Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCNSE Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which two actions would be part of an automatic solution that would block sites with untrusted certificates without enabling SSL Forward Proxy? (Choose two.)

Options:

A.

Create a no-decrypt Decryption Policy rule.


B.

Configure an EDL to pull IP addresses of known sites resolved from a CRL.


C.

Create a Dynamic Address Group for untrusted sites


D.

Create a Security Policy rule with vulnerability Security Profile attached.


E.

Enable the “Block sessions with untrusted issuers” setting.


Questions # 82:

A network administrator is troubleshooting an issue with Phase 2 of an IPSec VPN tunnel The administrator determines that the lifetime needs to be changed to match the peer. Where should this change be made?

Options:

A.

IPSec Tunnel settings


B.

IKE Crypto profile


C.

IPSec Crypto profile


D.

IKE Gateway profile


Questions # 83:

Which two items must be configured when implementing application override and allowing traffic through the firewall? (Choose two.)

Options:

A.

Application filter


B.

Application override policy rule


C.

Security policy rule


D.

Custom app


Questions # 84:

Certain services in a customer implementation are not working, including Palo Alto Networks Dynamic version updates. Which CLI command can the firewall administrator use to verify if the service routes were correctly installed and that they are active in the Management Plane?

Options:

A.

debug dataplane internal vif route 255


B.

show routing route type management


C.

debug dataplane internal vif route 250


D.

show routing route type service-route


Questions # 85:

What can the Log Forwarding built-in action with tagging be used to accomplish?

Options:

A.

Block the source zones of selected unwanted traffic.


B.

Block the destination IP addresses of selected unwanted traffic.


C.

Forward selected logs to the Azure Security Center.


D.

Block the destination zones of selected unwanted traffic.


Questions # 86:

An engineer has been asked to limit which routes are shared by running two different areas within an OSPF implementation. However, the devices share a common link for communication. Which virtual router configuration supports running multiple instances of the OSPF protocol over a single link?

Options:

A.

OSPFV3


B.

ECMP


C.

ASBR


D.

OSBF


Questions # 87:

An administrator is creating a new Dynamic User Group to quarantine users for suspicious activity.

Which two objects can Dynamic User Groups use as match conditions for group membership? (Choose two.)

Options:

A.

Source IP address


B.

Dynamic tags


C.

Static tags


D.

Ldap attributes


Questions # 88:

What is the best definition of the Heartbeat Interval?

Options:

A.

The interval in milliseconds between hello packets


B.

The frequency at which the HA peers check link or path availability


C.

The frequency at which the HA peers exchange ping


D.

The interval during which the firewall will remain active following a link monitor failure


Questions # 89:

An administrator has been tasked with configuring decryption policies,

Which decryption best practice should they consider?

Options:

A.

Consider the local, legal, and regulatory implications and how they affect which traffic can be decrypted.


B.

Decrypt all traffic that traverses the firewall so that it can be scanned for threats.


C.

Place firewalls where administrators can opt to bypass the firewall when needed.


D.

Create forward proxy decryption rules without Decryption profiles for unsanctioned applications.


Questions # 90:

An engineer is pushing configuration from Panorama to a managed firewall What happens when the pushed Panorama configuration has Address Object names that duplicate the Address Objects already configured on the firewall?

Options:

A.

The firewall ignores only the pushed objects that have the same name as the locally configured objects, and it will commit the rest of the pushed configuration.


B.

The firewall fully commits all of the pushed configuration and overwrites its locally configured objects


C.

The firewall rejects the pushed configuration, and the commit fails.


D.

The firewall renames the duplicate local objects with "-1" at the end signifying they are clones; it will update the references to the objects accordingly and fully commit the pushed configuration.


Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions