Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCNSE - Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0

Page: 4 / 12
Total 346 questions

When creating a Policy-Based Forwarding (PBF) policy, which two components can be used? (Choose two.)

A.

Schedule

B.

Source Device

C.

Custom Application

D.

Source Interface

A company wants to add threat prevention to the network without redesigning the network routing.

What are two best practice deployment modes for the firewall? (Choose two.)

A.

VirtualWire

B.

Layer3

C.

TAP

D.

Layer2

What happens when the log forwarding built-in action with tagging is used?

A.

Destination IP addresses of selected unwanted traffic are blocked. *

B.

Selected logs are forwarded to the Azure Security Center.

C.

Destination zones of selected unwanted traffic are blocked.

D.

Selected unwanted traffic source zones are blocked.

An engineer is tasked with decrypting web traffic in an environment without an established PKI When using a self-signed certificate generated on the firewall which type of certificate should be in? approved web traffic?

A.

An Enterprise Root CA certificate

B.

The same certificate as the Forward Trust certificate

C.

A Public Root CA certificate

D.

The same certificate as the Forward Untrust certificate

What is the purpose of the firewall decryption broker?

A.

Decrypt SSL traffic a then send it as cleartext to a security chain of inspection tools

B.

Force decryption of previously unknown cipher suites

C.

Inspection traffic within IPsec tunnel

D.

Reduce SSL traffic to a weaker cipher before sending it to a security chain of inspection tools

An administrator plans to install the Windows User-ID agent on a domain member system.

What is a best practice for choosing where to install the User-ID agent?

A.

On the same RODC that is used for credential detection

B.

In close proximity to the firewall it will be providing User-ID to

C.

In close proximity to the servers it will be monitoring

D.

On the DC holding the Schema Master FSMO role

What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure an SSL/TLS connection'?

A.

certificates

B.

profiles

C.

link state

D.

stateful firewall connection

Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)

A.

Log Ingestion

B.

HTTP

C.

Log Forwarding

D.

LDAP

An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.)

A.

Exhibit A

B.

Exhibit B

C.

Exhibit C

D.

Exhibit D

Which two items must be configured when implementing application override and allowing traffic through the firewall? (Choose two.)

A.

Application filter

B.

Application override policy rule

C.

Security policy rule

D.

Custom app