PCNSE
PCNSE
PCNSE
PCNSE Braindumps
PCNSE Real Questions
PCNSE Practice Test
PCNSE Actual Questions
Palo-Alto
PCNSE
Palo Alto Networks Certified Security Engineer (PCNSE)
PAN-OS 10
https://killexams.com/pass4sure/exam-detail/PCNSE
Question: 48
Which CLI command is used to determine how much disk space is allocated to logs?
A. show logging-status
B. show system info
C. debug log-receiver show
D. show system logdfo-quota
Answer: D
Question: 49
Which Panorama feature protects logs against data loss if a Panorama server fails?
A. Panorama HA automatically ensures that no logs are lost if a server fails inside the HA Cluster.
B. Panorama Collector Group with Log Redundancy ensures that no logs are lost if a server fails inside the Collector
Group.
C. Panorama HA with Log Redundancy ensures that no logs are lost if a server fails inside the HA Cluster.
D. Panorama Collector Group automatically ensures that no logs are lost if a server fails inside the Collector Group
Answer: A
Question: 50
Which strategy is consistent with decryption best practices to ensure consistent performance?
A. Use RSA in a Decryption profile tor higher-priority and higher-risk traffic, and use less processor-intensive
decryption methods for lower-risk traffic
B. Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use less processor-intensive
decryption methods for tower-risk traffic
C. Use Decryption profiles to downgrade processor-intensive ciphers to ciphers that are less processor-intensive
D. Use Decryption profiles to drop traffic that uses processor-intensive ciphers
Answer: B
Question: 51
Using multiple templates in a stack to manage many firewalls provides which two advantages? (Choose two.)
A. inherit address-objects from templates
B. define a common standard template configuration for firewalls
C. standardize server profiles and authentication configuration across all stacks
D. standardize log-forwarding profiles for security polices across all stacks
Answer: B, C
Question: 52
In the screenshot above which two pieces ot information can be determined from the ACC configuration shown?
(Choose two)
A. The Network Activity tab will display all applications, including FTP.
B. Threats with a severity of "high" are always listed at the top of the Threat Name list
C. Insecure-credentials, brute-force and protocol-anomaly are all a part of the vulnerability Threat Type
D. The ACC has been filtered to only show the FTP application
Answer: C, D
Question: 53
Answer: A
Question: 54
Answer: A
Question: 55
An administrator is seeing one of the firewalls in a HA active/passive pair moved to ‘suspended" state due to Non-
functional loop.
Which three actions will help the administrator troubleshool this issue? (Choose three.)
A. Use the CLI command show high-availability flap-statistics
B. Check the HA Link Monitoring interface cables.
C. Check the High Availability > Link and Path Monitoring settings.
D. Check High Availability > Active/Passive Settings > Passive Link State
E. Check the High Availability > HA Communications > Packet Forwarding settings.
Answer: A,B,D
Question: 56
An administrator has 750 firewalls. The administrator’s central-management Panorama instance deploys dynamic
updates to the firewalls. The administrator notices that the dynamic updates from Panorama do not appear on some of
the firewalls.
If Panorama pushes the configuration of a dynamic update schedule to managed firewalls, but the configuration does
not appear, what is the root cause?
A. Panorama does not have valid licenses to push the dynamic updates.
B. Panorama has no connection to Palo Alto Networks update servers.
C. No service route is configured on the firewalls to Palo Alto Networks update servers.
D. Locally-defined dynamic update settings take precedence over the settings that
Panorama pushed.
Answer: D
Question: 57
A client wants to detect the use of weak and manufacturer-default passwords for loT devices.
Answer: C
Question: 58
An administrator needs to evaluate a recent policy change that was committed and pushed to a firewall device group.
Answer: A
Explanation:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/panorama-web-interface/panorama-commit-
operations.html
Question: 59
A network administrator troubleshoots a VPN issue and suspects an IKE Crypto mismatch between peers.
Where can the administrator find the corresponding logs after running a test command to initiate the VPN?
A. Configuration logs
B. System logs
C. Traffic logs
D. Tunnel Inspection logs
Answer: B
Question: 60
An administrator has configured a pair of firewalls using high availability in Active/Passive mode. Path Monitoring
has been enabled with a Failure Condition of "any." A path group is configured with Failure Condition of "all" and
contains a destination IP of 8.8.8.8 and 4.2.2.2 with a Ping Interval of 500ms and a Ping count of 3.
Answer: C
Question: 61
Explanation:
application
Question: 62
The administrator for a small company has recently enabled decryption on their Palo Alto Networks firewall using a
self-signed root certificate. They have also created a Forward Trust and Forward Untrust certificate and set them as
such.
The admin has not yet installed the root certificate onto client systems
Answer: D
Question: 63
A firewall administrator notices that many Host Sweep scan attacks are being allowed through the firewall sourced
from the outside zone.
Answer: D
Question: 64
An engineer is tasked with configuring a Zone Protection profile on the untrust zone.
Which three settings can be configured on a Zone Protection profile? (Choose three.)
A. Ethernet SGT Protection
B. Protocol Protection
C. DoS Protection
D. Reconnaissance Protection
E. Resource Protection
Answer: A, B, D
Explanation:
B. Protocol Protection: is used to protect against known protocol vulnerabilities, such as buffer overflows and
malformed packets.
C. DoS Protection: is used to protect against denial-of-service (DoS) attacks, such as SYN floods and ICMP floods.
Question: 65
A firewall should be advertising the static route 10.2.0.0/24 Into OSPF. The configuration on the neighbor is correct,
but the route is not in the neighbor’s routing table.
Which two configurations should you check on the firewall? (Choose two.)
A. In the OSFP configuration, ensure that the correct redistribution profile is selected in the OSPF Export Rules
section.
B. Within the redistribution profile ensure that Redist is selected.
C. Ensure that the OSPF neighbor state Is "2-Way."
D. In the redistribution profile check that the source type is set to "ospf."
Answer: A,B
Question: 66
Given the following snippet of a WildFire submission log. did the end-user get access to the requested information
and why or why not?
A. Yes. because the action is set to "allow ”
B. No because WildFire categorized a file with the verdict "malicious"
C. Yes because the action is set to "alert"
D. No because WildFire classified the seventy as "high."
Answer: C
Question: 67
DRAG DROP
Below are the steps in the workflow for creating a Best Practice Assessment in a firewall and Panorama configuration
Place the steps in order.
Answer:
Explanation:
Step 1. In either the NGFW or in Panorama, on the Operations/Support tab, download the technical support file.
Step 2. Log in to the Customer Support Portal (CSP) and navigate to Tools > Best Practice Assessment.
Step 4. Map the zone type and area of the architecture to each zone.
Question: 68
You have upgraded Panorama to 10.2 and need to upgrade six Log Collectors.
Answer: D
Question: 69
How would an administrator configure a Bidirectional Forwarding Detection profile for BGP after enabling the
Advance Routing Engine run on PAN-OS 10.2?
A. create a BFD profile under Network > Network Profiles > BFD Profile and then select the BFD profile under
Network > Virtual Router > BGP > BFD
B. create a BFD profile under Network > Routing > Routing Profiles > BFD and then select the BFD profile under
Network > Virtual Router > BGP > General > Global BFD Profile
C. create a BFD profile under Network > Routing > Routing Profiles > BFD and then select the BFD profile under
Network > Routing > Logical Routers > BGP > General > Global BFD Profile
D. create a BFD profile under Network > Network Profiles > BFD Profile and then select the BFD profile under
Network > Routing > Logical Routers > BGP > BFD
Answer: A
6$03/(48(67,216
7KHVHTXHVWLRQVDUHIRUGHPRSXUSRVHRQO\)XOOYHUVLRQLV
XSWRGDWHDQGFRQWDLQVDFWXDOTXHVWLRQVDQGDQVZHUV
.LOOH[DPVFRPLVDQRQOLQHSODWIRUPWKDWRIIHUVDZLGHUDQJHRIVHUYLFHVUHODWHGWRFHUWLILFDWLRQ
H[DPSUHSDUDWLRQ7KHSODWIRUPSURYLGHVDFWXDOTXHVWLRQVH[DPGXPSVDQGSUDFWLFHWHVWVWR
KHOSLQGLYLGXDOVSUHSDUHIRUYDULRXVFHUWLILFDWLRQH[DPVZLWKFRQILGHQFH+HUHDUHVRPHNH\
IHDWXUHVDQGVHUYLFHVRIIHUHGE\.LOOH[DPVFRP
$FWXDO([DP4XHVWLRQV.LOOH[DPVFRPSURYLGHVDFWXDOH[DPTXHVWLRQVWKDWDUHH[SHULHQFHG
LQWHVWFHQWHUV7KHVHTXHVWLRQVDUHXSGDWHGUHJXODUO\WRHQVXUHWKH\DUHXSWRGDWHDQG
UHOHYDQWWRWKHODWHVWH[DPV\OODEXV%\VWXG\LQJWKHVHDFWXDOTXHVWLRQVFDQGLGDWHVFDQ
IDPLOLDUL]HWKHPVHOYHVZLWKWKHFRQWHQWDQGIRUPDWRIWKHUHDOH[DP
([DP'XPSV.LOOH[DPVFRPRIIHUVH[DPGXPSVLQ3')IRUPDW7KHVHGXPSVFRQWDLQD
FRPSUHKHQVLYHFROOHFWLRQRITXHVWLRQVDQGDQVZHUVWKDWFRYHUWKHH[DPWRSLFV%\XVLQJWKHVH
GXPSVFDQGLGDWHVFDQHQKDQFHWKHLUNQRZOHGJHDQGLPSURYHWKHLUFKDQFHVRIVXFFHVVLQWKH
FHUWLILFDWLRQH[DP
3UDFWLFH7HVWV.LOOH[DPVFRPSURYLGHVSUDFWLFHWHVWVWKURXJKWKHLUGHVNWRS9&(H[DP
VLPXODWRUDQGRQOLQHWHVWHQJLQH7KHVHSUDFWLFHWHVWVVLPXODWHWKHUHDOH[DPHQYLURQPHQWDQG
KHOSFDQGLGDWHVDVVHVVWKHLUUHDGLQHVVIRUWKHDFWXDOH[DP7KHSUDFWLFHWHVWVFRYHUDZLGH
UDQJHRITXHVWLRQVDQGHQDEOHFDQGLGDWHVWRLGHQWLI\WKHLUVWUHQJWKVDQGZHDNQHVVHV
*XDUDQWHHG6XFFHVV.LOOH[DPVFRPRIIHUVDVXFFHVVJXDUDQWHHZLWKWKHLUH[DPGXPSV7KH\
FODLPWKDWE\XVLQJWKHLUPDWHULDOVFDQGLGDWHVZLOOSDVVWKHLUH[DPVRQWKHILUVWDWWHPSWRUWKH\
ZLOOUHIXQGWKHSXUFKDVHSULFH7KLVJXDUDQWHHSURYLGHVDVVXUDQFHDQGFRQILGHQFHWRLQGLYLGXDOV
SUHSDULQJIRUFHUWLILFDWLRQH[DPV
8SGDWHG&RQWHQW.LOOH[DPVFRPUHJXODUO\XSGDWHVLWVTXHVWLRQEDQNDQGH[DPGXPSVWR
HQVXUHWKDWWKH\DUHFXUUHQWDQGUHIOHFWWKHODWHVWFKDQJHVLQWKHH[DPV\OODEXV7KLVKHOSV
FDQGLGDWHVVWD\XSWRGDWHZLWKWKHH[DPFRQWHQWDQGLQFUHDVHVWKHLUFKDQFHVRIVXFFHVV
7HFKQLFDO6XSSRUW.LOOH[DPVFRPSURYLGHVIUHH[WHFKQLFDOVXSSRUWWRDVVLVWFDQGLGDWHV
ZLWKDQ\TXHULHVRULVVXHVWKH\PD\HQFRXQWHUZKLOHXVLQJWKHLUVHUYLFHV7KHLUFHUWLILHGH[SHUWV
DUHDYDLODEOHWRSURYLGHJXLGDQFHDQGKHOSFDQGLGDWHVWKURXJKRXWWKHLUH[DPSUHSDUDWLRQ
MRXUQH\
'PS.PSFFYBNTWJTJUIUUQTLJMMFYBNTDPNWFOEPSTFYBNMJTU
.LOO\RXUH[DPDW)LUVW$WWHPSW*XDUDQWHHG