Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCNSE Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which three statements accurately describe Decryption Mirror? (Choose three.)

Options:

A.

Decryption Mirror requires a tap interface on the firewall


B.

Use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information that is submitted via an encrypted channel


C.

Only management consent is required to use the Decryption Mirror feature.


D.

Decryption, storage, inspection, and use of SSL traffic are regulated in certain countries.


E.

You should consult with your corporate counsel before activating and using Decryption Mirror in a production environment.


Questions # 42:

An organization is interested in migrating from their existing web proxy architecture to the Web Proxy feature of their PAN-OS 11.0 firewalls. Currently. HTTP and SSL requests contain the c IP address of the web server and the client browser is redirected to the proxy

Which PAN-OS proxy method should be configured to maintain this type of traffic flow?

Options:

A.

DNS proxy


B.

Explicit proxy


C.

SSL forward proxy


D.

Transparent proxy


Questions # 43:

A company needs to preconfigure firewalls to be sent to remote sites with the least amount of reconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers.

Which VPN configuration would adapt to changes when deployed to the future site?

Options:

A.

Preconfigured GlobalProtect satellite


B.

Preconfigured GlobalProtect client


C.

Preconfigured IPsec tunnels


D.

Preconfigured PPTP Tunnels


Questions # 44:

In which two scenarios would it be necessary to use Proxy IDs when configuring site-to-site VPN Tunnels? (Choose two.)

Options:

A.

Firewalls which support policy-based VPNs.


B.

The remote device is a non-Palo Alto Networks firewall.


C.

Firewalls which support route-based VPNs.


D.

The remote device is a Palo Alto Networks firewall.


Questions # 45:

The firewall team has been asked to deploy a new Panorama server and to forward all firewall logs to this server By default, which component of the Palo Alto Networks firewall architect is responsible for log forwarding and should be checked for early signs of overutilization?

Options:

A.

Management plane CPU


B.

Dataplane CPU


C.

Packet buffers


D.

On-chip packet descriptors


Questions # 46:

If a URL is in multiple custom URL categories with different actions, which action will take priority?

Options:

A.

Allow


B.

Override


C.

Block


D.

Alert


Questions # 47:

A network security engineer needs to enable Zone Protection in an environment that makes use of Cisco TrustSec Layer 2 protections

What should the engineer configure within a Zone Protection profile to ensure that the TrustSec packets are identified and actions are taken upon them?

Options:

A.

TCP Fast Open in the Strip TCP options


B.

Ethernet SGT Protection


C.

Stream ID in the IP Option Drop options


D.

Record Route in IP Option Drop options


Questions # 48:

After switching to a different WAN connection, users have reported that various websites will not load, and timeouts are occurring. The web servers work fine from other locations.

The firewall engineer discovers that some return traffic from these web servers is not reaching the users behind the firewall. The engineer later concludes that the maximum transmission unit (MTU) on an upstream router interface is set to 1400 bytes.

The engineer reviews the following CLI output for ethernet1/1.

Which setting should be modified on ethernet1/1 to remedy this problem?

Options:

A.

Lower the interface MTU value below 1500.


B.

Enable the Ignore IPv4 Don't Fragment (DF) setting.


C.

Change the subnet mask from /23 to /24.


D.

Adjust the TCP maximum segment size (MSS) value.


Questions # 49:

Which rule type controls end user SSL traffic to external websites?

Options:

A.

SSL Outbound Proxyless Inspection


B.

SSL Forward Proxy


C.

SSH Proxy


D.

SSL Inbound Inspection


Questions # 50:

An organization wants to begin decrypting guest and BYOD traffic.

Which NGFW feature can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted?

Options:

A.

Authentication Portal


B.

SSL Decryption profile


C.

SSL decryption policy


D.

comfort pages


Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions