ExamHelpDesk

Complete list of current Q & A>>

Palo Alto Networks Certified Network Security Engineer (PCNSE) – Quiz

1 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

1. Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?

2 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

2. Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OSֲ® software?

3 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

3. An administrator encountered problems with inbound decryption. Which option should the administrator investigate as part of triage?

4 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

4. Which two virtualization platforms officially support the deployment of Palo Alto Networks VM-Series firewalls? (Choose two.)

5 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

5. To connect the Palo Alto Networks firewall to AutoFocus, which setting must be enabled?

6 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

6. How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?

7 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

7. Which method will dynamically register tags on the Palo Alto Networks NGFW?

8 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

8. Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?

9 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

9. A customer wants to set up a VLAN interface for a Layer 2 Ethernet port.
Which two mandatory options are used to configure a VLAN interface? (Choose two.)

10 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

10. An administrator has been asked to configure a Palo Alto Networks NGFW to provide protection against worms and trojans.
Which Security Profile type will protect against worms and trojans?

11 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

11. A company needs to preconfigure firewalls to be sent to remote sites with the least amount of preconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers.
Which VPN configuration would adapt to changes when deployed to the future site?

12 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

12. An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall.
Which priority is correct for the passive firewall?

13 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

13. An administrator pushes a new configuration from Panorama to a pair of firewalls that are configured as an active/passive HA pair.
Which NGFW receives the configuration from Panorama?

14 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

14. When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?

15 / 15

Category: Palo Alto Networks Certified Network Security Engineer (PCNSE)

15. If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?

Your score is

0%

Scroll to Top