Question # 1
How can a firewall engineer bypass App-ID and content inspection features on a Palo Alto
Networks firewall when troubleshooting? A. Create a custom application, define its properties and signatures, and ensure all
scanning options in the "Advanced" tab are uncheckedB. Create a custom application, define its properties, then create an application override
and reference the custom applicationC. Create a new security rule specifically for the affected traffic, but do not reference any
Security Profiles inside the ruleD. Create a new security rule specifically for the affected traffic, and select "Disable Server
Response Inspection"
Reveal Answer
B. Create a custom application, define its properties, then create an application override
and reference the custom application
Explanation:
When troubleshooting, sometimes you need to bypass App-ID and content inspection so that traffic is forwarded purely based on port/protocol without being altered or blocked by application signatures or content scanning.
The supported method in Palo Alto Networks firewalls is to use an Application Override Policy:
Create a custom application that represents the traffic (e.g., based on port and protocol).
Apply an Application Override Policy to match the specific traffic and map it to the custom app.
This tells the firewall to skip App-ID and content inspection for that traffic, allowing raw forwarding for troubleshooting.
❌ Why the other options are incorrect:
A. Create a custom application … ensure scanning options unchecked
Custom applications alone don’t bypass App-ID processing or content inspection. You still need the App Override policy for that.
C. Create a new security rule without Security Profiles
This only skips threat/content profiles (like AV, Anti-Spyware, URL filtering), but App-ID inspection still happens. Doesn’t fully bypass inspection.
V
D. Create a new security rule and disable Server Response Inspection
This only skips Server Response Inspection (SRI) for HTTP responses, not full App-ID or content inspection. Very limited.
📖 Reference:
Palo Alto Networks Docs – Application Override:
“An Application Override policy allows you to bypass App-ID and Content-ID inspection for specified traffic. The firewall assigns the traffic to a custom application and forwards it without further inspection.”
Question # 2
Which GloDalProtecI gateway setting is required to enable split-tunneting by access route,
destination domain and application? A. Tunnel modeB. Satellite modeC. IPSec modeD. No Direct Access to local networks
Reveal Answer
A. Tunnel mode
Explanation:
Why Tunnel Mode?
1.Split-Tunneling Requirements:
Access Route: Defines which traffic goes through the VPN (e.g., corporate subnets).
Destination Domain: Allows tunneling only for specific domains (e.g., *.company.com).
Application: Controls VPN routing per application (e.g., only tunnel Outlook).
Tunnel Mode is the only GlobalProtect gateway setting that supports all three split-tunneling methods simultaneously.
2.How It Works:
In Tunnel Mode, the GlobalProtect client:
Evaluates traffic against split-tunnel rules (routes/domains/apps).
Selectively routes matching traffic through the VPN.
Non-matching traffic (e.g., public web browsing) goes directly to the internet.
Why Not Other Options?
B. Satellite Mode Used for cloud gateways, not split-tunneling control.
C. IPSec Mode Legacy VPN (no support for domain/application-based split-tunneling).
D. No Direct Access Disables split-tunneling entirely (forces all traffic through VPN).
Key Configuration:
Under Network > GlobalProtect > Gateways > [Gateway] > Agent > Split Tunnel:
Enable Tunnel Mode.
Configure:
Access Routes (e.g., 10.0.0.0/8).
Domains (e.g., *.internal.com).
Applications (e.g., ms-outlook.exe).
Reference:
Palo Alto GlobalProtect Admin Guide:
"Tunnel Mode enables granular split-tunneling by access route, domain, and application.
Question # 3
Which User-ID mapping method should be used in a high-security environment where all IP
address-to-user mappings should always be explicitly known? A. PAN-OS integrated User-ID agentB. GlobalProtectC. Windows-based User-ID agentD. LDAP Server Profile configuration
Reveal Answer
B. GlobalProtect
Explanation:
For high-security environments where IP-to-user mappings must be explicitly known, GlobalProtect is the most reliable method. GlobalProtect is a comprehensive solution that not only provides secure remote access but also tightly integrates with the User-ID framework.
When a user connects through a GlobalProtect gateway, the gateway authenticates the user and creates a direct, explicit mapping of the user's IP address to their username. This mapping is then shared with the firewall's User-ID subsystem. This method is considered the most secure and accurate because the mapping is created and managed directly by the Palo Alto Networks platform itself, ensuring that the identity is verified and tied directly to the source IP at the time of connection.
Why the Other Options Are Incorrect
A. PAN-OS integrated User-ID agent: While PAN-OS firewalls have an integrated User-ID agent, its primary function is to monitor and collect user-to-IP mappings from sources like a directory service (LDAP) or a domain controller. This is effective but can have delays and is not as direct or explicit as a GlobalProtect-based mapping. It relies on a "pull" or "listen" mechanism.
C. Windows-based User-ID agent: This agent is installed on a Windows domain controller and listens for login events. While this is a widely used and effective method, it is still an inference-based mapping. The agent correlates a login event with an IP address, but this isn't as direct as a user-authenticated connection through a VPN tunnel. In high-security environments, the possibility of a missed or delayed log can be a concern.
D. LDAP Server Profile configuration: An LDAP server profile is used to connect to a directory service like Active Directory to authenticate users and fetch group information. It does not, by itself, create the IP-to-user mapping. It provides the user and group context for policies, but another mechanism (like a User-ID agent or GlobalProtect) is required to perform the initial IP address to user name mapping.
Question # 4
Which two scripting file types require direct upload to the Advanced WildFire portal/API for
analysis? (Choose two.) A. Ps1B. PerlC. PythonD. VBS
Reveal Answer
A. Ps1D. VBS
Explanation:
Why These File Types?
PowerShell (.ps1) and VBScript (.vbs) are scripting languages commonly used in malware.
The Advanced WildFire portal/API requires direct upload for these because:
They are not executable binaries (e.g., .exe, .dll) that can be analyzed via standard WildFire submission (e.g., email, URL).
They require specialized sandboxing to simulate execution and detect malicious behavior.
Why Not Others?
Perl (.pl) and Python (.py) can also be analyzed, but they are less commonly targeted for direct upload requirements in this context. However, the question specifies "require direct upload," and PowerShell and VBScript are the most critical due to their prevalence in attacks.
Reference:
Palo Alto WildFire Admin Guide:
"Script files (e.g., .ps1, .vbs) must be uploaded directly to the Advanced WildFire portal for analysis."
<
Question # 5
An engineer creates a set of rules in a Device Group (Panorama) to permit traffic to various
services for a specific LDAP user group. What needs to be configured to ensure Panorama can retrieve user and group information
for use in these rules? A. A service route to the LDAP server
B. A Master Device
C. Authentication Portal
D. A User-ID agent on the LDAP server
Reveal Answer
B. A Master Device
1. Problem restatement
Engineer wants to use LDAP user groups in security rules (inside a Panorama Device Group).
For that, Panorama must know the mapping of users → groups.
Question: What must be configured so Panorama can retrieve user/group info?
2.Review the options
A. A service route to the LDAP server
Service routes define the source interface/IP for management-plane traffic (like LDAP queries, syslog, DNS, etc.).
Useful only if Panorama itself is talking to LDAP.
But Panorama does not retrieve group mappings directly — firewalls (User-ID) or Master Device handle it.
❌ Not the right answer.
B. A Master Device
✅ Correct.
In Panorama, if you want to use User-ID / group-based policies in a Device Group, you must designate a Master Device.
The Master Device is a firewall (in that Device Group) that retrieves group mapping from LDAP (via User-ID or User-ID agent).
Panorama then uses that device’s mappings to show groups for policy creation.
C. Authentication Portal ❌
Auth portal (Captive Portal) is for authenticating unknown users (BYOD, guest, etc.).
Doesn’t solve LDAP group lookup in Panorama.
D. A User-ID agent on the LDAP server ❌
You can run a User-ID agent on Windows or use the firewall’s built-in User-ID.
That’s how group mappings get retrieved.
But for Panorama Device Groups, you still need to configure a Master Device to pull those mappings.
📖 Reference
Palo Alto Networks Admin Guide – “To enable group-based policy in Panorama-managed firewalls, you must configure a Master Device. The Master Device provides the group mappings (retrieved from LDAP through User-ID) to Panorama so that you can reference user groups in policies.”
Question # 6
As a best practice, which URL category should you target first for SSL decryption? A. Online Storage and BackupB. High RiskC. Health and MedicineD. Financial Services
Reveal Answer
B. High Risk
Explanation:
SSL decryption is resource-intensive, so it should be deployed strategically to maximize security ROI. The High Risk category includes sites known for malware, phishing, command-and-control (C2) activity, and other malicious content. Decrypting traffic to these sites first allows the firewall to:
Inspect encrypted threats that would otherwise evade detection.
Block dangerous traffic before it causes harm.
Prioritize limited decryption resources on the highest-risk traffic.
This approach aligns with Palo Alto Networks' best practices for phased decryption rollout, starting with the most critical threats.
Why the other options are incorrect:
A. Online Storage and Backup: While this category may contain threats, it is not the highest priority. Decrypting storage traffic can raise privacy concerns and may be subject to compliance restrictions.
C. Health and Medicine: This category is often sensitive due to privacy regulations (e.g., HIPAA). Decrypting it without careful consideration may violate compliance requirements.
D. Financial Services: This category is critical for security but often uses certificate pinning or is highly sensitive to user privacy. Decrypting financial traffic can break applications or trigger legal issues if not handled cautiously.
Reference:
Palo Alto Networks Best Practices for SSL Decryption: Recommends starting decryption with the High Risk category to quickly reduce the attack surface.
PCNSE Exam Blueprint (Domain 3: Security Policies and Profiles): Understanding decryption strategies and prioritization is key for effective security policy design.
Question # 7
Review the images: A firewall policy that permits web traffic includes the global-logs policy
is depicted. What is the result of traffic that matches the "Alert - Threats" Profile Match List? A. The source address of SMTP traffic that matches a threat is automatically blocked as
BadGuys for 180 minutes.B. The source address of traffic that matches a threat is automatically blocked as BadGuys
for 180 minutes.C. The source address of traffic that matches a threat is automatically tagged as BadGuys
for 180 minutes.D. The source address of SMTP traffic that matches a threat is automatically tagged as
BadGuys for 180 minutes.
Reveal Answer
C. The source address of traffic that matches a threat is automatically tagged as BadGuys
for 180 minutes.
Explanation:
The "Alert - Threats" match list in the Log Forwarding Profile is configured with a Built-in Action called BlockBadGuys. Examining the action's configuration reveals:
1. Type: Integration -> Tagging
2. arget: Source Address
3. Action: Add Tag
4. Tags: BadGuys
5. Timeout: 180 minutes
This means that when a threat log matches the filter criteria (source IP not in 192.168.0.0/16 and severity ≥ medium), the action adds the tag "BadGuys" to the source IP address in the User-ID mapping for 180 minutes. It does not automatically block the traffic.
Why the Other Options Are Incorrect:
A & B (Automatically blocked): The action is configured for Tagging, not Blocking. While a tag like "BadGuys" could be used in a subsequent security policy to block traffic, the action itself only applies the tag.
D (SMTP traffic): The filter in the "Alert - Threats" match list does not specify SMTP traffic. It filters based on source IP and threat severity, not application or service. The "Forward Method" is Email/SMTP, but this only refers to how the alert is sent, not what traffic it matches.
Reference:
Log Forwarding Profiles can trigger Built-in Actions like tagging source IPs based on log events (PAN-OS Administrator’s Guide, "Log Forwarding" section). The tagging action is separate from blocking; blocking requires a security policy that references the tag.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.