Download Palo Alto Networks Certified Security Engineer.PassLeader.PCNSE.v22-041.2022-06-19.1e.313q.vcex

Download Exam

File Info

Exam Palo Alto Networks Certified Network Security Engineer
Number PCNSE
File Name Palo Alto Networks Certified Security Engineer.PassLeader.PCNSE.v22-041.2022-06-19.1e.313q.vcex
Size 13.93 Mb
Posted June 19, 2022
Downloads 8
Download Palo Alto Networks Certified Security Engineer.PassLeader.PCNSE.v22-041.2022-06-19.1e.313q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

A company.com wants to enable Application Override. Given the following screenshot:
Which two statements are true if Source and Destination traffic match the Application Override policy? (Choose two)

    

  • A: Traffic that matches "rtp-base" will bypass the App-ID and Content-ID engines.
  • B: Traffic will be forced to operate over UDP Port 16384.
  • C: Traffic utilizing UDP Port 16384 will now be identified as "rtp-base".
  • D: Traffic utilizing UDP Port 16384 will bypass the App-ID and Content-ID engines.

Correct Answer: CD

An application override policy is changes how the Palo Alto Networks firewall classifies network traffic into applications. An application override with a custom application prevents the session from being processed by the App-ID engine, which is a Layer-7 inspection.
https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-Policy/ta-p/60044




Question 2

Which three fields can be included in a pcap filter? (Choose three)

  • A: Egress interface
  • B: Source IP
  • C: Rule number
  • D: Destination IP
  • E: Ingress interface

Correct Answer: BDE

https://knowledgebase.paloaltonetworks.com/servlet/rtaImage?eid=ka10g000000U0KT&feoid=00N0g000003VPSv&refid=0EM0g000001Ja97




Question 3

What are three possible verdicts that WildFire can provide for an analyzed sample? (Choose three)

  • A: Clean
  • B: Bengin
  • C: Adware
  • D: Suspicious
  • E: Grayware
  • F: Malware

Correct Answer: BEF

The WildFire verdicts are: Benign, Grayware, Malware.
https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/monitoring/log-severity-levels-and-wildfire-verdicts




Question 4

A logging infrastructure may need to handle more than 10,000 logs per second.
Which two options support a dedicated log collector function? (Choose two)

  • A: Panorama virtual appliance on ESX(i) only
  • B: M-500
  • C: M-100 with Panorama installed
  • D: M-100

Correct Answer: BD




Question 5

What are three valid method of user mapping? (Choose three)

  • A: Syslog
  • B: XML API
  • C: 802.1X
  • D: WildFire
  • E: Server Monitoring

Correct Answer: ABE

https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/user-id/map-ip-addresses-to-users.html#id61f141da-8b89-49c9-b34a-ed11b434d1db




Question 6

A network security engineer is asked to provide a report on bandwidth usage. Which tab in the ACC provides the information needed to create the report?

  • A: Blocked Activity
  • B: Bandwidth Activity
  • C: Threat Activity
  • D: Network Activity

Correct Answer: D

The Network Activity tab of the Application Command Center (ACC) displays an overview of traffic and user activity on your network including:
Top applications in use
Top users who generate traffic (with a drill down into the bytes, content, threats or URLs accessed by the user)
Most used security rules against which traffic matches occur 
In addition, you can also view network activity by source or destination zone, region, or IP address, ingress or egress interfaces, and GlobalProtect host information such as the operating systems of the devices most commonly used on the network.
https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/monitoring/acc-tabs.html




Question 7

Which three options does the WF-500 appliance support for local analysis? (Choose three)

  • A: E-mail links
  • B: APK files
  • C: jar files
  • D: PNG files
  • E: Portable Executable (PE) files

Correct Answer: ACE

    




Question 8

After pushing a security policy from Panorama to a PA-3020 firewall, the firewall administrator notices that traffic logs from the PA-3020 are not appearing in Panorama's traffic logs. What could be the problem?

  • A: A Server Profile has not been configured for logging to this Panorama device.
  • B: Panorama is not licensed to receive logs from this particular firewall.
  • C: The firewall is not licensed for logging to this Panorama device.
  • D: None of the firewall's policies have been assigned a Log Forwarding profile

Correct Answer: D

In order to see entries in the Panorama Monitor > Traffic or Monitor > Log screens, a profile must be created on the Palo Alto Networks device (or pushed from Panorama) to forward log traffic to Panorama.
Steps:
1. Go to Policies > Security and open the Options for a rule.
2. Under Log Setting, select New for Log Forwarding to create a new forwarding profile:

    

Etc.
https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-a-Profile-to-Forward-Logs-to-Panorama/ta-p/54038




Question 9

Which two statements are correct for the out-of-box configuration for Palo Alto Networks NGFWs? (Choose two)

  • A: The devices are pre-configured with a virtual wire pair out the first two interfaces.
  • B: The devices are licensed and ready for deployment.
  • C: The management interface has an IP address of 192.168.1.1 and allows SSH and HTTPSconnections.
  • D: A default bidirectional rule is configured that allows Untrust zone traffic to go to the Trust zone.
  • E: The interfaces are pingable.

Correct Answer: AC

https://popravak.wordpress.com/2014/07/31/initial-setup-of-palo-alto-networks-next-generation-firewall/




Question 10

What are three valid actions in a File Blocking Profile? (Choose three)

  • A: Forward
  • B: Block
  • C: Alret
  • D: Upload
  • E: Reset-both
  • F: Continue

Correct Answer: BCF

You can configure a file blocking profile with the following actions:
Forward - When the specified file type is detected, the file is sent to WildFire for analysis. A log is also generated in the data filtering log.
Block - When the specified file type is detected, the file is blocked and a customizable block page is presented to the user. A log is also generated in the data filtering log.
Alert - When the specified file type is detected, a log is generated in the data filtering log.  
Continue - When the specified file type is detected, a customizable response page is presented to the user. The user can click through the page to download the file. A log is also generated in the data filtering log. Because this type of forwarding action requires user interaction, it is only applicable for web traffic.
Continue-and-forward - When the specified file type is detected, a customizable continuation page is presented to the user. The user can click through the page to download the file. If the user clicks through the continue page to download the file, the file is sent to WildFire for analysis.
A log is also generated in the data filtering log.
https://www.paloaltonetworks.com/documentation/61/pan-os/pan-os/policy/file-blocking-profiles.html










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files