Question # 1
An engineer is deploying multiple firewalls with common configuration in Panorama.
What are two benefits of using nested device groups? (Choose two.) A. Inherit settings from the Shared groupB. Inherit IPSec crypto profilesC. Inherit all Security policy rules and objectsD. Inherit parent Security policy rules and objects
Reveal Answer
A. Inherit settings from the Shared groupD. Inherit parent Security policy rules and objects
Question # 2
Why would a traffic log list an application as "not-applicable”? A. The firewall denied the traffic before the application match could be performed.B. The TCP connection terminated without identifying any application dataC. There was not enough application data after the TCP connection was establishedD. The application is not a known Palo Alto Networks App-ID.
Reveal Answer
A. The firewall denied the traffic before the application match could be performed.
Explanation:
When a traffic log shows the application field as "not-applicable", it typically means the firewall never had the chance to inspect enough data to identify the application. This most often occurs when:
The firewall drops or denies the traffic very early — before the App-ID engine can analyze the session.
Common with implicit deny rules, or explicitly configured "deny" rules in the Security policy.
🔎 Additional Clarification of Other Options:
B. The TCP connection terminated without identifying any application data:
This might result in the application showing as "incomplete", not "not-applicable".
C. There was not enough application data after the TCP connection was established:
This results in "incomplete" or "insufficient-data", not "not-applicable".
D. The application is not a known Palo Alto Networks App-ID:
If App-ID can't identify a custom or unknown app, it might show as "unknown-tcp", "unknown-udp", or a custom App-ID, not "not-applicable".
🔍 Reference:
Palo Alto Networks – Traffic Log Fields
Palo Alto Knowledge Base – Why Application is 'not-applicable'
Question # 3
An organization wants to begin decrypting guest and BYOD traffic.
Which NGFW feature can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be
decrypted? A. Authentication Portal
B. SSL Decryption profile
C. SSL decryption policy
D. comfort pages
Reveal Answer
A. Authentication Portal
Explanation :
An authentication portal is a feature that can be used to identify guests and BYOD users,
instruct them how to download and install the CA certificate, and clearly notify them that
their traffic will be decrypted. An authentication portal is a web page that the firewall
displays to users who need to authenticate before accessing the network or the internet.
The authentication portal can be customized to include a welcome message, a login
prompt, a disclaimer, a certificate download link, and a logout button. The authentication
portal can also be configured to use different authentication methods, such as local
database, RADIUS, LDAP, Kerberos, or SAML1. By using an authentication portal, the
firewall can redirect BYOD users to a web page where they can learn about the decryption
policy, download and install the CA certificate, and agree to the terms of use before
accessing the network or the internet2.
An SSL decryption profile is not a feature that can be used to identify guests and BYOD
users, instruct them how to download and install the CA certificate, and clearly notify them
that their traffic will be decrypted. An SSL decryption profile is a set of options that define
how the firewall handles SSL/TLS traffic that it decrypts. An SSL decryption profile can
include settings such as certificate verification, unsupported protocol handling, session
caching, session resumption, algorithm selection, etc3. An SSL decryption profile does not
provide any user identification or notification functions.
An SSL decryption policy is not a feature that can be used to identify guests and BYOD
users, instruct them how to download and install the CA certificate, and clearly notify them
that their traffic will be decrypted. An SSL decryption policy is a set of rules that determine
which traffic the firewall decrypts based on various criteria, such as source and destination
zones, addresses, users, applications, services, etc. An SSL decryption policy can also
specify which type of decryption to apply to the traffic, such as SSL Forward Proxy, SSL
Inbound Inspection, or SSH Proxy4. An SSL decryption policy does not provide any user
identification or notification functions.
Comfort pages are not a feature that can be used to identify guests and BYOD users,
instruct them how to download and install the CA certificate, and clearly notify them that
their traffic will be decrypted. Comfort pages are web pages that the firewall displays to
users when it blocks or fails to decrypt certain traffic due to security policy or technical
reasons. Comfort pages can include information such as the reason for blocking or failing
to decrypt the traffic, the URL of the original site, the firewall serial number, etc5. Comfort
pages do not provide any user identification or notification functions before decrypting the
traffic.
Question # 4
An administrator is creating a new Dynamic User Group to quarantine users for suspicious
activity.
Which two objects can Dynamic User Groups use as match conditions for group
membership? (Choose two.) A. Source IP addressB. Dynamic tagsC. Static tags
D. Ldap attributes
Reveal Answer
A. Source IP addressB. Dynamic tags
Question # 5
An administrator wants to add User-ID information for their Citrix MetaFrame Presentation
Server (MPS) users.
Which option should the administrator use? A. Terminal Server Agent for User Mapping
B. Windows-Based User-ID Agent
C. PAN-OS Integrated User-ID Agent
D. PAN-OS XML API
Reveal Answer
A. Terminal Server Agent for User Mapping
Explanation : If you have clients running multi-user systems in a Windows environment,
such as Microsoft Terminal Server or Citrix Metaframe Presentation Server or XenApp,
Configure the Palo Alto Networks Terminal Server (TS) Agent for User Mapping.
Question # 6
What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose
three) A. Configure a URL profile to block the phishing category.
B. Create a URL filtering profile
C. Enable User-ID.
D. Create an anti-virus profile.
E. Create a decryption policy rule.
Reveal Answer
B. Create a URL filtering profile
C. Enable User-ID.
E. Create a decryption policy rule.
Question # 7
An administrator is configuring a Panorama device group. Which two objects are
configurable? (Choose two.) A. DNS Proxy
B. SSL/TLS profiles
C. address groups
D. URL Filtering profiles
Reveal Answer
C. address groups
D. URL Filtering profiles
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.