Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCNSE Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

You are auditing the work of a co-worker and need to verify that they have matched the Palo Alto Networks Best Practices for Anti-Spyware Profiles.

For which three severity levels should single-packet captures be enabled to meet the Best Practice standard? (Choose three.)

Options:

A.

Low


B.

High


C.

Critical


D.

Informational


E.

Medium


Questions # 32:

A firewall administrator has configured User-ID and deployed GlobalProtect, but there is no User-ID showing in the traffic logs.

How can the administrator ensure that User-IDs are populated in the traffic logs?

Options:

A.

Create a Group Mapping for the GlobalProtect Group.


B.

Enable Captive Portal on the expected source interfaces.


C.

Add the users to the proper Dynamic User Group.


D.

Enable User-ID on the expected trusted zones.


Questions # 33:

An engineer needs to configure a standardized template for all Panorama-managed firewalls. These settings will be configured on a template named "Global" and will be included in all template stacks.

Which three settings can be configured in this template? (Choose three.)

Options:

A.

Log Forwarding profile


B.

SSL decryption exclusion


C.

Email scheduler


D.

Login banner


E.

Dynamic updates


Questions # 34:

A customer requires that virtual systems with separate virtual routers can communicate with one another within a Palo Alto Networks firewall. In addition to confirming Security policies, which three configurations will accomplish this goal? (Choose three)

Options:

A.

Route added with next hop set to "none" and using the interface of the virtual systems that need to communicate


B.

External zones with the virtual systems added


C.

Route added with next hop next-vr by using the VR configured in the virtual system


D.

Layer 3 zones for the virtual systems that need to communicate


Questions # 35:

A network security administrator has been tasked with deploying User-ID in their organization.

What are three valid methods of collecting User-ID information in a network? (Choose three.)

Options:

A.

Windows User-ID agent


B.

GlobalProtect


C.

XMLAPI


D.

External dynamic list


E.

Dynamic user groups


Questions # 36:

How can a firewall be set up to automatically block users as soon as they are found to exhibit malicious behavior via a threat log?

Options:

A.

Configure a dynamic address group for the addresses to be blocked with the tag "malicious." Add a Log Forwarding profile to the other policies, which adds the "malicious" tag to these addresses when logs are generated in the threat log. Under Device > User Identification > Trusted Source Address, add the condition "NOT malicious."


B.

Configure a dynamic user group for the users to be blocked with the tag "malicious." Add a Log Forwarding profile to the other policies, which adds the "malicious" tag to these users when logs are generated in the threat log. Create policies to block traffic from this user group.


C.

Configure the appropriate security profiles for Antivirus, Anti-Spyware, and Vulnerability Prevention, create signature policies for the relevant signatures and/or severities. Under the "Actions" tab in "Signature Policies," select "block-user."


D.

N/A


Questions # 37:

An administrator is using Panorama to manage multiple firewalls. After upgrading all devices to the latest PAN-OS software, the administrator enables log forwarding from the firewalls to Panorama.

However, pre-existing logs from the firewalls are not appearing in Panorama.

Which action should be taken to enable the firewalls to send their pre-existing logs to Panorama?

Options:

A.

Export the log database.


B.

Use the import option to pull logs.


C.

Use the scp logdb export command.


D.

Use the ACC to consolidate the logs.


Questions # 38:

Question # 38

Based on the screenshots above, and with no configuration inside the Template Stack itself, what access will the device permit on its Management port?

Options:

A.

The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-1.


B.

The firewall will allow HTTP Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-2.


C.

The firewall will allow HTTP, Telnet, SNMP, HTTPS, SSH and Ping from IP addresses defined as $permitted-subnet-1 and $permitted-subnet-2.


D.

The firewall will allow HTTP, Telnet, HTTPS, SSH, and Ping from IP addresses defined as $permitted-subnet-1 and $permitted-subnet-2.


Questions # 39:

Panorama is being used to upgrade the PAN-OS version on a pair of firewalls in an active/passive high availability (HA) configuration. The Palo Alto Networks best practice upgrade steps have been completed in Panorama (Panorama upgraded, backups made, content updates, and disabling "Preemptive" pushed), and the firewalls are ready for upgrade. What is the next best step to minimize downtime and ensure a smooth transition?

Options:

A.

Upgrade both HA peers at the same time using Panorama’s "Group HA Peers" option to ensure version consistency


B.

Suspend the active firewall, upgrade it first, and reboot to verify it comes back online before upgrading the passive peer


C.

Perform the upgrade on the active firewall first while keeping the passive peer online to maintain failover capability


D.

Upgrade only the passive peer first, reboot it, restore HA functionality, and then upgrade the active peer


Questions # 40:

Which statement accurately describes how web proxy is run on a firewall with multiple virtual systems?

Options:

A.

It can run on a single virtual system and multiple virtual systems.


B.

It can run on multiple virtual systems without issue.


C.

It can run only on a single virtual system.


D.

It can run only on a virtual system with an alias named "web proxy.


Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions