Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCNSE Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

A network security engineer is attempting to peer a virtual router on a PAN-OS firewall with an external router using the BGP protocol. The peer relationship is not establishing. What command could the engineer run to see the current state of the BGP state between the two devices?

Options:

A.

show routing protocol bgp summary


B.

show routing protocol bgp rib-out


C.

show routing protocol bgp state


D.

show routing protocol bgp peer


Questions # 62:

Given the following snippet of a WildFire submission log, did the end user successfully download a file?

Question # 62

Options:

A.

No, because the URL generated an alert.


B.

Yes, because both the web-browsing application and the flash file have the 'alert" action.


C.

Yes, because the final action is set to "allow.''


D.

No, because the action for the wildfire-virus is "reset-both."


Questions # 63:

A firewall administrator has confirm reports of a website is not displaying as expected, and wants to ensure that decryption is not causing the issue. Which three methods can the administrator use to determine if decryption is causing the website to fail? (Choose three.)

Options:

A.

Move the policy with action decrypt to the top of the decryption policy rulebase.


B.

Temporarily disable SSL decryption for all websites to troubleshoot the issue.


C.

Create a policy-based “No Decrypt” rule in the decryption policy to exclude specific traffic from decryption.


D.

Investigate decryption logs of the specific traffic to determine reasons for failure.


E.

Disable SSL handshake logging.


Questions # 64:

An administrator encountered problems with inbound decryption. Which option should the administrator investigate as part of triage?

Options:

A.

Security policy rule allowing SSL to the target server


B.

Firewall connectivity to a CRL


C.

Root certificate imported into the firewall with “Trust” enabled


D.

Importation of a certificate from an HSM


Questions # 65:

Which tool will allow review of the policy creation logic to verify that unwanted traffic is not allowed?

Options:

A.

Managed Devices Health


B.

Test Policy Match


C.

Preview Changes


D.

Policy Optimizer


Questions # 66:

A firewall administrator configures the HIP profiles on the edge firewall where GlobalProtect is enabled, and adds the profiles to security rules. The administrator wants to redistribute the HIP reports to the data center firewalls to apply the same access restrictions using HIP profiles. However, the administrator can only see the HIP match logs on the edge firewall but not on the data center firewall

What are two reasons why the administrator is not seeing HIP match logs on the data center firewall? (Choose two.)

Options:

A.

Log Forwarding Profile is configured but not added to security rules in the data center firewall.


B.

HIP profiles are configured but not added to security rules in the data center firewall.


C.

User ID is not enabled in the Zone where the users are coming from in the data center firewall.


D.

HIP Match log forwarding is not configured under Log Settings in the device tab.


Questions # 67:

Which three authentication types can be used to authenticate users? (Choose three.)

Options:

A.

Local database authentication


B.

PingID


C.

Kerberos single sign-on


D.

GlobalProtect client


E.

Cloud authentication service


Questions # 68:

An administrator plans to install the Windows-Based User-ID Agent to prevent credential phishing.

Which installer package file should the administrator download from the support site?

Options:

A.

UaCredlnstall64-11.0.0.msi


B.

GlobalProtect64-6.2.1.msi


C.

Talnstall-11.0.0.msi


D.

Ualnstall-11.0.0msi


Questions # 69:

Which two policy components are required to block traffic in real time using a dynamic user group (DUG)? (Choose two.)

Options:

A.

A Deny policy for the tagged traffic


B.

An Allow policy for the initial traffic


C.

A Decryption policy to decrypt the traffic and see the tag


D.

A Deny policy with the "tag" App-ID to block the tagged traffic


Questions # 70:

A firewall engineer supports a mission-critical network that has zero tolerance for application downtime. A best-practice action taken by the engineer is configure an applications and Threats update schedule with a new App-ID threshold of 48 hours. Which two additional best-practice guideline actions should be taken with regard to dynamic updates? (Choose two.)

Options:

A.

Create a Security policy rule with an application filter to always allow certain categories of new App-IDs.


B.

Click "Review Apps" after application updates are installed in order to assess how the changes might impact Security policy.


C.

Select the action "download-only" when configuring an Applications and Threats update schedule.


D.

Configure an Applications and Threats update schedule with a threshold of 24 to 48 hours


Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions