Download Palo Alto Networks.PCNSE.TestKing.2019-04-26.95q.vcex

Download Exam

File Info

Exam Palo Alto Networks Certified Network Security Engineer
Number PCNSE
File Name Palo Alto Networks.PCNSE.TestKing.2019-04-26.95q.vcex
Size 3 MB
Posted Apr 26, 2019
Download Palo Alto Networks.PCNSE.TestKing.2019-04-26.95q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which CLI command is used to simulate traffic going through the firewall and determine which Security policy rule, NAT translation, static route, or PBF rule will be triggered by the traffic?


  1. check
  2. find
  3. test
  4. sim
Correct answer: C
Explanation:
Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html
Reference: http://www.shanekillen.com/2014/02/palo-alto-useful-cli-commands.html



Question 2

Refer to exhibit. 
  
An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported excessive traffic on the corporate WAN. 
How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all the existing monitoring/security platforms?


  1. Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services.
  2. Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW.
  3. Configure log compression and optimization features on all remote firewalls.
  4. Any configuration on an M-500 would address the insufficient bandwidth concerns.
Correct answer: C



Question 3

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. 
Which two mandatory options are used to configure a VLAN interface? (Choose two.)


  1. Virtual router
  2. Security zone
  3. ARP entries
  4. Netflow Profile
Correct answer: AB



Question 4

An administrator has been asked to configure a Palo Alto Networks NGFW to provide protection against worms and trojans. 
Which Security Profile type will protect against worms and trojans?


  1. Anti-Spyware
  2. Instruction Prevention
  3. File Blocking
  4. Antivirus
Correct answer: D
Explanation:
Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/security-profiles
Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/security-profiles



Question 5

A company needs to preconfigure firewalls to be sent to remote sites with the least amount of preconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers. 
Which VPN configuration would adapt to changes when deployed to the future site?


  1. Preconfigured GlobalProtect satellite
  2. Preconfigured GlobalProtect client
  3. Preconfigured IPsec tunnels
  4. Preconfigured PPTP Tunnels
Correct answer: A



Question 6

If a template stack is assigned to a device and the stack includes three templates with overlapping settings, which settings are published to the device when the template stack is pushed?


  1. The settings assigned to the template that is on top of the stack.
  2. The administrator will be promoted to choose the settings for that chosen firewall.
  3. All the settings configured in all templates.
  4. Depending on the firewall location, Panorama decides with settings to send.
Correct answer: A



Question 7

To connect the Palo Alto Networks firewall to AutoFocus, which setting must be enabled?


  1. Device>Setup>Services>AutoFocus
  2. Device> Setup>Management >AutoFocus
  3. AutoFocus is enabled by default on the Palo Alto Networks NGFW
  4. Device>Setup>WildFire>AutoFocus
  5. Device>Setup> Management> Logging and Reporting Settings
Correct answer: B
Explanation:
Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/getting-started/enable-autofocus-threat-intelligence
Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/getting-started/enable-autofocus-threat-intelligence



Question 8

Which two virtualization platforms officially support the deployment of Palo Alto Networks VM-Series firewalls? (Choose two.)


  1. Red Hat Enterprise Virtualization (RHEV)
  2. Kernel Virtualization Module (KVM)
  3. Boot Strap Virtualization Module (BSVM)
  4. Microsoft Hyper-V
Correct answer: BD
Explanation:
Reference: https://www.paloaltonetworks.com/products/secure-the-network/virtualized-next-generation-firewall/vm-series
Reference: https://www.paloaltonetworks.com/products/secure-the-network/virtualized-next-generation-firewall/vm-series



Question 9

Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OSĀ® software?


  1. XML API
  2. Port Mapping
  3. Client Probing
  4. Server Monitoring
Correct answer: A
Explanation:
Captive Portal and the other standard user mapping methods might not work for certain types of user access. For example, the standard methods cannot add mappings of users connecting from a third-party VPN solution or users connecting to a 802.1x-enabled wireless network. For such cases, you can use the PAN-OS XML API to capture login events and send them to the PAN-OS integrated User-ID agent Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/group-mapping#id93306080-fd9b-4f1b-96a6-4bfe1c8e69df
Captive Portal and the other standard user mapping methods might not work for certain types of user access. For example, the standard methods cannot add mappings of users connecting from a third-party VPN solution or users connecting to a 802.1x-enabled wireless network. For such cases, you can use the PAN-OS XML API to capture login events and send them to the PAN-OS integrated User-ID agent 
Reference: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/group-mapping#id93306080-fd9b-4f1b-96a6-4bfe1c8e69df



Question 10

Decrypted packets from the website https://www.microsoft.com will appear as which application  and service within the Traffic log?


  1. web-browsing and 443
  2. SSL and 80
  3. SSL and 443
  4. web-browsing and 80
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files