Download Palo Alto Networks.PCNSE.Prep4Sure.2020-05-28.94q.vcex

Download Exam

File Info

Exam Palo Alto Networks Certified Network Security Engineer
Number PCNSE
File Name Palo Alto Networks.PCNSE.Prep4Sure.2020-05-28.94q.vcex
Size 3 MB
Posted May 28, 2020
Download Palo Alto Networks.PCNSE.Prep4Sure.2020-05-28.94q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be 
triggered by the traffic? 


  1. check
  2. find
  3. test
  4. sim
Correct answer: C
Explanation:
Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html
Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html



Question 2

Refer to the exhibit. 
  
An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported 
excessive traffic on the corporate WAN. 
How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all the existing monitoring/security platforms?


  1. Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services.
  2. Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW.
  3. Configure log compression and optimization features on all remote firewalls.
  4. Any configuration on an M-500 would address the insufficient bandwidth concerns.
Correct answer: C



Question 3

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. 
Which two mandatory options are used to configure a VLAN interface? (Choose two.)


  1. Virtual router
  2. Security zone
  3. ARP entries 
  4. Netflow Profile
Correct answer: AB



Question 4

A company needs to preconfigure firewalls to be sent to remote sites with the least amount of preconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers. 
Which VPN configuration would adapt to changes when deployed to the future site?


  1. Preconfigured GlobalProtect satellite
  2. Preconfigured GlobalProtect client
  3. Preconfigured IPsec tunnels
  4. Preconfigured PPTP Tunnels
Correct answer: A



Question 5

An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall. 
Which priority is correct for the passive firewall?


  1. 0
  2. 99
  3. 1
  4. 255
Correct answer: D
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/high-availability/device-priority-and-preemption
Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/high-availability/device-priority-and-preemption



Question 6

An administrator pushes a new configuration from Panorama to a pair of firewalls that are configured as an active/passive HA pair. 
Which NGFW receives the configuration from Panorama?


  1. The passive firewall, which then synchronizes to the active firewall
  2. The active firewall, which then synchronizes to the passive firewall
  3. Both the active and passive firewalls, which then synchronize with each other
  4. Both the active and passive firewalls independently, with no synchronization afterward
Correct answer: C



Question 7

An administrator cannot see any Traffic logs from the Palo Alto Networks NGFW in Panorama reports. The configuration problem seems to be on the firewall. 
Which settings, if configured incorrectly, most likely would stop only Traffic logs from being sent from the firewall to Panorama? 


  1.   
  2.   
  3.   
  4.   
Correct answer: D
Explanation:



Question 8

When configuring a GlobalProtect Portal, what is the purpose of specifying an Authentication Profile?


  1. To enable Gateway authentication to the Portal
  2. To enable Portal authentication to the Gateway
  3. To enable user authentication to the Portal
  4. To enable client machine authentication to the Portal
Correct answer: C
Explanation:
The additional options of Browser and Satellite enable you to specify the authentication profile to use for specific scenarios. Select Browser to specify the authentication profile to use to authenticate a user accessing the portal from a web browser with the intent of downloading the GlobalProtect agent (Windows and Mac). Select Satellite to specify the authentication profile to use to authenticate the satellite. Reference https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/globalprotect/network-globalprotect-portals
The additional options of Browser and Satellite enable you to specify the authentication profile to use for specific scenarios. Select Browser to specify the authentication profile to use to authenticate a user accessing the portal from a web browser with the intent of downloading the GlobalProtect agent (Windows and Mac). Select Satellite to specify the authentication profile to use to authenticate the satellite. 
Reference https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/globalprotect/network-globalprotect-portals



Question 9

How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?


  1. Configure the option for “Threshold”.
  2. Disable automatic updates during weekdays.
  3. Automatically “download only” and then install Applications and Threats later, after the administrator approves the update.
  4. Automatically “download and install” but with the “disable new applications” option used.
Correct answer: C



Question 10

An administrator encountered problems with inbound decryption. Which option should the administrator investigate as part of triage? 


  1. Security policy rule allowing SSL to the target server
  2. Firewall connectivity to a CRL
  3. Root certificate imported into the firewall with “Trust” enabled
  4. Importation of a certificate from an HSM
Correct answer: A
Explanation:
Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/configure-ssl-inbound-inspection
Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/configure-ssl-inbound-inspection









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files