Question # 1
An engineer is deploying multiple firewalls with common configuration in Panorama.
What are two benefits of using nested device groups? (Choose two.) A. Inherit settings from the Shared groupB. Inherit IPSec crypto profilesC. Inherit all Security policy rules and objectsD. Inherit parent Security policy rules and objects
Reveal Answer
A. Inherit settings from the Shared groupD. Inherit parent Security policy rules and objects
Question # 2
A system administrator runs a port scan using the company tool as part of vulnerability
check. The administrator finds that the scan is identified as a threat and is dropped by the
firewall. After further investigating the logs, the administrator finds that the scan is dropped
in the Threat Logs. A. Add the tool IP address to the reconnaissance protection source address exclusion in
the DoS Protection profile.
B. Add the tool IP address to the reconnaissance protection source address exclusion in
the Zone protection profile.
C. Change the TCP port scan action from Block to Alert in the Zone Protection profile.
D. Remove the Zone protection profile from the zone setting.
Reveal Answer
B. Add the tool IP address to the reconnaissance protection source address exclusion in
the Zone protection profile.
Question # 3
A network security engineer is going to enable Zone Protection on several security zones
How can the engineer ensure that Zone Protection events appear in the firewall's logs? A. Select the check box "Log packet-based attack events" in the Zone Protection profileB. No action is needed Zone Protection events appear in the threat logs by defaultC. Select the check box "Log Zone Protection events" in the Content-ID settings of the
firewallD. Access the CLI in each firewall and enter the command set system setting additionalthreat-
log on
Reveal Answer
A. Select the check box "Log packet-based attack events" in the Zone Protection profile
Question # 4
An engineer is tasked with deploying SSL Forward Proxy decryption for their organization. What should they review with their leadership before implementation? A. Browser-supported cipher documentationB. Cipher documentation supported by the endpoint operating systemC. URL risk-based category distinctionsD. Legal compliance regulations and acceptable usage policies
Reveal Answer
D. Legal compliance regulations and acceptable usage policies
Explanation :
The engineer should review the legal compliance regulations and acceptable
usage policies with their leadership before implementing SSL Forward Proxy decryption for
their organization. SSL Forward Proxy decryption allows the firewall to decrypt and inspect
the traffic from internal users to external servers. This can raise privacy and legal concerns
for the users and the organization.
Therefore, the engineer should ensure that the
leadership is aware of the implications and benefits of SSL Forward Proxy decryption and
that they have a clear policy for informing and obtaining consent from the users.
Option A is
incorrect because browser-supported cipher documentation is not relevant for SSL Forward
Proxy decryption. The firewall uses its own cipher suite to negotiate encryption with the
external server, regardless of the browser settings.
Option B is incorrect because cipher
documentation supported by the endpoint operating system is not relevant for SSL Forward
Proxy decryption. The firewall uses its own cipher suite to negotiate encryption with the
external server, regardless of the endpoint operating system.
Option C is incorrect because
URL risk-based category distinctions are not relevant for SSL Forward Proxy decryption.
The firewall can decrypt and inspect traffic based on any URL category, not just risk-based
ones.
Question # 5
Which GlobalProtect gateway selling is required to enable split-tunneling by access route,
destination domain, and application? A. No Direct Access to local networksB. Tunnel modeC. iPSec modeD. Satellite mode
Reveal Answer
B. Tunnel mode
Question # 6
Which two actions must an engineer take to configure SSL Forward Proxy decryption?
(Choose two.) A. Configure the decryption profileB. Define a Forward Trust CertificateC. Configure SSL decryption rulesD. Configure a SSL/TLS service profile
Reveal Answer
B. Define a Forward Trust CertificateC. Configure SSL decryption rules
Explanation : To configure SSL Forward Proxy decryption on a Palo Alto Networks firewall,
certain key components must be set up to ensure secure and effective decryption and
inspection of SSL/TLS encrypted traffic:
B. Define a Forward Trust Certificate:
A Forward Trust Certificate is essential for SSL Forward Proxy decryption. This
certificate is used by the firewall to dynamically generate certificates for SSL sites
that are trusted. When the firewall decrypts and inspects the traffic and then re-encrypts
it, the new certificate presented to the client comes from the Forward
Trust Certificate authority. This certificate must be trusted by client devices, often
requiring the Forward Trust CA certificate to be distributed and installed on client
devices.
C. Configure SSL decryption rules:
SSL decryption rules are the policies that determine which traffic is to be
decrypted. These rules specify the source, destination, service, and URL category,
among other criteria. The rules define what traffic the SSL Forward Proxy will
apply to, enabling selective decryption based on security and privacy
requirements.
Together, these components form the basis of the SSL Forward Proxy decryption setup,
allowing for the decryption, inspection, and re-encryption of SSL/TLS encrypted traffic to
identify and prevent threats hidden within encrypted sessions.
Question # 7
An existing log forwarding profile is currently configured to forward all threat logs to
Panorama. The firewall engineer wants to add syslog as an additional log forwarding
method. The requirement is to forward only medium or higher severity threat logs to syslog.
Forwarding to Panorama must not be changed.
Which set of actions should the engineer take to achieve this goal? A. 1- Open the current log forwarding profile.
2. Open the existing match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.B. 1. Create a new log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the Panorama and syslog forward methods.C. 1. Open the current log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.D. 1. Create a new log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.
Reveal Answer
C. 1. Open the current log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.