Palto Alto PCNSE Practice Exam Questions

321 Questions


Updation Date : 28-Aug-2025


A network administrator wants to deploy SSL Forward Proxy decryption. What two attributes should a forward trust certificate have? (Choose two.)


A. A subject alternative name


B. A private key


C. A server certificate


D. A certificate authority (CA) certificate





B.
  A private key

D.
  A certificate authority (CA) certificate

Explanation

🔹1: Recall what a Forward Trust Certificate is
In SSL Forward Proxy, the firewall intercepts TLS sessions, decrypts traffic, and re-signs the server’s certificate with its own Forward Trust Certificate.
For the client to accept this re-signed cert:
The firewall must act as a certificate authority (CA) (so it can generate and sign server certs on the fly).
That certificate must have a private key (so the firewall can actually sign new certs).
Clients must trust this CA (so you import it into browsers/endpoints).

🔹2: Evaluate Options
A. A subject alternative name (SAN)
❌ Not required on the forward trust cert. SANs matter for end-entity server certs, not for the CA signing cert.
B. A private key
✅ Required — without a private key, the firewall cannot dynamically sign certificates.
C. A server certificate
❌ Wrong — it’s not a single server cert; it must be a CA cert used for signing.
D. A certificate authority (CA) certificate
✅ Correct — the forward trust cert must be a CA cert so the firewall can generate child certificates.

🔹 Key Takeaway (PCNSE)
Forward Trust Cert = CA cert + private key → used to sign trusted server certs during SSL Forward Proxy.
Forward Untrust Cert = CA cert + private key → used to re-sign untrusted/invalid server certs.

đź“– Reference:
Palo Alto Networks — Configure SSL Forward Proxy

An engineer needs to permit XML API access to a firewall for automation on a network segment that is routed through a Layer 3 sub-interface on a Palo Alto Networks firewall. However, this network segment cannot access the dedicated management interface due to the Security policy. Without changing the existing access to the management interface, how can the engineer fulfill this request?


A. Specify the subinterface as a management interface in Setup > Device > Interfaces.


B. Add the network segment's IP range to the Permitted IP Addresses list.


C. Enable HTTPS in an Interface Management profile on the subinterface


D. Configure a service route for HTTP to use the subinterface.





C.
  Enable HTTPS in an Interface Management profile on the subinterface

Explanation:

Why This Option?
1.Problem:
The network segment cannot access the dedicated management interface due to Security policy restrictions.
XML API access (which uses HTTPS) is needed for automation.
2.Solution:
Enable HTTPS management access on the Layer 3 sub-interface (where the network segment is connected).
This allows the segment to reach the firewall’s XML API via the sub-interface IP, bypassing the need for the management interface.
3.Steps:
Navigate to Network > Interfaces > [sub-interface] > Advanced > Management Profile.
Create/assign an Interface Management Profile with HTTPS enabled.
Ensure the Security policy allows access to the sub-interface IP.

Why Not Other Options?
A.Only dedicated management interfaces (MGT) can be set as management interfaces; data interfaces cannot.
B."Permitted IP Addresses" only applies to the dedicated management interface, not data interfaces.
DService routes control outbound firewall traffic (e.g., updates), not inbound API access.

Key Note:
XML API uses HTTPS (port 443), so enabling HTTPS on the sub-interface is sufficient.

Reference:
Palo Alto Management Interface Guide:
"Enable HTTPS in an Interface Management Profile to allow API access on data interfaces."

A company is deploying User-ID in their network. The firewall team needs to have the ability to see and choose from a list of usernames and user groups directly inside the Panorama policies when creating new security rules. How can this be achieved?


A. By configuring Data Redistribution Client in Panorama > Data Redistribution


B. By configuring User-ID group mapping in Panorama > User Identification


C. By configuring User-ID source device in Panorama > Managed Devices


D. By configuring Master Device in Panorama > Device Groups





B.
  By configuring User-ID group mapping in Panorama > User Identification

Explanation:

Why This Option?
1.User-ID Group Mapping in Panorama:
To populate usernames and groups in Panorama policies, you must configure Group Mapping under:
Panorama > User Identification > Group Mapping.
This allows Panorama to query Active Directory (or other identity sources) and cache user/group data for use in policy rules.
2.How It Works:
Panorama connects to AD/LDAP servers (or User-ID agents) to retrieve user and group lists.
These lists become available in the Policy Editor when creating security rules (e.g., source/destination user fields).

Why Not Other Options?
A.Data Redistribution syncs data between firewalls, but doesn’t provide user/group lists to Panorama.
C.User-ID source device configures where User-ID data comes from, but doesn’t enable policy selection in Panorama.
D.Master Device is for high availability, not user/group resolution.

Key Requirement:
Panorama must have direct access to AD/LDAP or a User-ID agent to fetch user/group information.

Reference:
Panorama User-ID Admin Guide:
"Group Mapping in Panorama allows administrators to select users/groups directly in security policies."

Which type of policy in Palo Alto Networks firewalls can use Device-ID as a match condition?


A. NAT


B. DOS protection


C. QoS


D. Tunnel inspection





C.
  QoS

Explanation:

The question asks which type of policy in Palo Alto Networks firewalls can use Device-ID as a match condition. Device-ID, part of the User-ID feature, identifies devices (e.g., laptops, phones) based on their attributes (e.g., MAC address, device type) and allows policies to be applied based on device identity. Let’s evaluate the options to determine where Device-ID can be used as a match condition.

Why C. QoS?
Purpose: Quality of Service (QoS) policies on Palo Alto Networks firewalls allow traffic prioritization and bandwidth management based on various match criteria, including User-ID and Device-ID. Device-ID can be used to classify traffic from specific devices (e.g., prioritizing VoIP phones or limiting bandwidth for guest devices), enabling granular QoS control. Configuration:
Navigate to Policies > QoS.
Create or edit a QoS policy.
In the match criteria, select Device under the User/Device tab.
Choose a Device-ID group or specific device (e.g., "Corporate-Laptops") identified by the User-ID agent or Terminal Services agent.
Define the QoS class (e.g., priority, bandwidth limit).
Behavior: The firewall applies QoS rules based on the device identity, ensuring tailored traffic management.
Reference:
Palo Alto Networks documentation states, "QoS policies support Device-ID as a match condition to enforce bandwidth and prioritization based on device type."

Why Not the Other Options?
A. NAT:
Explanation: Network Address Translation (NAT) policies translate IP addresses and ports but do not support Device-ID as a match condition. NAT rules use source/destination zones, IPs, and ports, not device identity, as the focus is on address mapping, not behavioral or identity-based control.
Why Incorrect:
Device-ID is not a valid NAT criterion.

B. DoS Protection:
Explanation: Denial of Service (DoS) protection policies mitigate attacks by rate-limiting or blocking traffic based on source/destination, zones, or applications, but they do not support Device-ID as a match condition. DoS rules are designed for threat mitigation, not device-specific identification.
Why Incorrect:.
Device-ID is not applicable to DoS policies

D. Tunnel inspection:
Explanation: Tunnel inspection refers to policies or profiles (e.g., Decryption, VPN) that inspect traffic within tunnels (e.g., IPsec, SSL VPN). While User-ID can be used in Security policies to control tunnel traffic, Device-ID is not a supported match condition for tunnel inspection itself. Tunnel inspection focuses on protocol and content, not device identity.
Why Incorrect:
Device-ID is not a valid match for tunnel inspection policies.

Additional Context:
Device-ID Functionality: Device-ID extends User-ID by identifying devices using agents (e.g., Windows User-ID agent with Terminal Services) or profiling (e.g., via MAC OUI or DHCP fingerprints). It is supported in Security and QoS policies for granular control. Supported Policies:
Security Policies: Use Device-ID to allow/deny traffic based on device.
QoS Policies: Use Device-ID for bandwidth allocation.
Other policy types (NAT, DoS, Tunnel) do not leverage Device-ID.


Configuration Steps:
Enable Device-ID under Device > User Identification > Device Identification.
Configure a Device-ID agent or profiling.
Apply to QoS policies as a match condition.


Best Practices:
Use Device-ID groups for scalability.
Test with Monitor > User-ID to verify device mappings.
Monitor QoS logs under Monitor > Logs > QoS.

PCNSE Exam Relevance: This question tests your understanding of policy types and Device-ID integration, a key topic in the PCNSE exam. It requires knowledge of where device-based conditions apply.
Conclusion:
The type of policy in Palo Alto Networks firewalls that can use Device-ID as a match condition is QoS, allowing the firewall to prioritize or limit traffic based on device identity.

References:
Palo Alto Networks Documentation: Device-ID Configuration
Palo Alto Networks Documentation: QoS Policy with Device-ID
ExamTopics PCNSE Discussion: Device-ID Usage

Exhibit.

Given the screenshot, how did the firewall handle the traffic?


A. Traffic was allowed by profile but denied by policy as a threat.


B. Traffic was allowed by policy but denied by profile as a threat.


C. Traffic was allowed by policy but denied by profile as encrypted.


D. Traffic was allowed by policy but denied by profile as a nonstandard port.





B.
  Traffic was allowed by policy but denied by profile as a threat.

Explanation:

Key Evidence from the Log:
1.Action: allow (from policy) and Session End Reason: threat
The traffic was allowed by the Security policy (rule non-standard-ports).
However, it was blocked by a Security profile (e.g., Antivirus, Anti-Spyware) because it was classified as a threat.
2.Threat Indicators:
Category: proxy-avoidance-and-anonymizers (suspicious).
Application: ssl on non-standard port 9002 (often used for tunneling).
App Subcategory: encrypted-tunnel (potential bypass attempt).
3.Profile Override:
Security profiles can override policy allows if threats are detected (e.g., block malicious content).

Why Not Other Options?
A.Policies don’t deny traffic after allowing it; profiles do.
C.Encryption alone doesn’t cause denies—threats do.
D.Non-standard ports are allowed by the policy (rule name confirms).

Reference:
Palo Alto Security Profiles Documentation:
"Security profiles can block sessions allowed by policies if threats are detected."

An administrator needs to validate that policies that will be deployed will match the appropriate rules in the device-group hierarchy. Which tool can the administrator use to review the policy creation logic and verify that unwanted traffic is not allowed?


A. Preview Changes


B. Managed Devices Health


C. Test Policy Match


D. Policy Optimizer





C.
  Test Policy Match

Explanation:

Why "Test Policy Match"?
1.Purpose:
The Test Policy Match tool (in Panorama or firewall) allows administrators to simulate traffic against the policy rulebase before deployment.
It checks which rule matches specific traffic (source, destination, application, etc.) and validates if the intended behavior (allow/deny) occurs.
2.Key Benefits:
Identifies rule misconfigurations (e.g., overly permissive rules).
Ensures policies align with security requirements without live traffic.

Why Not Other Options?
A. Preview Changes
Shows configuration diffs (e.g., new rules), but doesn’t test traffic matching.
B. Managed Devices Health
Monitors device status, not policy logic.
D. Policy Optimizer
Recommends rule adjustments based on logs, but doesn’t simulate traffic.

How to Use:
In Panorama, go to: Policies > Security > Test Policy Match.
Enter traffic parameters (e.g., source IP, destination IP, application).
Review which rule matches and the action (allow/deny).

Reference:
Palo Alto Admin Guide:
"Test Policy Match validates rule precedence and traffic handling before commit."

An administrator notices interface ethernet1/2 failed on the active firewall in an active / passive firewall high availability (HA) pair Based on the image below what - if any - action was taken by the active firewall when the link failed?


A. The active firewall failed over to the passive HA member because "any" is selected for the Link Monitoring


B. No action was taken because Path Monitoring is disabled


C. No action was taken because interface ethernet1/1 did not fail


D. The active firewall failed over to the passive HA member due to an AE1 Link Group failure





C.
  No action was taken because interface ethernet1/1 did not fail

Explanation:

Key Configuration from the Screenshot:
1.Link Group A1:
Interfaces: ethernet1/1 and ethernet1/2
Group Failure Condition: all (meaning both interfaces must fail to trigger an HA failover).
Link Monitoring Failure Condition: Set to any (meaning any Link Group failing triggers failover).
2.Scenario Analysis:
Only ethernet1/2 failed, but ethernet1/1 is still operational.
Since Link Group A1 requires both interfaces to fail (due to all condition), the group does not report a failure.
Thus, no HA failover occurs.

Why Not Other Options?
A.Failover requires entire Link Group failure (not just one interface).
B.Path Monitoring is irrelevant—Link Monitoring is enabled and configured.
D.AE1 Link Group didn’t fail (only one interface down).

Reference:
Palo Alto HA Link Monitoring Guide:
"Link Groups with 'all' condition require all interfaces to fail to trigger failover."

What must be configured to apply tags automatically based on User-ID logs?


A. Device ID


B. Log Forwarding profile


C. Group mapping


D. Log settings





D.
  Log settings

Explanation:
To apply tags automatically based on User-ID logs, the engineer must configure a Log Forwarding profile that specifies the criteria for matching the logs and the tags to apply. The Log Forwarding profile can be attached to a security policy rule or a decryption policy rule to enable auto-tagging for the traffic that matches the rule. The tags can then be used for dynamic address groups, policy enforcement, or reporting1.
References:
Use Auto-Tagging to Automate Security Actions, PCNSE Study Guide (page 49)


Page 7 out of 41 Pages
Palo Alto PCNSE Practice Test Home Previous