Question # 1
A firewall engineer creates a new App-ID report under Monitor > Reports > Application
Reports > New Applications to monitor new applications on the network and better assess
any Security policy updates the engineer might want to make.
How does the firewall identify the New App-ID characteristic? A. It matches to the New App-IDs downloaded in the last 90 days.
B. It matches to the New App-IDs in the most recently installed content releases.
C. It matches to the New App-IDs downloaded in the last 30 days.
D. It matches to the New App-IDs installed since the last time the firewall was rebooted.
Reveal Answer
B. It matches to the New App-IDs in the most recently installed content releases.
Explanation:
The New App-ID characteristic in Palo Alto Networks firewalls is designed to help administrators monitor newly introduced applications that may require updates to Security policy. When you create a report under Monitor > Reports > Application Reports > New Applications, the firewall identifies “new” applications based on the most recently installed content release—not based on time duration or system reboot.
This means the report will only include App-IDs that were added in the latest content update installed on the firewall, regardless of when that update was downloaded or how long ago the system was rebooted.
This behavior is confirmed in Palo Alto’s official documentation:
“The New App-ID characteristic always matches to only the new App-IDs in the most recently installed content releases.”
❌ Why the other options are incorrect
A. Last 90 days: Time-based filtering is not used. The firewall doesn’t track App-ID age by days.
C. Last 30 days: Same issue—App-ID identification is based on content version, not time.
D. Since last reboot: Rebooting the firewall has no impact on App-ID classification. The report is tied to content updates, not system uptime.
🔗 Reference:
You can find this behavior detailed in Palo Alto’s Monitor New App-IDs documentation
Question # 2
Users have reported an issue when they are trying to access a server on your network. The
requests aren’t taking the expected route. You discover that there are two different static
routes on the firewall for the server. What is used to determine which route has priority? A. The first route installedB. The route with the lowest administrative distanceC. Bidirectional Forwarding DetectionD. The route with the highest administrative distance
Reveal Answer
B. The route with the lowest administrative distance
Explanation:
When multiple static routes exist for the same destination on a Palo Alto Networks firewall, the firewall uses Administrative Distance (AD) to determine which route takes precedence. The route with the lowest AD is considered more trustworthy and is installed in the Routing Information Base (RIB) and Forwarding Information Base (FIB).
Static routes typically have a default AD of 10
Dynamic protocols like OSPF or BGP have higher ADs (e.g., OSPF internal = 30, BGP external = 20)
If two static routes exist, the one with the lower AD will be preferred—even if both have the same destination and prefix length
This mechanism ensures predictable routing behavior and allows administrators to configure backup routes by assigning them a higher AD, so they’re only used if the primary route fails.
❌ Why the Other Options Are Incorrect:
A. The first route installed → Route installation order is irrelevant. AD is the deciding factor.
C. Bidirectional Forwarding Detection (BFD) → BFD is used for route health monitoring, not for route selection. It can remove a route if the peer fails, but it doesn’t determine priority.
D. The route with the highest administrative distance → Opposite of correct. Higher AD means lower priority.
📚 Reference:
Static Route Overview – Palo Alto Networks
Route Preference Logic – Palo Alto Knowledge Base
Question # 3
A network administrator notices a false-positive state after enabling Security profiles. When
the administrator checks the threat prevention logs, the related signature displays the
following:
threat type: spyware category: dns-c2 threat ID: 1000011111
Which set of steps should the administrator take to configure an exception for this
signature? A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS
exceptions tabs Search related threat ID and click enable CommitB. Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile
Select the signature exceptions tab and then click show all signatures Search related threat
ID and click enable Change the default action CommitC. Navigate to Objects > Security Profiles > Vulnerability Protection
Select related profile
Select the Exceptions lab and then click show all signatures
Search related threat ID and click enable
CommitD. Navigate to Objects > Security Profiles > Anti-Spyware
Select related profile
Select the Exceptions lab and then click show all signatures
Search related threat ID and click enable Commit
Reveal Answer
A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS
exceptions tabs Search related threat ID and click enable Commit
Explanation:
The threat log indicates:
Threat Type: Spyware
Category: dns-c2 (DNS command-and-control)
Threat ID: 1000011111
This means the detection was triggered by the Anti-Spyware profile, specifically targeting DNS-based C2 activity. To create an exception for this signature, the administrator must modify the Anti-Spyware profile.
Steps to configure the exception:
Go to Objects > Security Profiles > Anti-Spyware
Select the relevant Anti-Spyware profile
Navigate to the Exceptions tab
Click Show All Signatures
Search for Threat ID 1000011111
Click Enable to allow editing
Modify the action (e.g., alert instead of block)
Commit the changes
📚 Reference: Palo Alto Networks – Configure Anti-Spyware Exceptions
❌ Why Other Options Are Wrong:
A. Incorrect — DNS exceptions tab is for domain-based exceptions, not threat ID-based signature exceptions.
B & C. Incorrect — Vulnerability Protection profiles do not handle spyware or DNS-C2 signatures.
Question # 4
A company is expanding its existing log storage and alerting solutions All company Palo
Alto Networks firewalls currently forward logs to Panorama. Which two additional log
forwarding methods will PAN-OS support? (Choose two) A. SSLB. TLSC. HTTPD. Email
Reveal Answer
C. HTTPD. Email
Explanation:
In addition to forwarding logs to Panorama, Palo Alto Networks firewalls and Panorama can also forward logs to external services using several supported methods. According to official documentation and best practices, two additional supported log forwarding methods are:
✅ C. HTTP
Panorama and firewalls can forward logs as HTTP payloads to external systems such as SIEMs, log aggregators, or custom alerting platforms.
This method is flexible and widely used for integration with third-party tools.
✅ D. Email
Logs or alerts can be forwarded via email notifications.
Useful for sending critical alerts to administrators or security teams.
❌ Why Other Options Are Incorrect:
A. SSL – Not a standalone log forwarding protocol; SSL is a transport layer used to secure other protocols like HTTPS.
B. TLS – Like SSL, TLS is a security protocol, not a log forwarding method itself.
References:
Panorama TechDocs – Configure Log Forwarding to External Destinations
GitHub PCNSE Study Guide – Log Forwarding Options
Question # 5
When using certificate authentication for firewall administration, which method is used for
authorization? A. LocalB. RadiusC. KerberosD. LDAP
Reveal Answer
A. Local
Explanation:
When using certificate-based authentication for firewall administration, the authorization method used is Local. Here's why:
Certificate authentication validates the identity of the administrator using a client certificate.
Once authenticated, the firewall uses its local configuration to determine what roles and permissions the authenticated user has.
This means the firewall must have a locally defined admin account that matches the certificate’s identity (usually the Common Name or Subject).
So, even though the authentication is done via certificate, the authorization—which determines what the admin can do—is handled locally.
❌ Why Other Options Are Incorrect:
B. RADIUS, C. Kerberos, and D. LDAP are external authentication methods. They can be used for username/password-based authentication, but not for certificate-based admin login authorization.
Valid Reference:
PCNSE Video Series: Authentication & Authorization
Pass4Success PCNSE Discussion – Certificate Authentication Authorization Method
Question # 6
Which log type is supported in the Log Forwarding profile? A. ConfigurationB. GlobalProtectC. TunnelD. User-ID
Reveal Answer
C. Tunnel
Explanation:
A Log Forwarding profile in Palo Alto Networks is used to send specific types of logs to an external destination, such as a syslog server, SNMP manager, or email server. These profiles are highly customizable and can be applied to different rules and zones to forward logs based on specific criteria.
The following log types are commonly supported in a Log Forwarding profile:
1.Traffic: Logs related to network sessions (start, end, deny, drop).
2.Threat: Logs for security events like viruses, spyware, vulnerabilities, and other threats.
3.URL Filtering: Logs related to web browsing activity, including which URLs were allowed or blocked.
4.WildFire Submissions: Logs for files sent to the WildFire analysis cloud.
5.Data Filtering: Logs for sensitive data (e.g., credit card numbers) detected in network traffic.
6.Tunnel: Logs for tunnel activity, such as GlobalProtect, IPsec VPN, and GTP.
7.Authentication: Logs for user authentication events.
8.Decryption: Logs for SSL/TLS decryption sessions.
9.HIP Match: Logs for host information profile (HIP) matches.
Based on this list, Tunnel is a supported log type within a Log Forwarding profile.
Why the other options are incorrect:
A. Configuration: Configuration logs are system-wide logs that record changes to the firewall configuration. They are not part of a Log Forwarding profile applied to security policies. Instead, they are forwarded directly from the Device > Log Settings tab.
B. GlobalProtect: While GlobalProtect generates logs, the specific log type used for forwarding is often categorized under other names. The Tunnel log type is the general category for all tunnel-related events, including GlobalProtect VPNs. The Log Forwarding profile has a specific "Tunnel" log type option.
D. User-ID: The User-ID log type is used to track the mapping of IP addresses to usernames. Like Configuration logs, User-ID logs are typically configured for forwarding under the Device > Log Settings menu, not within a Log Forwarding profile that is tied to a security policy rule.
Reference
This information can be found in the Palo Alto Networks official documentation, specifically within the sections on Objects > Log Forwarding and Device > Log Settings. These guides provide detailed breakdowns of which log types can be forwarded via a Log Forwarding profile and which are configured through other means. The distinction is a key concept in the PCNSE exam, as it tests the administrator's knowledge of the different logging mechanisms available on the firewall.
Question # 7
An engineer is pushing configuration from Panorama to a managed firewall What happens
when the pushed Panorama configuration has Address Object names that duplicate the
Address Objects already configured on the firewall? A. The firewall ignores only the pushed objects that have the same name as the locally
configured objects, and it will commit the rest of the pushed configuration.B. The firewall fully commits all of the pushed configuration and overwrites its locally
configured objectsC. The firewall rejects the pushed configuration, and the commit fails.D. The firewall renames the duplicate local objects with "-1" at the end signifying they are
clones; it will update the references to the objects accordingly and fully commit the pushed
configuration.
Reveal Answer
C. The firewall rejects the pushed configuration, and the commit fails.
Explanation:
When an engineer pushes a configuration from Panorama to a managed Palo Alto Networks firewall, conflicts can arise if the pushed configuration contains Address Object names that duplicate those already configured locally on the firewall. In Palo Alto Networks’ management architecture, Panorama manages device groups and templates, but the firewall maintains its own local configuration database. When a push occurs, Panorama attempts to merge its configuration with the firewall’s local settings. If duplicate Address Object names are detected (e.g., the same name with different IP addresses or attributes), the firewall considers this a configuration conflict. By default, the firewall rejects the entire pushed configuration, and the commit fails, requiring the administrator to resolve the conflict manually. The Palo Alto Networks PAN-OS 11.1 Administrator’s Guide states that duplicate object names cause a commit failure unless explicitly resolved, making option C correct.
Why Other Options Are Incorrect:
A. The firewall ignores only the pushed objects that have the same name as the locally configured objects, and it will commit the rest of the pushed configuration: This is incorrect because the firewall does not selectively ignore duplicates and commit the rest. A conflict triggers a full rejection to maintain configuration integrity. The PCNSE Study Guide notes that partial commits are not supported in such cases.
B. The firewall fully commits all of the pushed configuration and overwrites its locally configured objects: This is incorrect because Panorama does not automatically overwrite local objects without explicit override settings (e.g., force sync or template stack override), which are not default. The PAN-OS 11.1 Administrator’s Guide indicates that overwrites require manual intervention or specific configuration options.
D. The firewall renames the duplicate local objects with "-1" at the end signifying they are clones; it will update the references to the objects accordingly and fully commit the pushed configuration: This is incorrect because the firewall does not automatically rename objects or resolve duplicates by appending "-1". Such behavior would risk policy inconsistencies, and the PCNSE Study Guide confirms that manual resolution is required.
Practical Steps:
1. After the commit fails, check the commit error in Panorama under Commit > Push to Devices > Task Details.
2. Review the conflicting Address Objects in Objects > Addresses on both Panorama and the firewall.
3. Resolve duplicates by either:
Renaming the pushed objects in Panorama to avoid conflicts.
Deleting or modifying the local objects on the firewall to align with Panorama.
Retry the push and commit.
References:
Palo Alto Networks PAN-OS 11.1 Administrator’s Guide: Details configuration push conflicts and commit failure due to duplicate objects.
Palo Alto Networks PCNSE Study Guide: Explains resolution of object name conflicts during Panorama pushes.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.