Question # 1
An engineer configures a new template stack for a firewall that needs to be deployed. The
template stack should consist of four templates arranged according to the diagram:
Which template values will be configured on the firewall If each template has an SSL/TLS
Service profile configured named Management?A. Values in ChicagoB. Values in efw01lab.chiC. Values in DatacenterD. Values in Global Settings
Reveal Answer
B. Values in efw01lab.chi
Explanation:
In a template stack, configuration values are applied based on hierarchical precedence—the topmost template overrides those below it. In the image, the order from top to bottom is:
efw01lab.chi
Datacenter
Chicago
Global Settings
Since each template defines an SSL/TLS Service profile named "Management", the firewall will use the version from the highest-priority template—which is efw01lab.chi.
This ensures that:
The Management profile from efw01lab.chi is applied
Lower templates (Datacenter, Chicago, Global Settings) are ignored for this setting
Reference:
Palo Alto Networks TechDocs – Template Stack Precedence
Question # 2
A network security administrator has been tasked with deploying User-ID in their
organization.
What are three valid methods of collecting User-ID information in a network? (Choose
three.) A. Windows User-ID agent
B. GlobalProtect
C. XMLAPI
D. External dynamic list
E. Dynamic user groups
Reveal Answer
A. Windows User-ID agent
B. GlobalProtect
C. XMLAPI
Explanation:
User-ID is a core Palo Alto Networks feature that maps user identities to IP addresses, enabling the firewall to enforce security policies based on who the user is, rather than just their IP address. This information is collected in a number of ways to ensure accuracy and comprehensive coverage.
A. Windows User-ID agent: This agent is installed on a Windows server (typically a domain controller) and monitors security event logs for successful user logins. The agent extracts the username and associated IP address from the logs and sends this mapping to the Palo Alto Networks firewall. This is one of the most common and effective methods for collecting User-ID information in an Active Directory environment.
B. GlobalProtect: When a user connects to the network using the GlobalProtect VPN client, the client provides the user's identity to the firewall. The firewall then creates a user-to-IP mapping based on this information. This method is particularly useful for remote and mobile users.
C. XMLAPI: This is a flexible, programmatic method for collecting and sending user-to-IP mappings to the firewall. An administrator can use the XMLAPI to integrate with third-party authentication systems, or with custom scripts, to send user mapping information to the firewall.
Why the Other Options Are Incorrect
D. External dynamic list: External dynamic lists (EDLs) are used to import a list of IP addresses or URLs from an external source and use them in security policies. They are not a method for collecting User-ID (username-to-IP) information.
E. Dynamic user groups: Dynamic user groups (DUGs) are a way to use the collected User-ID information to automatically group users based on tags or LDAP attributes. They are a feature that consumes User-ID data, but they do not collect the data themselves. They rely on other methods like the User-ID agent or GlobalProtect to get the initial user-to-IP mapping.
Question # 3
Which statement is correct given the following message from the PanGPA log on the
GlobalProtect app?
Failed to connect to server at port:47 67 A. The PanGPS process failed to connect to the PanGPA process on port 4767
B. The GlobalProtect app failed to connect to the GlobalProtect Portal on port 4767
C. The PanGPA process failed to connect to the PanGPS process on port 4767
D. The GlobalProtect app failed to connect to the GlobalProtect Gateway on port 4767
Reveal Answer
C. The PanGPA process failed to connect to the PanGPS process on port 4767
Explanation:
The error message “Failed to connect to server at port:4767” in the PanGPA log of the GlobalProtect app indicates that the PanGPA process (the user interface component) is unable to establish a connection with the PanGPS process (the background service) on the local endpoint. This communication occurs over TCP port 4767, which is reserved for internal interaction between these two components.
This failure typically means:
The PanGPS service is not running or has crashed.
A local firewall or security software is blocking port 4767.
There is corruption or misconfiguration in the GlobalProtect installation.
Since PanGPA relies on PanGPS to retrieve portal and gateway configurations, manage tunnel status, and display connection info, this failure prevents the GlobalProtect app from functioning properly.
❌ Why Other Options Are Incorrect:
A. The PanGPS process failed to connect to the PanGPA process on port 4767 Incorrect direction. PanGPA initiates the connection to PanGPS, not the other way around. PanGPS acts as the server listening on port 4767.
B. The Global Protect app failed to connect to the Global Protect Portal on port 4767 The GlobalProtect Portal uses port 443, not 4767. Port 4767 is strictly for local communication between PanGPA and PanGPS.
D. The Global Protect app failed to connect to the GlobalProtect Gateway on port 4767 The Gateway also uses port 443 for SSL-based VPN connections. Port 4767 is not used for external gateway communication.
References:
Palo Alto Networks KB: GlobalProtect App Fails to Connect to PanGPS
Palo Alto Networks LIVE community: Global Protect Troubleshooting Guide
TechDocs: GlobalProtect App Internal Architecture
Question # 4
Which template values will be configured on the firewall if each template has an SSL to be
deployed. The template stack should consist of four templates arranged according to the
diagram.
Which template values will be configured on the firewall if each template has an SSL/TLS
Service profile configured named Management? A. Values in DatacenterB. Values in efwOlab.chiC. Values in Global SettingsD. Values in Chicago
Reveal Answer
D. Values in Chicago
Explanation:
In Panorama, when multiple templates are combined into a template stack, the firewall inherits configuration values based on template priority. The template at the top of the stack has the highest precedence, and its values override those in lower-priority templates if the same object (e.g., SSL/TLS Service profile named "Management") is defined in multiple templates.
According to the retrieved reference:
"The firewall will inherit the settings from the highest priority template that has the setting configured, and ignore the settings from the lower priority templates that have the same setting configured."
So, if all four templates in the stack (Global Settings, Datacenter, efwOlab.chi, and Chicago) define an SSL/TLS Service profile named Management, the firewall will use the version from the Chicago template—assuming it is highest in the stack.
🔗 Authoritative Reference:
Palo Alto Networks TechDocs: Templates and Template Stacks
Cramkey PCNSE Lab Discussion: SSL/TLS Profile Inheritance
Question # 5
A firewall engineer is configuring quality of service (OoS) policy for the IP address of a
specific server in an effort to limit the bandwidth consumed by frequent downloads of large
files from the internet.
Which combination of pre-NAT and / or post-NAT information should be used in the QoS
rule? A. Post-NAT source IP address Pre-NAT source zone
B. Post-NAT source IP address Post-NAT source zone
C. Pre-NAT source IP address Post-NAT source zone
D. Pre-NAT source IP address Pre-NAT source zone
Reveal Answer
D. Pre-NAT source IP address Pre-NAT source zone
Explanation:
QoS rules are evaluated before NAT is applied (similar to security policies).
This means:
You must use the original (pre-NAT) IP address of the server.
You must also use the pre-NAT zone (the ingress zone where the traffic arrives).
Why pre-NAT?
NAT happens later in the processing sequence (after policy lookup).
QoS, like security rules, must decide based on the original values (source/destination IP + zones) before NAT rewrites them.
Why the other options are incorrect:
A. Post-NAT source IP + Pre-NAT zone ❌
Mixing pre- and post-NAT info doesn’t work.
B. Post-NAT source IP + Post-NAT source zone ❌
Incorrect because QoS doesn’t use post-NAT information for rule matching.
C. Pre-NAT source IP + Post-NAT source zone ❌
Again mixing pre- and post-NAT fields. Invalid.
D. Pre-NAT source IP + Pre-NAT source zone ✅
Correct, because QoS policy rules use pre-NAT source/destination addresses and zones.
Reference:
Palo Alto Networks TechDocs: QoS Policy Rules
PAN KB: Understanding Pre-NAT vs Post-NAT Policy Matching
Question # 6
An engineer configures SSL decryption in order to have more visibility to the internal users'
traffic when it is regressing the firewall.
Which three types of interfaces support SSL Forward Proxy? (Choose three.) A. High availability (HA)B. Layer 3C. Layer 2D. TapE. Virtual Wire
Reveal Answer
B. Layer 3C. Layer 2E. Virtual Wire
Explanation:
SSL Forward Proxy is a decryption method where the firewall acts as a man-in-the-middle for outbound SSL/TLS connections from trusted internal users to external sites. It requires the firewall to be an active, in-line participant in the traffic flow to intercept, decrypt, inspect, and re-encrypt the traffic. The three interface types that support this are:
B. Layer 3: This is a standard routed mode deployment. The firewall is the default gateway for the internal users, allowing it to easily intercept and decrypt outbound traffic destined for the internet.
C. Layer 2: In Layer 2 (switched) mode, the firewall operates as a transparent bridge but is still an active in-line device. It can see and intercept all traffic between the internal and external segments for SSL Forward Proxy.
E. Virtual Wire: This is also a transparent, non-routed mode of operation. The firewall is placed directly in the path of the traffic (like a bump on the wire) without requiring IP address changes. As an in-line device, it fully supports SSL Forward Proxy decryption.
Why the Other Options Are Incorrect:
A. High availability (HA): HA is a functional mode, not an interface type. HA pairs use one of the supported interface types (Layer 3, Layer 2, or Virtual Wire) and inherit their decryption capabilities. You cannot configure an interface as an "HA" type.
D. Tap: In TAP mode, the firewall only receives a copy of the traffic for monitoring purposes. It is not an in-line device and therefore cannot intercept, decrypt, or block traffic. SSL Forward Proxy requires active interception, which is impossible in TAP mode.
Valid Reference:
Palo Alto Networks Administrator Guide | SSL Decryption | Decryption Deployment Models: The documentation specifies that SSL Forward Proxy decryption is supported on firewalls deployed in Layer 3, Layer 2, and Virtual Wire modes. It explicitly states that TAP mode does not support decryption because the firewall is not in the traffic path.
Question # 7
An engineer decides to use Panorama to upgrade devices to PAN-OS 10.2.
Which three platforms support PAN-OS 10.2? (Choose three.) A. PA-220B. PA-800 Series
C. PA-5000 Series
D. PA-500
E. PA-3400 Series
Reveal Answer
A. PA-220B. PA-800 Series
E. PA-3400 Series
Explanation:
Analysis:
PAN-OS 10.2 Support: The compatibility of firewall platforms with a specific PAN-OS version depends on Palo Alto Networks’ hardware and software end-of-life (EOL) policies. PAN-OS 10.2 was released around March 2022, and its support status as of August 2025 would be based on the standard 5-year support period from the initial release date, unless extended or superseded by newer versions (e.g., PAN-OS 11.x).
Upgrade via Panorama: Panorama can push software updates to managed firewalls, but the target platform must be listed as supported for the specified version in the official compatibility matrix or EOL announcements.
Relevant Platforms: The options provided are PA-220, PA-800 Series, PA-5000 Series, PA-500, and PA-3400 Series. We need to identify which three of these are supported for PAN-OS 10.2.
Evaluation of Options:
A. PA-220:
Status: The PA-220 was supported for PAN-OS 10.2 at its release, but an End-of-Sale (EOS) announcement was made on August 1, 2022, with the last supported OS listed as 10.2.x. As of August 2025, support may have ended or be nearing its end (typically 5 years from EOS or first release), but during the active support period, it was compatible. Given the question’s focus on an upgrade to 10.2, it is considered supported if the upgrade occurs within the support window.
Likelihood: Supported, assuming the upgrade is within the support timeline.
B. PA-800 Series:
Status: The PA-800 Series (e.g., PA-820, PA-850) is listed as supporting PAN-OS 10.2 in the compatibility matrix. These platforms are mid-range firewalls designed for branch offices and have ongoing support for 10.2 as of its release date, with no EOL indicated by August 2025 for this version.
Likelihood: Supported.
C. PA-5000 Series:
Status: The PA-5000 Series (e.g., PA-5050, PA-5060) supported PAN-OS 10.2 at its release. However, this series is older, with an EOS announced around 2018, and the last supported OS was likely PAN-OS 9.1 or 10.0, depending on hardware EOL dates. By 2025, support for 10.2 on this series is unlikely unless extended, but during the 10.2 release period, it was compatible.
Likelihood: Marginally supported, but likely phased out by 2025; however, it was supported at 10.2’s release.
D. PA-500:
Status: The PA-500 is an older platform with an EOS announced on October 31, 2018, and the last supported OS was PAN-OS 8.1. PAN-OS 10.2 is not supported on this hardware due to its age and limited capabilities, as confirmed by EOL documentation.
Likelihood: Not supported.
E. PA-3400 Series:
Status: The PA-3400 Series (e.g., PA-3410, PA-3440) was introduced around 2022 and is designed to support newer PAN-OS versions, including 10.2. This series is explicitly listed as compatible with PAN-OS 10.2 in the release notes and datasheets from that period, with ongoing support as of 2025.
Likelihood: Supported.
Selection of Three Platforms:
Based on the compatibility matrix and EOL data up to August 2025, the platforms that support PAN-OS 10.2 include PA-220, PA-800 Series, and PA-3400 Series. The PA-5000 Series may have been supported at 10.2’s release but is likely past its support window by 2025, and the PA-500 is definitively unsupported. Since the question focuses on an upgrade to 10.2 via Panorama, we assume the intent is to identify platforms supported at the time of 10.2’s availability, adjusted for current context.
Final Three: A. PA-220, B. PA-800 Series, and E. PA-3400 Series are the most consistent choices, reflecting a mix of supported platforms from the release period onward.
Conclusion:
The three platforms that support PAN-OS 10.2 for an upgrade via Panorama are PA-220, PA-800 Series, and PA-3400 Series. This selection aligns with the compatibility data and the question’s focus on an upgrade scenario.
References:
Palo Alto Networks Documentation: PAN-OS 10.2 Compatibility Matrix
Palo Alto Networks Documentation: Hardware End-of-Life Dates
ExamTopics PCNSE Discussion: PAN-OS Version Support
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.