Question # 1
An administrator is troubleshooting application traffic that has a valid business use case,
and observes the following decryption log message: "Received fatal alert UnknownCA from
client."
How should the administrator remediate this issue? A. Contact the site administrator with the expired certificate to request updates or renewalB. Enable certificate revocation checking to deny access to sites with revoked certificates. -
"C. Add the server's hostname to the SSL Decryption Exclusion List to allow traffic without
decryption.D. Check for expired certificates and take appropriate actions to block or allow access
based on business needs.
Reveal Answer
C. Add the server's hostname to the SSL Decryption Exclusion List to allow traffic without
decryption.
Explanation:
The decryption log message "Received fatal alert UnknownCA from client" indicates that the client application (on the internal network) received the firewall's forged certificate during SSL decryption but did not trust the Certificate Authority (CA) that signed it. This typically happens with:
Applications that use certificate pinning (hardcoded trust for a specific certificate).
Legacy systems or specialized software that does not use the enterprise's trusted CA store.
The most practical remediation is to bypass decryption for this specific traffic to avoid breaking the application. Adding the server's hostname to the SSL Decryption Exclusion List allows the traffic to pass through the firewall without decryption, resolving the trust error while maintaining connectivity for the business use case.
Why Other Options Are Incorrect:
A. The issue is not with the server's certificate but with the client not trusting the firewall's (enterprise) CA. Contacting the site administrator is irrelevant.
B. Certificate revocation checking (CRL/OCSP) is for validating server certificates, not for resolving client-side trust issues with the enterprise CA. Enabling it would not fix this error.
D. The error is unrelated to expired certificates. It is a trust issue where the client does not recognize the firewall's CA as valid.
Reference:
PAN-OS decryption troubleshooting guidelines recommend adding endpoints to the SSL Decryption Exclusion List (under Objects > Decryption Exclusion) when errors like "UnknownCA" indicate client-side trust issues due to certificate pinning or custom CA stores (PAN-OS Admin Guide: "SSL Decryption Exclusions"). This preserves application functionality while avoiding decryption failures.
Question # 2
When configuring explicit proxy on a firewall, which interface should be selected under the
Listening interface option? A. ingress for the outgoing traffic to the internetB. Loopback for the proxyC. Firewall managementD. ingress for the client traffic
Reveal Answer
D. ingress for the client traffic
Explanation:
Why This Option?
1.Explicit Proxy Basics:
Clients must explicitly configure their browser/OS to use the firewall as a proxy.
The firewall listens on a specific interface for incoming client proxy requests.
2.Listening Interface:
This should be the ingress interface where client traffic arrives (e.g., internal LAN interface).
Clients send HTTP/HTTPS requests directly to this interface’s IP and proxy port (e.g., 8080).
Why Not Other Options?
A. Internet egress is irrelevant—clients don’t send requests there.
B. Loopback is for high availability or complex routing, not client proxy traffic.
C. Management interface is for admin access, not proxy services.
Configuration Example:
If clients are on ethernet1/1, set Listening Interface = ethernet1/1.
Clients point their proxy settings to ethernet1/1’s IP:port.
Reference:
Palo Alto Explicit Proxy Guide:
"The listening interface is where clients direct their explicit proxy requests."
Question # 3
An administrator plans to deploy 15 firewalls to act as GlobalProtect gateways around the
world. Panorama will manage the firewalls.
The firewalls will provide access to mobile users and act as edge locations to on-premises
infrastructure. The administrator wants to scale the configuration out quickly and wants all
of the firewalls to use the same template configuration.
Which two solutions can the administrator use to scale this configuration? (Choose two.) A. collector groupsB. template stacksC. virtual systemsD. variables
Reveal Answer
B. template stacksD. variables
Explanation:
To efficiently deploy and manage 15 GlobalProtect gateways using Panorama, the administrator should leverage:
✅ B. Template stacks
Template stacks allow you to combine multiple templates into a layered configuration.
You can define common settings (e.g., interfaces, service routes, DNS, logging) once and apply them across all firewalls.
Each firewall is assigned to a single template stack, which pushes all relevant configuration in one commit.
This dramatically reduces duplication and simplifies management.
📌 Reference: Palo Alto Networks TechDocs – Template Stacks
✅ D. Variables
Variables allow you to customize specific values (e.g., IP addresses, hostnames, DNS servers) per firewall without creating separate templates.
You define a variable (e.g., $GW_IP) in the template and assign a unique value for each firewall.
This enables scalable, reusable templates while preserving per-device uniqueness.
📌 Reference: Palo Alto Networks TechDocs – Configure Template Variables
❌ Why Other Options Are Incorrect:
A. Collector groups Used for log collection in distributed log collector deployments. They do not configure firewalls.
C. Virtual systems Allow multiple logical firewalls on a single physical device. Not relevant for deploying multiple physical gateways.
Question # 4
An engineer is bootstrapping a VM-Series Firewall Other than the /config folder, which
three directories are mandatory as part of the bootstrap package directory structure?
(Choose three.) A. /content
B. /software
C. /piugins
D. /license
E. /opt
Reveal Answer
A. /content
B. /software
D. /license
Explanation:
When bootstrapping a VM-Series firewall, the bootstrap package (typically uploaded to cloud storage) must include specific directories to provide the firewall with all necessary components for initial deployment:
/content: This directory contains the latest content updates (e.g., antivirus, applications, threats). These are critical for the firewall to immediately enforce security policies with up-to-date protections.
/software: This directory holds the PAN-OS software image (e.g., PanOS_vm-10.1.0.tgz). The firewall uses this to install or upgrade the operating system during bootstrap.
/license: This directory contains the license files (e.g., authcodes) required to activate features like Threat Prevention, WildFire, and GlobalProtect.
The /config directory is also mandatory and contains the initial configuration file (e.g., init-cfg.txt) and any device state snapshots.
Why the other options are incorrect:
C. /plugins: This directory is not mandatory. It is used for specific plugins or additional software (e.g., CloudWatch plugin for AWS), but it is not required for basic bootstrap operations.
E. /opt: This directory is not part of the standard bootstrap package structure. It is a common Linux directory for third-party software, but it is not used in the VM-Series bootstrap process.
Reference:
Palo Alto Networks VM-Series Documentation: The "Bootstrap the VM-Series Firewall" section explicitly lists the required directories for the bootstrap package: /config, /content, /software, and /license.
PCNSE Exam Blueprint (Domain 2: Deployment and Configuration): Understanding VM-Series deployment and bootstrap requirements is a key objective for cloud and virtualized environments.
Question # 5
A firewall administrator is configuring an IPSec tunnel between a company's HQ and a
remote location. On the HQ firewall, the interface used to terminate the IPSec tunnel has a
static IP. At the remote location, the interface used to terminate the IPSec tunnel has a
DHCP assigned IP address.
Which two actions are required for this scenario to work? (Choose two.) A. On the HQ firewall select peer IP address type FQDN
B. On the remote location firewall select peer IP address type Dynamic
C. On the HQ firewall enable DDNS under the interface used for the IPSec tunnel
D. On the remote location firewall enable DONS under the interface used for the IPSec
tunnel
Reveal Answer
A. On the HQ firewall select peer IP address type FQDN
B. On the remote location firewall select peer IP address type Dynamic
Explanation:
When one side of an IPSec tunnel (HQ) has a static IP and the other side (remote) uses DHCP, the HQ firewall must be configured to identify the remote peer using a non-static method. Since the remote peer’s IP can change, the HQ firewall should use FQDN as the peer identifier, assuming the remote firewall updates its DNS record dynamically. This allows the HQ to resolve the remote peer’s current IP during IKE negotiation.
On the remote firewall, the peer IP type must be set to Dynamic, which tells PAN-OS to expect incoming IKE negotiations from a peer with a known static IP (the HQ), and to respond accordingly. This is a standard configuration for DHCP-based VPN endpoints.
❌ Why the other options are incorrect
C. Enable DDNS on HQ interface: Not required. The HQ firewall already has a static IP, so DDNS is unnecessary. DDNS is only relevant for the remote firewall if it wants to publish its changing IP to a DNS record.
D. Enable DONS on remote interface: This option is invalid. “DONS” is not a feature in PAN-OS. It may be a typo or misdirection. PAN-OS supports DDNS, not “DONS.”
References
How to Configure IPSec VPN
PAN-OS Web Interface Help – IPSec Tunnels
Question # 6
A consultant advises a client on designing an explicit Web Proxy deployment on PAN-OS
11 0 The client currently uses RADIUS authentication in their environment.
Which two pieces of information should the consultant provide regarding Web Proxy
authentication? (Choose two.) A. Kerberos or SAML authentication need to be configured
B. LDAP or TACACS+ authentication need to be configured
C. RADIUS is only supported for a transparent Web Proxy.
D. RADIUS is not supported for explicit or transparent Web Proxy
Reveal Answer
A. Kerberos or SAML authentication need to be configured
D. RADIUS is not supported for explicit or transparent Web Proxy
Explanation:
PAN-OS 11.0 explicit Web Proxy supports only Kerberos, SAML, and Cloud Identity Engine for authentication. RADIUS is not supported for either explicit or transparent proxy modes.
A. Kerberos or SAML authentication need to be configured ✔️ Correct — These are the supported methods for explicit proxy authentication in PAN-OS 11.0 Reference: Palo Alto TechDocs – Configure Authentication for Explicit Web Proxy
D. RADIUS is not supported for explicit or transparent Web Proxy ✔️ Correct — RADIUS is not a supported authentication method for either proxy mode
❌ Incorrect Options:
B. LDAP or TACACS+ authentication need to be configured ❌ LDAP/TACACS+ are not supported for Web Proxy authentication in PAN-OS 11.0
C. RADIUS is only supported for a transparent Web Proxy ❌ Misleading — RADIUS is not supported for transparent proxy either
Question # 7
A network security administrator has an environment with multiple forms of authentication.
There is a network access control system in place that authenticates and restricts access
for wireless users, multiple Windows domain controllers, and an MDM solution for
company-provided smartphones. All of these devices have their authentication events
logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum
coverage? A. Captive portal
B. Standalone User-ID agent
C. Syslog listener
D. Agentless User-ID with redistribution
Reveal Answer
C. Syslog listener
Explanation:
The environment has multiple, diverse authentication sources (network access control for wireless, Windows domain controllers, and an MDM for smartphones), all generating authentication logs. The Syslog listener on the User-ID agent (or the firewall itself) can be configured to parse these syslog messages from all these different systems. This allows the firewall to collect IP-to-username mappings from every authentication event, regardless of the source, ensuring maximum coverage.
Why Other Options Are Incorrect:
A. Captive portal: This only captures users who explicitly authenticate via a web portal. It would miss all passive authentications happening via the NAC, Windows logins, and MDM.
B. Standalone User-ID agent: While the agent can integrate with some systems (like WMI for Windows DCs), it lacks native connectors for many NAC systems and MDM solutions. Its coverage would be limited compared to syslog, which is a universal logging format.
D. Agentless User-ID with redistribution: This refers to using a intermediate server to collect logs and redistribute them, but it adds complexity. The native syslog listener capability is already designed to directly ingest and parse logs from these varied sources without an additional redistribution layer.
Reference:
Palo Alto Networks documentation emphasizes the syslog listener as the most flexible method for aggregating user mappings from heterogeneous sources (PAN-OS Administrator’s Guide, "User-ID Syslog Listening" section). By creating custom parsers for each log format, the firewall can achieve comprehensive coverage across NACs, MDMs, and domain controllers.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.