) firewall feature for the Fab Fabric phones while not affecting the American Textile Corporation phone system?

Disable ALG in the Security policy that matches the traffic to and from the Fab Fabric phones  
Create an application override policy that assigns SIP traffic to a custom application.  
Create an Application Override policy that assigns traffic to and from the Fab Fabric phones to a custom application  
Disable ALG for the "sip" application in the Applications sub-menu of the Objects tab.  


Mark for follow up



Question 12 of 60. 
What is the proper method to determine which active sessions on the firewall matched a security rule named "ftp-out"?

Apply the filter "(rule eq ftp-out) and (subtype eq start)" to the traffic logs.  
In the CLI, run the command "show session all filter application ftp".  
Apply the filter "(application eq ftp) and (subtype eq end)" to the traffic logs.  
In the CLI, run the command "show session all filter rule ftp-out".  


Mark for follow up



Question 13 of 60. 
Which statement is true of an OSPFv3 configuration on the Palo Alto Networks firewall?

It supports dynamic interfaces such as DHCP.  
It uses IPv4 addresses for the area ID.  
It is enabled per-subnet instead of per-link.  
It requires MD5 authentication.  


Mark for follow up



Question 14 of 60. 
A US-CERT notification is published regarding a newly-discovered piece of malware. The infection is spread using spear phishing e-mails that prompt users to click an HTTP hyperlink, which then downloads the malware. Palo Alto Networks has just released signatures to detect this malware as a high severity threat and the firewall is configured to dynamically update to the latest databases automatically. Which component and implementation will detect and prevent this threat?

Zone Protection profiles applied to the external zone with Packet Based Attack Protection with action set to block high severity threats  
Antivirus profiles applied to outbound security policy rules with action set to block high severity threats  
Vulnerability Protection profiles applied to inbound and outbound security policies with action set to block high severity threats  
Antivirus profiles applied to inbound security policies with action set to block high severity threats  


Mark for follow up



Question 15 of 60. 
Which method can be used to verify that the firewall is transmitting packets to the correct destination?

Compare the routing table to the FIB table to ensure there are no discrepancies.  
Verify the contents of the ARP table for the egress interface.  
Collect packet captures from the transmit stage on the firewall.  
Capture packet in the receive stage on the firewall.  


Mark for follow up



Question 16 of 60. 
Which CLI command would allow an administrator to assess CPU usage by process on the management plane?

show running resource monitor  
show system resources  
show system statistics  
show process list  


Mark for follow up



Question 17 of 60. 
Which action will display the NAT policies that are being enforced by the firewall?

View the NAT policies currently displayed by the management plane in the GUI.  
Navigate to the Policies tab in the GUI, select NAT from the configuration tree and check the box marked "Highlight Unused Rules".  
From the command line, check the status of the NAT pool on the data plane using the command "nat-rule-ippool".  
From the command line, check the NAT policies loaded on the data plane using the command "show running nat-policy".  


Mark for follow up



Question 18 of 60. 
In which scenario would an active/active High Availability (HA) deployment be recommended instead of an active/passive HA pair?

There is a potential for asymmetric routing to occur.  
There is a need to double the net throughput capacity of the HA pair.  
There is a need to load balance the traffic on the network.  
There is a need for the firewalls to load balance the traffic on the network.  


Mark for follow up



Question 19 of 60. 
Where can the oversubscription rate be adjusted on platforms that support NAT oversubscription?

IIn the CLI, by using the command set session offload  
In the GUI, under Device -> Setup -> Session -> Session Settings  
In the GUI, by selecting the individual rule name and making the adjustment under the Translated Address tab  
In CLI configuration mode, by issuing the command set deviceconfig setting nat reserve-ip with the appropriate argument  


Mark for follow up



Question 20 of 60. 
Which x509 attribute is required for "Forward Trust Certificate" to be enabled?

OCSP Location  
SubjectAlternateName  
CertificateAuthority  
CRL Distribution Point  


Mark for follow up



Question 21 of 60. 
Where in the firewall GUI can an administrator see how many sessions of web-browsing traffic have occurred in the last day?

ACC->Application  
Objects->Applications->web-browsing  
Monitor->Session Browser  
Monitor->App Scope->Summary  


Mark for follow up



Question 22 of 60. 
Which public key infrastructure component is required to implement SSL Forward Proxy?

CertificateAuthoritycertificate  
Machine certificate  
Certificate signing request  
Online Certificate Status Protocol  


Mark for follow up



Question 23 of 60. 
Which three inspections can be performed with a next-generation firewall but NOT with a legacy firewall? (Choose three.)

Identifying unauthorized applications that attempt to connect over non-standard ports  
Recognizing when SSH sessions are using SSH v1 instead of SSH v2  
Removing from the session table any TCP session without traffic for 3600 seconds  
Allowing a packet through from an external DNS server only if an internal host recently queried that DNS server  
Validating that UDP port 53 packets are not being used to tunnel data for another protocol  
   

Mark for follow up



Question 24 of 60. 
Which component must be configured before a User Activity report can be generated?

SSLDecryption  
GlobalProtect  
Log Forwarding  
User Identification  


Mark for follow up



Question 25 of 60. 
What can be used to push network and device configurations from Panorama to firewalls running PAN-OS software?

Service Profiles  
Templates  
Device groups  
Management groups  


Mark for follow up



Question 26 of 60. 
Which technique can be performed by a next-generation firewall, but NOT by a legacy firewall?

Inspecting HTTP data streams to detect instances of the POST method  
Detecting a spoofed IP address  
Detecting a mismatched overlapping TCP segment  
Allowing some ICMP echo-reply packets by matching them to ICMP echo-request packets  


Mark for follow up



Question 27 of 60. 

Given the following routing table: Which nexthop(s) would be added to the forwarding information base (FIB) for the 192.168.93.0/30 network?

10.66.24.88, 10.66.24.93  
0.0.0.0  
10.66.24.93  
10.66.24.88  


Mark for follow up



Question 28 of 60. 
Which feature will control how the firewall handles web servers with expired certificates when decrypting SSL?

Default Trusted Certification Authorities  
Certificate Profile  
Data Filtering Profile  
Decryption Profile  


Mark for follow up



Question 29 of 60. 
Which three engines are built into the Single-Pass Parallel Processing Architecture? (Choose three.)

Application Identification (App-ID)  
User Identification (User-ID)  
Threat Identification (Threat-ID)  
Content Identification (Content-ID)  
Group Identification (Group-ID)  
   

Mark for follow up



Question 30 of 60. 
A Palo Alto Networks firewall is configured with a NAT policy rule that performs the following source translation: Which filters need to be configured to match traffic originating from 192.168.1.10 in the "Trust-L3" zone to 2.2.2.2 in the "Untrust-L3" zone in the Transmit stage?

Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 1.1.1.1 destination 2.2.2.2  
Filter 1 source 1.1.1.1 destination 192.168.1.10 Filter 2 source 192.168.1.10 destination 1.1.1.1  
Filter 1 source 1.1.1.1 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 1.1.1.1  
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 192.168.1.10  


Mark for follow up



Question 31 of 60. 
Which two techniques become available only after upgrading from a legacy firewall to a Palo Alto Networks next-generation firewall? (Choose two.)

Dynamically opening small holes in the firewall to permit FTP data transfers, instead of being required to open all high port numbers  
Distinguishing between SSH v1 and SSH v2 in a traffic stream  
Limiting applications to using only their standard port numbers  
Differentiating between traffic for the base Facebook application and traffic using Facebook Chat  
   

Mark for follow up



Question 32 of 60. 
Which function resides on the management plane?

Content inspection performed in software  
System logging  
Application ID  
Server response inspection  


Mark for follow up



Question 33 of 60. 

Given the following Security Policy and information about traffic traversing the firewall: Source Address: 192.168.64.10 Source Zone: Trust-L3 - Destination Address: 199.167.55.50 Destination Zone: Untrust-L3 Destination port: 85 - Application: web-browsing. Which rule will match the specified traffic?

Rule number 6  
Rule number 3  
Rule number 2  
Rule number 4  


Mark for follow up



Question 34 of 60. 
The network is experiencing routing problems and the firewall administrator needs to determine the root cause. Which CLI command should the administrator use to verify routing behavior while watching the current flow of routed logs?

less follow yes mp-log routed.log  
show routing fib virtual-router vr1  
less mp-log routed.log  
show routing summary virtual-router vr1  


Mark for follow up



Question 35 of 60. 

You are the network security engineer for a large corporation. On the same night you finished a successful migration, you receive an after-hours call from the Network Operations Center (NOC). After the latest firewall migration, traffic coming from the internal network (inside zone) is not reaching its destination on several rules present in the Security Policy that have the DMZ zone as target and are allowing the traffic. The NOC sends you an email message received on your phone with the information shown above. Given that there is no current internet access, which steps should the NOC engineer take to fix the problem?

Change the destination zone to Inside zone and commit the change.  
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.26.0/24 nexthop ip-address 10.15.25.1  
Change the destination zone to DMZ zone and commit the change  
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.22.0/24 nexthop ip-address 172.15.22.65  


Mark for follow up



Question 36 of 60. 
Which GlobalProtect deployment strategy could be leveraged to expand a company's global VPN footprint without incurring hosting fees for physical equipment?

LSVPN (Large Scale VPN)  
MDM (Mobile Device Manager)  
GlobalProtect Satellite  
VM-Series for AWS (Amazon Web Services)  


Mark for follow up



Question 37 of 60. 
Which two statements regarding next-generation and legacy firewalls are true? (Choose two)

Both legacy firewalls and next-generation firewalls can reassemble packets in a given HTTP stream that arrive in an incorrect order.  
A next-generation firewall detects when traffic shifts from “normal” web browsing to a specific web application, not a more specific protocol.  
A next-generation firewall can decrypt an attached encrypted .ZIP file sent through SMTP; a legacy firewall cannot.  
Both legacy firewalls and next-generation firewalls can be configured to allow internal users to read, but not post at, an internet discussion board.  
   

Mark for follow up



Question 38 of 60. 
A company has a Palo Alto Networks firewall configured with the following three zones: Internet DMZ Inside. All users are located on the Inside zone and are using public DNS servers for name resolution. The company hosts a publicly accessible web application on a server in the DMZ zone. Which NAT rule configuration will allow users on the Inside zone to access the web application using its public IP address?

Explicit No-NAT Policy Rule  
Three zone U-turn NAT  
Two zone U-turn NAT  
Bi-directional NAT  


Mark for follow up



Question 39 of 60. 

A company is deploying a pair of PA-5060 firewalls in an environment requiring support for asymmetric routing. Which High Availability (HA) mode best supports this design requirement?

Active-Passive mode with "tcp-reject-non-syn" set to "no"  
HA-LiteActive-Passivemode  
Active-Passive mode  
Active-Active mode  


Mark for follow up



Question 40 of 60. 
Which action will allow a firewall administrator to determine which NAT rules have NOT been matched since the last reboot?

From the CLI, issue the command test nat-policy-match against each configured rule.  
In the GUI, select the Highlight Unused Rules option under Policies -> NAT.  
From the CLI, issue the command show session all filter nat-rule command.  
From the CLI, issue the command show running nat-policy command.  


Mark for follow up



Question 41 of 60. 
A user is reporting that they cannot download a PDF file from the internet. Which option will show whether the downloaded file has been blocked by a Security Profile?

Filter the System log for "Download Failed" messages.  
Filter the Traffic logs for all traffic from the user that resulted in a deny action.  
Filter the Data Filtering logs for the user's traffic and the name of the PDF file.  
Filter the Session Browser for all sessions from the user with the application "adobe".  


Mark for follow up



Question 42 of 60. 

Given the Application Override policy shown above, what will be the effect of this policy?

Traffic matching the Application Override policy will be assigned to the application "web-browsing".  
Traffic to the WebTrends server from the DMZ zone will be subject to content and threat detection.  
Traffic destined to TCP port 8888 will be assigned to the application "web-browsing" and discarded by the firewall.  
Traffic matching the policy will be assigned to the "web-browsing" application, bypassing content and threat detection.  


Mark for follow up



Question 43 of 60. 
A company has decided to install a Palo Alto Networks firewall using VWire interfaces. Because of pre-existing network configurations, the traffic on the upstream and downstream devices can have 802.1Q tags with the following values: 5 10 11 12 13 14 15 25 30 - How should the network administrator configure the Tag Allowed field of the VWire to allow only traffic with 802.1Q tag values of 11, 12, and 14?

0  
[10-15]  
{11-14}  
11,12,14  


Mark for follow up



Question 44 of 60. 
A Security policy accepts new FTP traffic sessions between 8:00 a.m. and 5:00 p.m. What happens to an already-accepted and running FTP session at 5:01 p.m.?

The session is terminated, and the initiator must establish a new session.  
The session continues to run, because already-accepted sessions are not re- evaluated.  
The session is re-evaluated to determine whether it is allowed under a different policy rule.  
The session is re-evaluated if the default configuration setting “Rematch all sessions on config policy change” is enabled.  


Mark for follow up



Question 45 of 60. 
Which two functions can be performed with a next-generation firewall but NOT with a legacy firewall? (Choose two.)

Checking for suspicious, but technically compliant, protocol behavior  
Inspecting traffic at the application layer  
Temporarily allowing an external web server to send inbound packets after an outbound request for a web page  
Creating virtual connections out of UDP traffic  
   

Mark for follow up



Question 46 of 60. 
Which interface type provides support for point-to-point protocol over Ethernet (PPPoE)?

Layer3  
PPP  
Virtual wire  
Layer2  


Mark for follow up



Question 47 of 60. 
Which statement is true if a Security policy contains two rules that would both match a proposed new session?

The rule with the most restrictive action will be applied.  
Both rules will be applied.  
The first rule that matches while evaluating the rules from top to bottom is the one that will be applied.  
Deny rules are evaluated first, and then Accept rules.  


Mark for follow up



Question 48 of 60. 
Which source address translation type will allow multiple devices to share a single translated source address while using a single NAT Policy rule?

Bidirectional  
Static IP  
Dynamic IP and Port  
Dynamic IP  


Mark for follow up



Question 49 of 60. 

You are analyzing a specific device group from Panorama and notice there are a very large number of "insufficient-data" log entries. What is known for certain about the "insufficient-data" in this display? Consider the following data:

The number of bytes sent in packets where the application could not be identified  
The number of bytes sent in sessions that were never fully opened with a SYN, SYN- ACK, ACK sequence  
The number of bytes in the extra packets sent in a DoS attack  
The number of bytes sent by hosts attempting to transmit malware  


Mark for follow up



Question 50 of 60. 

A workstation at a company was infected with malware on September 18, 2014. Palo Alto Networks released an antivirus signature for that malware on September 17, 2014. The company's firewall is licensed with Threat Prevention and URL Filtering. The Threat log in the Monitor tab of the firewall shows no indications of traffic related to the infection. However, the Traffic log shows traffic between the workstation and the command-and-control server. Given the company's Dynamic Updates configuration: What is the cause of traffic not matching a malware signature?

The update schedule is set to "download only" and not to "download and install".  
The infection occurred during the hourly update window when the malware was identified.  
A WildFire subscription is needed to detect malware.  
The most recent updates were incremental and not full updates.  


Mark for follow up



Question 51 of 60. 
A Management Profile to allow SSH access has been created and applied to interface ethernet1/1. A security rule with the action "deny" is applied to packets from "any" source zone to "any" destination zone. What will happen when someone attempts to initiate an SSH connection to ethernet1/1?

SSH access to the interface will be allowed because intra-zone traffic is allowed by default.  
SSH access to the interface will be allowed because the Management Profile is applied before the Security policy.  
SSH access to the interface will be denied because intra-zone traffic is denied.  
SSH access to the interface will be allowed because inter-zone traffic is allowed.  


Mark for follow up



Question 52 of 60. 
Which URL Filtering Security Profile action logs the URL Filtering category to the URL Filtering log?

Allow  
Default  
Log  
Alert  


Mark for follow up



Question 53 of 60. 
A Security Operations Center (SOC) has been provided a list of 10,000 malicious URLs. They were asked not to share this list outside of the organization. The Chief Information Security Officer has requested that all user access to these URLs be filtered and blocked immediately to prevent potential breaches. However, the inline Palo Alto Networks firewall is NOT licensed for URL Filtering. What is an efficient method for blocking access to these URLs?

Import the URLs to a Dynamic Block List and reference the Dynamic Block List in a Security policy rule set to deny.  
Submit a Bulk Change Request via the Palo Alto Networks Support Portal containing the list of the URLs, request that the URLs be categorized as “Malware,” and set the action to "block" for the Malware category in a URL Filtering profile.  
Use a script to automatically import each URL domain as an FQDN address object.  
Import the URLs to a Custom URL Category and reference the URL Category in a Security policy rule set to deny.  


Mark for follow up



Question 54 of 60. 
A Palo Alto Networks firewall is being targeted by a DoS attack from the Internet that is creating a flood of bogus TCP connections to internal servers behind the firewall. This traffic is allowed by security policies, and other than creating half-open TCP connections, it is indistinguishable from legitimate inbound traffic. Which Zone Protection Profile with SYN Flood Protection action, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic?

SYN Cookies applied on the internal zone  
Random Early Drop applied on the internet-facing zone  
SYN Cookies applied on the internet-facing zone  
Random Early Drop applied on the internal zone  


Mark for follow up



Question 55 of 60. 
A US-CERT notification is published regarding a newly discovered piece of malware. The infection is spread using spear phishing emails that prompt users to click an HTTP hyperlink, which then downloads the malware. Palo Alto Networks has just released signatures to detect this malware as a high severity threat and the firewall is configured to dynamically update to the latest databases automatically. Which component and implementation will detect and prevent this threat?

Antivirus Profiles applied to inbound Security policies with action set to block high-severity threats  
Zone Protection Profiles applied to the external zone with Packet Based Attack Protection with action set to block high-severity threats  
Vulnerability Protection Profiles applied to inbound and outbound Security policies with action set to block high-severity threats  
Antivirus Profiles applied to outbound Security policy rules with action set to block high-severity threats  


Mark for follow up



Question 56 of 60. 
A company wants to run their pair of PA-200 firewalls in a High Availability active/passive mode and will be using HA-Lite. Which capability can be used in this situation?

Session Sync  
Configuration Sync  
Link Aggregation  
Jumbo Frames  


Mark for follow up



Question 57 of 60. 
When would there be a benefit from the creation of a custom application signature?

When the application can be used to send and receive malware  
When a company wants to know who is watching World Cup soccer matches during work hours  
When the risk level of a Palo Alto Networks-provided application signature needs to be changed  
When the ability of an application to port hop needs to be eliminated  


Mark for follow up



Question 58 of 60. 
What statement is true about the Highlight Unused Rules option for a Security Policy?

A management plane restart will clear the counters for used/unused rules.  
A dataplane restart will clear the counters for used/unused rules.  
The counters for used/unused rules can be cleared using the "reset counter global name rule-use" CLI command.  
The counters for used/unused rules can be cleared using the reset counter global name rule-use CLI command.  


Mark for follow up



Question 59 of 60. 
A security engineer has been asked by management to optimize how Palo Alto Networks firewall syslog messages are forwarded to a syslog receiver. There are currently 20 PA-5060 firewalls, each of which is configured to forward syslogs individually. The security engineer wants to leverage their two M-100 appliances to send syslog messages from a single source and already has deployed one in Panorama mode and the other as a Log Collector. What is the remaining step in this solution?

Configure a Syslog Proxy Profile  
EnableSyslogAggregation  
Configure a Panorama Log Forwarding Profile  
Configure Collector Log Forwarding  


Mark for follow up



Question 60 of 60. 
Which Interface Type can be used to manage a firewall via SSH or HTTPS?

Virtual Wire  
Tap  
HA  
Layer3  
Layer2  


Mark for follow up







Validating that UDP port 53 packets are not being used to tunnel data for another protocol  
   


Question 24 of 60. 

Which component must be configured before a User Activity report can be generated?
 
SSLDecryption  
GlobalProtect  
Log Forwarding  
User Identification  


Question 25 of 60. 

What can be used to push network and device configurations from Panorama to firewalls running PAN-OS software?
 
Service Profiles  
Templates  
Device groups  
Management groups  


Question 26 of 60. 

Which technique can be performed by a next-generation firewall, but NOT by a legacy firewall?
 
Inspecting HTTP data streams to detect instances of the POST method  
Detecting a spoofed IP address  
Detecting a mismatched overlapping TCP segment  
Allowing some ICMP echo-reply packets by matching them to ICMP echo-request packets  


Question 27 of 60. 


Given the following routing table: Which nexthop(s) would be added to the forwarding information base (FIB) for the 192.168.93.0/30 network?
 
10.66.24.88, 10.66.24.93  
0.0.0.0  
10.66.24.93  
10.66.24.88  


Question 28 of 60. 

Which feature will control how the firewall handles web servers with expired certificates when decrypting SSL?
 
Default Trusted Certification Authorities  
Certificate Profile  
Data Filtering Profile  
Decryption Profile  


Question 29 of 60. 

Which three engines are built into the Single-Pass Parallel Processing Architecture? (Choose three.)
Application Identification (App-ID)  
User Identification (User-ID)  
Threat Identification (Threat-ID)  
Content Identification (Content-ID)  
Group Identification (Group-ID)  
   


Question 30 of 60. 

A Palo Alto Networks firewall is configured with a NAT policy rule that performs the following source translation: Which filters need to be configured to match traffic originating from 192.168.1.10 in the "Trust-L3" zone to 2.2.2.2 in the "Untrust-L3" zone in the Transmit stage?
 
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 1.1.1.1 destination 2.2.2.2  
Filter 1 source 1.1.1.1 destination 192.168.1.10 Filter 2 source 192.168.1.10 destination 1.1.1.1  
Filter 1 source 1.1.1.1 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 1.1.1.1  
Filter 1 source 192.168.1.10 destination 2.2.2.2 Filter 2 source 2.2.2.2 destination 192.168.1.10  


Question 31 of 60. 

Which two techniques become available only after upgrading from a legacy firewall to a Palo Alto Networks next-generation firewall? (Choose two.)
Dynamically opening small holes in the firewall to permit FTP data transfers, instead of being required to open all high port numbers  
Distinguishing between SSH v1 and SSH v2 in a traffic stream  
Limiting applications to using only their standard port numbers  
Differentiating between traffic for the base Facebook application and traffic using Facebook Chat  
   


Question 32 of 60. 

Which function resides on the management plane?
 
Content inspection performed in software  
System logging  
Application ID  
Server response inspection  


Question 33 of 60. 


Given the following Security Policy and information about traffic traversing the firewall: Source Address: 192.168.64.10 Source Zone: Trust-L3 - Destination Address: 199.167.55.50 Destination Zone: Untrust-L3 Destination port: 85 - Application: web-browsing. Which rule will match the specified traffic?
 
Rule number 6  
Rule number 3  
Rule number 2  
Rule number 4  


Question 34 of 60. 

The network is experiencing routing problems and the firewall administrator needs to determine the root cause. Which CLI command should the administrator use to verify routing behavior while watching the current flow of routed logs?
 
less follow yes mp-log routed.log  
show routing fib virtual-router vr1  
less mp-log routed.log  
show routing summary virtual-router vr1  


Question 35 of 60. 


You are the network security engineer for a large corporation. On the same night you finished a successful migration, you receive an after-hours call from the Network Operations Center (NOC). After the latest firewall migration, traffic coming from the internal network (inside zone) is not reaching its destination on several rules present in the Security Policy that have the DMZ zone as target and are allowing the traffic. The NOC sends you an email message received on your phone with the information shown above. Given that there is no current internet access, which steps should the NOC engineer take to fix the problem?
 
Change the destination zone to Inside zone and commit the change.  
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.26.0/24 nexthop ip-address 10.15.25.1  
Change the destination zone to DMZ zone and commit the change  
SSH into the device, enter in configure mode, and add the following static route command: set network virtual-router vr1 routing-table ip static-route dmzroute interface ethernet1/2 destination 10.15.22.0/24 nexthop ip-address 172.15.22.65  


Question 36 of 60. 

Which GlobalProtect deployment strategy could be leveraged to expand a company's global VPN footprint without incurring hosting fees for physical equipment?
 
LSVPN (Large Scale VPN)  
MDM (Mobile Device Manager)  
GlobalProtect Satellite  
VM-Series for AWS (Amazon Web Services)  


Question 37 of 60. 

Which two statements regarding next-generation and legacy firewalls are true? (Choose two)
Both legacy firewalls and next-generation firewalls can reassemble packets in a given HTTP stream that arrive in an incorrect order.  
A next-generation firewall detects when traffic shifts from “normal” web browsing to a specific web application, not a more specific protocol.  
A next-generation firewall can decrypt an attached encrypted .ZIP file sent through SMTP; a legacy firewall cannot.  
Both legacy firewalls and next-generation firewalls can be configured to allow internal users to read, but not post at, an internet discussion board.  
   


Question 38 of 60. 

A company has a Palo Alto Networks firewall configured with the following three zones: Internet DMZ Inside. All users are located on the Inside zone and are using public DNS servers for name resolution. The company hosts a publicly accessible web application on a server in the DMZ zone. Which NAT rule configuration will allow users on the Inside zone to access the web application using its public IP address?
 
Explicit No-NAT Policy Rule  
Three zone U-turn NAT  
Two zone U-turn NAT  
Bi-directional NAT  


Question 39 of 60. 


A company is deploying a pair of PA-5060 firewalls in an environment requiring support for asymmetric routing. Which High Availability (HA) mode best supports this design requirement?
 
Active-Passive mode with "tcp-reject-non-syn" set to "no"  
HA-LiteActive-Passivemode  
Active-Passive mode  
Active-Active mode  


Question 40 of 60. 

Which action will allow a firewall administrator to determine which NAT rules have NOT been matched since the last reboot?
 
From the CLI, issue the command test nat-policy-match against each configured rule.  
In the GUI, select the Highlight Unused Rules option under Policies -> NAT.  
From the CLI, issue the command show session all filter nat-rule command.  
From the CLI, issue the command show running nat-policy command.  


Question 41 of 60. 

A user is reporting that they cannot download a PDF file from the internet. Which option will show whether the downloaded file has been blocked by a Security Profile?
 
Filter the System log for "Download Failed" messages.  
Filter the Traffic logs for all traffic from the user that resulted in a deny action.  
Filter the Data Filtering logs for the user's traffic and the name of the PDF file.  
Filter the Session Browser for all sessions from the user with the application "adobe".  


Question 42 of 60. 


Given the Application Override policy shown above, what will be the effect of this policy?
 
Traffic matching the Application Override policy will be assigned to the application "web-browsing".  
Traffic to the WebTrends server from the DMZ zone will be subject to content and threat detection.  
Traffic destined to TCP port 8888 will be assigned to the application "web-browsing" and discarded by the firewall.  
Traffic matching the policy will be assigned to the "web-browsing" application, bypassing content and threat detection.  


Question 43 of 60. 

A company has decided to install a Palo Alto Networks firewall using VWire interfaces. Because of pre-existing network configurations, the traffic on the upstream and downstream devices can have 802.1Q tags with the following values: 5 10 11 12 13 14 15 25 30 - How should the network administrator configure the Tag Allowed field of the VWire to allow only traffic with 802.1Q tag values of 11, 12, and 14?
 
0  
[10-15]  
{11-14}  
11,12,14  


Question 44 of 60. 

A Security policy accepts new FTP traffic sessions between 8:00 a.m. and 5:00 p.m. What happens to an already-accepted and running FTP session at 5:01 p.m.?
 
The session is terminated, and the initiator must establish a new session.  
The session continues to run, because already-accepted sessions are not re- evaluated.  
The session is re-evaluated to determine whether it is allowed under a different policy rule.  
The session is re-evaluated if the default configuration setting “Rematch all sessions on config policy change” is enabled.  


Question 45 of 60. 

Which two functions can be performed with a next-generation firewall but NOT with a legacy firewall? (Choose two.)
Checking for suspicious, but technically compliant, protocol behavior  
Inspecting traffic at the application layer  
Temporarily allowing an external web server to send inbound packets after an outbound request for a web page  
Creating virtual connections out of UDP traffic  
   


Question 46 of 60. 

Which interface type provides support for point-to-point protocol over Ethernet (PPPoE)?
 
Layer3  
PPP  
Virtual wire  
Layer2  


Question 47 of 60. 

Which statement is true if a Security policy contains two rules that would both match a proposed new session?
 
The rule with the most restrictive action will be applied.  
Both rules will be applied.  
The first rule that matches while evaluating the rules from top to bottom is the one that will be applied.  
Deny rules are evaluated first, and then Accept rules.  


Question 48 of 60. 

Which source address translation type will allow multiple devices to share a single translated source address while using a single NAT Policy rule?
 
Bidirectional  
Static IP  
Dynamic IP and Port  
Dynamic IP  


Question 49 of 60. 


You are analyzing a specific device group from Panorama and notice there are a very large number of "insufficient-data" log entries. What is known for certain about the "insufficient-data" in this display? Consider the following data:
 
The number of bytes sent in packets where the application could not be identified  
The number of bytes sent in sessions that were never fully opened with a SYN, SYN- ACK, ACK sequence  
The number of bytes in the extra packets sent in a DoS attack  
The number of bytes sent by hosts attempting to transmit malware  


Question 50 of 60. 


A workstation at a company was infected with malware on September 18, 2014. Palo Alto Networks released an antivirus signature for that malware on September 17, 2014. The company's firewall is licensed with Threat Prevention and URL Filtering. The Threat log in the Monitor tab of the firewall shows no indications of traffic related to the infection. However, the Traffic log shows traffic between the workstation and the command-and-control server. Given the company's Dynamic Updates configuration: What is the cause of traffic not matching a malware signature?
 
The update schedule is set to "download only" and not to "download and install".  
The infection occurred during the hourly update window when the malware was identified.  
A WildFire subscription is needed to detect malware.  
The most recent updates were incremental and not full updates.  


Question 51 of 60. 

A Management Profile to allow SSH access has been created and applied to interface ethernet1/1. A security rule with the action "deny" is applied to packets from "any" source zone to "any" destination zone. What will happen when someone attempts to initiate an SSH connection to ethernet1/1?
 
SSH access to the interface will be allowed because intra-zone traffic is allowed by default.  
SSH access to the interface will be allowed because the Management Profile is applied before the Security policy.  
SSH access to the interface will be denied because intra-zone traffic is denied.  
SSH access to the interface will be allowed because inter-zone traffic is allowed.  


Question 52 of 60. 

Which URL Filtering Security Profile action logs the URL Filtering category to the URL Filtering log?
 
Allow  
Default  
Log  
Alert  


Question 53 of 60. 

A Security Operations Center (SOC) has been provided a list of 10,000 malicious URLs. They were asked not to share this list outside of the organization. The Chief Information Security Officer has requested that all user access to these URLs be filtered and blocked immediately to prevent potential breaches. However, the inline Palo Alto Networks firewall is NOT licensed for URL Filtering. What is an efficient method for blocking access to these URLs?
 
Import the URLs to a Dynamic Block List and reference the Dynamic Block List in a Security policy rule set to deny.  
Submit a Bulk Change Request via the Palo Alto Networks Support Portal containing the list of the URLs, request that the URLs be categorized as “Malware,” and set the action to "block" for the Malware category in a URL Filtering profile.  
Use a script to automatically import each URL domain as an FQDN address object.  
Import the URLs to a Custom URL Category and reference the URL Category in a Security policy rule set to deny.  


Question 54 of 60. 

A Palo Alto Networks firewall is being targeted by a DoS attack from the Internet that is creating a flood of bogus TCP connections to internal servers behind the firewall. This traffic is allowed by security policies, and other than creating half-open TCP connections, it is indistinguishable from legitimate inbound traffic. Which Zone Protection Profile with SYN Flood Protection action, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic?
 
SYN Cookies applied on the internal zone  
Random Early Drop applied on the internet-facing zone  
SYN Cookies applied on the internet-facing zone  
Random Early Drop applied on the internal zone  


Question 55 of 60. 

A US-CERT notification is published regarding a newly discovered piece of malware. The infection is spread using spear phishing emails that prompt users to click an HTTP hyperlink, which then downloads the malware. Palo Alto Networks has just released signatures to detect this malware as a high severity threat and the firewall is configured to dynamically update to the latest databases automatically. Which component and implementation will detect and prevent this threat?
 
Antivirus Profiles applied to inbound Security policies with action set to block high-severity threats  
Zone Protection Profiles applied to the external zone with Packet Based Attack Protection with action set to block high-severity threats  
Vulnerability Protection Profiles applied to inbound and outbound Security policies with action set to block high-severity threats  
Antivirus Profiles applied to outbound Security policy rules with action set to block high-severity threats  


Question 56 of 60. 

A company wants to run their pair of PA-200 firewalls in a High Availability active/passive mode and will be using HA-Lite. Which capability can be used in this situation?
 
Session Sync  
Configuration Sync  
Link Aggregation  
Jumbo Frames  


Question 57 of 60. 

When would there be a benefit from the creation of a custom application signature?
 
When the application can be used to send and receive malware  
When a company wants to know who is watching World Cup soccer matches during work hours  
When the risk level of a Palo Alto Networks-provided application signature needs to be changed  
When the ability of an application to port hop needs to be eliminated  


Question 58 of 60. 

What statement is true about the Highlight Unused Rules option for a Security Policy?
 
A management plane restart will clear the counters for used/unused rules.  
A dataplane restart will clear the counters for used/unused rules.  
The counters for used/unused rules can be cleared using the "reset counter global name rule-use" CLI command.  
The counters for used/unused rules can be cleared using the reset counter global name rule-use CLI command.  


Question 59 of 60. 

A security engineer has been asked by management to optimize how Palo Alto Networks firewall syslog messages are forwarded to a syslog receiver. There are currently 20 PA-5060 firewalls, each of which is configured to forward syslogs individually. The security engineer wants to leverage their two M-100 appliances to send syslog messages from a single source and already has deployed one in Panorama mode and the other as a Log Collector. What is the remaining step in this solution?
 
Configure a Syslog Proxy Profile  
EnableSyslogAggregation  
Configure a Panorama Log Forwarding Profile  
Configure Collector Log Forwarding  


Question 60 of 60. 

Which Interface Type can be used to manage a firewall via SSH or HTTPS?
 
Virtual Wire  
Tap  
HA  
Layer3  
Layer2  



Save / Return Later


Pro Teknologi dibuat pada 22 Februari 2017. Blog ini adalah harapan saya agar dapat membagi manfaat kepada orang lain,berupa tips-tips Seputar Blog,Internet,Komputer,dan Info-Info Menarik lainnya.

3 Responses to "Palo Alto Networks - PCNSE Practice Questions "

  1. Next Generation firewalls are used to protect the system from being harmed. These firewalls filter the traffic configured on the system and checks for the faults by monitoring the data and do deep inspection by spotting malware.

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete