Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCNSE Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

A company wants to add threat prevention to the network without redesigning the network routing.

What are two best practice deployment modes for the firewall? (Choose two.)

Options:

A.

VirtualWire


B.

Layer3


C.

TAP


D.

Layer2


Expert Solution
Questions # 12:

When you troubleshoot an SSL Decryption issue, which PAN-OS CL1 command do you use to check the details of the Forward Trust certificate. Forward Untrust certificate, and SSL Inbound Inspection certificate?

Options:

A.

show system setting ssl-decrypt certificate


B.

show system setting ssl-decrypt certs


C.

debug dataplane show ssl-decrypt ssl-certs


D.

show system setting ssl-decrypt certificate-cache


Expert Solution
Questions # 13:

A network security administrator wants to enable Packet-Based Attack Protection in a Zone Protection profile. What are two valid ways to enable Packet-Based Attack Protection? (Choose two.)

Options:

A.

ICMP Drop


B.

TCP Drop


C.

SYN Random Early Drop


D.

TCP Port Scan Block


Expert Solution
Questions # 14:

The UDP-4501 protocol-port is to between which two GlobalProtect components?

Options:

A.

GlobalProtect app and GiobalProtect satellite


B.

GlobalRrotect app and GlobalProtect gateway


C.

GlobalProtect portal and GlobalProtect gateway


D.

GlobalProtect app and GlobalProtect portal


Expert Solution
Questions # 15:

Which configuration change will improve network reliability and ensure minimal disruption during tunnel failures?

Options:

A.

Set up high availability (HA) and increase the IPsec rekey interval to reduce the likelihood of tunnel disruptions


B.

Set up a backup tunnel and reduce the tunnel monitoring interval and threshold to detect failures quickly


C.

Set up high availability (HA) and disable tunnel monitoring to prevent unnecessary failovers due to temporary connectivity issues


D.

Set up a backup tunnel and change the tunnel monitoring profile from "Wait Recover" to "Fail Over"


Expert Solution
Questions # 16:

During a routine security audit, the risk and compliance team notices a series of WildFire logs that contain a "malicious" verdict and the action "allow." Upon further inspection, the team confirms that these same threats are automatically blocked by the firewalls the following day. How can the existing configuration be adjusted to ensure that new threats are blocked within minutes instead of having to wait until the following day?

Options:

A.

Confirm the file types and direction are configured correctly in the WildFire analysis profile


B.

Configure the appropriate actions in the Antivirus security profile


C.

Configure the appropriate actions in the File Blocking profile


D.

Confirm the file size limits are configured correctly in the WildFire general settings


Expert Solution
Questions # 17:

Which two methods can be configured to validate the revocation status of a certificate? (Choose two.)

Options:

A.

CRL


B.

CRT


C.

OCSP


D.

Cert-Validation-Profile


E.

SSL/TLS Service Profile


Expert Solution
Questions # 18:

An administrator accidentally closed the commit window/screen before the commit was finished. Which two options could the administrator use to verify the progress or success of that commit task? (Choose two.)

Question # 18

Question # 18

Question # 18

Options:

A.

Exhibit A


B.

Exhibit B


C.

Exhibit C


D.

Exhibit D


Expert Solution
Questions # 19:

The decision to upgrade PAN-OS has been approved. The engineer begins the process by upgrading the Panorama servers, but gets an error when attempting the install.

When performing an upgrade on Panorama to PAN-OS. what is the potential cause of a failed install?

Options:

A.

Outdated plugins


B.

Global Protect agent version


C.

Expired certificates


D.

Management only mode


Expert Solution
Questions # 20:

Which two actions can the administrative role called "vsysadmin" perform? (Choose two)

Options:

A.

Configure resource limits for the NGFW system


B.

Commit changes made to the candidate configuration of the assigned vsys


C.

Create and edit Security policies and security profiles for only the assigned vsys


D.

Configure interfaces and subinterfaces that exist in the assigned vsys


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions