Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCNSE - Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0

Page: 4 / 12
Total 374 questions

Which three sessions are created by a NGFW for web proxy? (Choose three.)

A.

A session for DNS proxy to DNS servers

B.

A session for proxy to web server

C.

A session for client to proxy

D.

A session for proxy to authentication server

E.

A session for web server to client

An administrator pushes a new configuration from Panorama to a pair of firewalls that are configured as an active/passive HA pair. Which NGFW receives the configuration from Panorama?

A.

The Passive firewall, which then synchronizes to the active firewall

B.

The active firewall, which then synchronizes to the passive firewall

C.

Both the active and passive firewalls, which then synchronize with each other

D.

Both the active and passive firewalls independently, with no synchronization afterward

A company wants to use GlobalProtect as its remote access VPN solution.

Which GlobalProtect features require a Gateway license?

A.

Multiple external gateways

B.

Single or multiple internal gateways

C.

Split DNS and HIP checks

D.

IPv6 for internal gateways

An administrator has been asked to configure active/active HA for a pair of Palo Alto Networks NGFWs. The firewall use Layer 3 interfaces to send traffic to a single gateway IP for the pair.

Which configuration will enable this HA scenario?

A.

The two firewalls will share a single floating IP and will use gratuitous ARP to share the floating IP.

B.

Each firewall will have a separate floating IP, and priority will determine which firewall has the primary IP.

C.

The firewalls do not use floating IPs in active/active HA.

D.

The firewalls will share the same interface IP address, and device 1 will use the floating IP if device 0 fails.

An engineer is configuring secure web access (HTTPS) to a Palo Alto Networks firewall for management.

Which profile should be configured to ensure that management access via web browsers is encrypted with a trusted certificate?

A.

An SSL/TLS Service profile with a certificate assigned.

B.

An Interface Management profile with HTTP and HTTPS enabled.

C.

A Certificate profile with a trusted root CA.

D.

An Authentication profile with the allow list of users.

An administrator notices that an interface configuration has been overridden locally on a firewall. They require all configuration to be managed from Panorama and overrides are not allowed. What is one way the administrator can meet this requirement?

A.

Perform a device-group commit push from Panorama using the "Include Device and Network Templates" option

B.

Perform a template commit push from Panorama using the "Force Template Values" option

C.

Perform a commit force from the CLI of the firewall

D.

Reload the running configuration and perform a firewall local commit

A company has recently migrated their branch office's PA-220S to a centralized Panorama. This Panorama manages a number of PA-7000 Series and PA-5200 Series devices All device group and template configuration is managed solely within Panorama

They notice that commit times have drastically increased for the PA-220S after the migration

What can they do to reduce commit times?

A.

Disable "Share Unused Address and Service Objects with Devices" in Panorama Settings.

B.

Update the apps and threat version using device-deployment

C.

Perform a device group push using the "merge with device candidate config" option

D.

Use "export or push device config bundle" to ensure that the firewall is integrated with the Panorama config.

Which two factors should be considered when sizing a decryption firewall deployment? (Choose two.)

A.

Encryption algorithm

B.

Number of security zones in decryption policies

C.

TLS protocol version

D.

Number of blocked sessions

A customer wants to enhance the protection provided by their Palo Alto Networks NGFW deployment to cover public-facing company-owned domains from misconfigurations that point records to third-party sources. Which two actions should the network administrator perform to achieve this goal? (Choose two)

A.

Verify the NGFWs have the Advanced DNS Security and Advanced Threat Prevention licenses installed and validated

B.

Create or update a Vulnerability Protection profile to the DNS Policies / DNS Zone Misconfiguration section, then add the domains to be protected

C.

Verify the NGFWs have the Advanced DNS Security and Advanced URL Filtering licenses installed and validated

D.

Create or update an Anti-Spyware profile, go to the DNS Policies / DNS Zone Misconfiguration section, then add the domains to be protected

Which three multi-factor authentication methods can be used to authenticate access to the firewall? (Choose three.)

A.

Voice

B.

Fingerprint

C.

SMS

D.

User certificate

E.

One-time password