Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCNSE Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
Questions # 101:

A network engineer troubleshoots a VPN Phase 2 mismatch and decides that PFS (Perfect Forward Secrecy) needs to be enabled. What action should the engineer take?

Options:

A.

Enable PFS under the IKE gateway advanced options.


B.

Enable PFS under the IPSec Tunnel advanced options.


C.

Add an authentication algorithm in the IPSec Crypto profile.


D.

Select the appropriate DH Group under the IPSec Crypto profile.


Expert Solution
Questions # 102:

What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three

Options:

A.

Configure a URL profile to block the phishing category.


B.

Create a URL filtering profile


C.

Enable User-ID.


D.

Create an anti-virus profile.


E.

Create a decryption policy rule.


Expert Solution
Questions # 103:

A consultant advises a client on designing an explicit Web Proxy deployment on PAN-OS 11 0 The client currently uses RADIUS authentication in their environment

Which two pieces of information should the consultant provide regarding Web Proxy authentication? (Choose two.)

Options:

A.

Kerberos or SAML authentication need to be configured


B.

LDAP or TACACS+ authentication need to be configured


C.

RADIUS is only supported for a transparent Web Proxy.


D.

RADIUS is not supported for explicit or transparent Web Proxy


Expert Solution
Questions # 104:

When a new firewall joins a high availability (HA) cluster, the cluster members will synchronize all existing sessions over which HA port?

Options:

A.

HA1


B.

HA3


C.

HA2


D.

HA4


Expert Solution
Questions # 105:

Which feature can provide NGFWs with User-ID mapping information?

Options:

A.

Web Captcha


B.

Native 802.1q authentication


C.

GlobalProtect


D.

Native 802.1x authentication


Expert Solution
Questions # 106:

An administrator has purchased WildFire subscriptions for 90 firewalls globally.

What should the administrator consider with regards to the WildFire infra-structure?

Options:

A.

To comply with data privacy regulations, WildFire signatures and ver-dicts are not shared globally.


B.

Palo Alto Networks owns and maintains one global cloud and four WildFire regional clouds.


C.

Each WildFire cloud analyzes samples and generates malware signatures and verdicts independently of the other WildFire clouds.


D.

The WildFire Global Cloud only provides bare metal analysis.


Expert Solution
Questions # 107:

An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall.

Which priority is correct for the passive firewall?

Options:

A.

0


B.

99


C.

1


D.

255


Expert Solution
Questions # 108:

What happens when the log forwarding built-in action with tagging is used?

Options:

A.

Destination IP addresses of selected unwanted traffic are blocked. *


B.

Selected logs are forwarded to the Azure Security Center.


C.

Destination zones of selected unwanted traffic are blocked.


D.

Selected unwanted traffic source zones are blocked.


Expert Solution
Questions # 109:

A company wants to implement threat prevention to take action without redesigning the network routing.

What are two best practice deployment modes for the firewall? (Choose two.)

Options:

A.

TAP


B.

Layer 2


C.

Layer 3


D.

Virtual Wire


Expert Solution
Questions # 110:

Question # 110

Question # 110

Review the images. A firewall policy that permits web traffic includes the global-logs policy is depicted

What is the result of traffic that matches the "Alert - Threats" Profile Match List?

Options:

A.

The source address of SMTP traffic that matches a threat is automatically blocked as BadGuys for 180 minutes.


B.

The source address of traffic that matches a threat is automatically blocked as BadGuys for 180 minutes.


C.

The source address of traffic that matches a threat is automatically tagged as BadGuys for 180 minutes.


D.

The source address of SMTP traffic that matches a threat is automatically tagged as BadGuys for 180 minutes.


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions