Question # 1
In which two scenarios would it be necessary to use Proxy IDs when configuring site-to-site
VPN Tunnels? (Choose two.) A. Firewalls which support policy-based VPNs.B. The remote device is a non-Palo Alto Networks firewall.C. Firewalls which support route-based VPNs.D. The remote device is a Palo Alto Networks firewall.
Reveal Answer
A. Firewalls which support policy-based VPNs.B. The remote device is a non-Palo Alto Networks firewall.
Question # 2
Exhibit.
Review the screenshots and consider the following information:
1. FW-1is assigned to the FW-1_DG device group, and FW-2 is assigned to
OFFICE_FW_DC
2. There are no objects configured in REGIONAL_DG and OFFICE_FW_DG device groups.
Which IP address will be pushed to the firewalls inside Address Object Server-1? A. Server-1 on FW-1 will have IP 4.4.4.4. Server-1 on FW-2 will have IP 1.1.1.1
B. Server-1 on FW-1 will have IR 111.1. Server-1 will not be pushed to FW-2.
C. Server-1 on FW-1 will have IP 2.2.2.2. Server-1 will not be pushed to FW-2.
D. Server-1 on FW-1 will have IP 3.3.3.3. Server-1 will not be pushed to FW-2.
Reveal Answer
A. Server-1 on FW-1 will have IP 4.4.4.4. Server-1 on FW-2 will have IP 1.1.1.1
Explanation : Device Group Hierarchy
Shared
DATACENTER_DG
DC_FW_DG
REGIONAL_DG
OFFICE_FW_DG
FW-1_DG
Analysis
Considerations:
FW-1 is assigned to the FW-1_DG device group.
FW-2 is assigned to the OFFICE_FW_DG device group.
There are no objects configured in REGIONAL_DG and OFFICE_FW_DG device
groups.
The address object Server-1 appears in multiple device groups with different IP addresses.
The device groups have a hierarchy, which means objects can be inherited from parent
groups unless overridden in the child group.
Question # 3
An engineer configures a destination NAT policy to allow inbound access to an internal
server in the DMZ. The NAT policy is configured with the following values:
- Source zone: Outside and source IP address 1.2.2.2
- Destination zone: Outside and destination IP address 2.2.2.1
The destination NAT policy translates IP address 2.2.2.1 to the real IP address 10.10.10.1
in the DMZ zone.
Which destination IP address and zone should the engineer use to configure the security
policy? A. Destination Zone Outside. Destination IP address 2.2.2.1B. Destination Zone DMZ, Destination IP address 10.10.10.1C. Destination Zone DMZ, Destination IP address 2.2.2.1
D. Destination Zone Outside. Destination IP address 10.10.10.1
Reveal Answer
C. Destination Zone DMZ, Destination IP address 2.2.2.1
Question # 4
Following a review of firewall logs for traffic generated by malicious activity, how can an
administrator confirm that WildFire has identified a virus? A. By navigating to Monitor > Logs > WildFire Submissions, applying filter "(subtype eq
wildfire-virus)"B. By navigating to Monitor > Logs > Threat, applying filter "(subtype eq wildfire-virus)'C. By navigating to Monitor > Logs > Traffic, applying filter "(subtype eq virus)"D. By navigating to Monitor > Logs> Threat, applying filter "(subtype eq virus)"
Reveal Answer
A. By navigating to Monitor > Logs > WildFire Submissions, applying filter "(subtype eq
wildfire-virus)"
Question # 5
Which two are required by IPSec in transport mode? (Choose two.) A. Auto generated keyB. NAT TraversalC. IKEv1D. DH-group 20 (ECP-384 bits)
Reveal Answer
A. Auto generated keyD. DH-group 20 (ECP-384 bits)
Question # 6
An engineer is bootstrapping a VM-Series Firewall Other than the /config folder, which
three directories are mandatory as part of the bootstrap package directory structure?
(Choose three.) A. /content
B. /software
C. /piugins
D. /license
E. /opt
Reveal Answer
A. /content
B. /software
D. /license
Question # 7
If a URL is in multiple custom URL categories with different actions, which action will take
priority? A. AllowB. OverrideC. BlockD. Alert
Reveal Answer
C. Block
Explanation:
When a URL matches multiple categories, the category chosen is the one that has the
most severe action defined below (block being most severe and allow least severe).
block
override
continue
alert
allow
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.