Question # 1
Which three authentication types can be used to authenticate users? (Choose three.) A. Local database authentication
B. PingID
C. Kerberos single sign-on
D. GlobalProtect client
E. Cloud authentication service
Reveal Answer
A. Local database authentication
C. Kerberos single sign-on
E. Cloud authentication service
Explanation:
Why These Options?
1.Local Database Authentication (A):
The firewall stores usernames/passwords locally (Device > Administrators).
Used for admin login or captive portal authentication.
2.Kerberos Single Sign-On (C):
Integrates with Active Directory for seamless authentication (e.g., for User-ID or captive portal).
Users are automatically authenticated via their domain credentials.
3.Cloud Authentication Service (E):
Supports SAML, OAUTH, or LDAP via cloud providers (e.g., Azure AD, Okta).
Used for GlobalProtect, admin login, or captive portal.
Why Not Others?
B. PingID This is a specific MFA product, not a general authentication type (it would fall under cloud authentication).
D. GlobalProtect Client This is a VPN client, not an authentication method (it uses other methods like SAML or local DB).
Reference:
Palo Alto Authentication Guide:
"Local, Kerberos, and cloud authentication are core methods for user verification."
Question # 2
A firewall administrator is configuring an IPSec tunnel between a company's HQ and a
remote location. On the HQ firewall, the interface used to terminate the IPSec tunnel has a
static IP. At the remote location, the interface used to terminate the IPSec tunnel has a
DHCP assigned IP address.
Which two actions are required for this scenario to work? (Choose two.) A. On the HQ firewall select peer IP address type FQDN
B. On the remote location firewall select peer IP address type Dynamic
C. On the HQ firewall enable DDNS under the interface used for the IPSec tunnel
D. On the remote location firewall enable DONS under the interface used for the IPSec
tunnel
Reveal Answer
A. On the HQ firewall select peer IP address type FQDN
B. On the remote location firewall select peer IP address type Dynamic
Explanation:
When one side of an IPSec tunnel (HQ) has a static IP and the other side (remote) uses DHCP, the HQ firewall must be configured to identify the remote peer using a non-static method. Since the remote peer’s IP can change, the HQ firewall should use FQDN as the peer identifier, assuming the remote firewall updates its DNS record dynamically. This allows the HQ to resolve the remote peer’s current IP during IKE negotiation.
On the remote firewall, the peer IP type must be set to Dynamic, which tells PAN-OS to expect incoming IKE negotiations from a peer with a known static IP (the HQ), and to respond accordingly. This is a standard configuration for DHCP-based VPN endpoints.
❌ Why the other options are incorrect
C. Enable DDNS on HQ interface: Not required. The HQ firewall already has a static IP, so DDNS is unnecessary. DDNS is only relevant for the remote firewall if it wants to publish its changing IP to a DNS record.
D. Enable DONS on remote interface: This option is invalid. “DONS” is not a feature in PAN-OS. It may be a typo or misdirection. PAN-OS supports DDNS, not “DONS.”
References
How to Configure IPSec VPN
PAN-OS Web Interface Help – IPSec Tunnels
Question # 3
If a URL is in multiple custom URL categories with different actions, which action will take
priority? A. AllowB. OverrideC. BlockD. Alert
Reveal Answer
C. Block
Explanation:
When a URL matches multiple custom URL categories with different actions configured, Palo Alto Networks firewalls employ a precedence hierarchy to determine the action. The action with the highest priority is Block.
The priority order from highest to lowest is:
Block (highest priority)
Override
Allow
Continue (lowest priority, inherits action from the parent category)
Therefore, if a URL is in one custom category set to allow and another set to block, the block action will take precedence and the traffic will be denied.
Why the Other Options Are Incorrect:
A. Allow: This is a lower priority action than block or override. It will be overridden if a block action exists in another matching category.
B. Override: This is a high-priority action (second only to block), used to force a site to render in a specific way (e.g., forcing YouTube to "safe mode"). However, it is still superseded by a block action.
D. Alert: This is not a standard action for URL filtering. The primary actions are allow, block, override, and continue. "Alert" is typically an action in security profiles (like Threat or Data Filtering) for logging without blocking, but it is not part of the URL Filtering action precedence hierarchy.
Valid Reference:
Palo Alto Networks Administrator Guide | URL Filtering | Best Practices | URL Category Precedence: The official documentation explicitly states the order of precedence for URL filtering actions when multiple categories match. The hierarchy is: Block > Override > Allow > Continue. This ensures that the most restrictive policy is always enforced.
Question # 4
A firewall engineer at a company is researching the Device Telemetry feature of PAN-OS.
Which two aspects of the feature require further action for the company to remain
compliant with local laws regarding privacy and data storage? (Choose two.) A. Telemetry feature is automatically enabled during PAN-OS installation.
B. Telemetry data is uploaded into Strata Logging Service.
C. Telemetry feature is using Traffic logs and packet captures to collect data.
D. Telemetry data is shared in real time with Palo Alto Networks.
Reveal Answer
B. Telemetry data is uploaded into Strata Logging Service.
D. Telemetry data is shared in real time with Palo Alto Networks.
Explanation:
What Device Telemetry Does:
Device Telemetry in PAN-OS allows Palo Alto Networks to collect information from firewalls to improve product reliability, threat prevention, and customer support.
Data types include device health, configuration usage, feature adoption, threat samples, and system statistics.
Privacy/Security Consideration:
Since the data goes outside the company’s infrastructure, an organization must ensure compliance with local data privacy and data storage laws (e.g., GDPR in EU).
Option Review
A. Telemetry feature is automatically enabled during PAN-OS installation. ❌
→ False. By default, Device Telemetry is disabled. It must be explicitly enabled by an administrator.
B. Telemetry data is uploaded into Strata Logging Service. ✅
→ Correct. Data is stored in Palo Alto’s Strata Logging Service (SLS), which may be hosted in specific regions (e.g., US, EU). If regulations restrict data export, the company must review this.
C. Telemetry feature is using Traffic logs and packet captures to collect data. ❌
→ Incorrect. Device Telemetry does not use packet captures or forward raw traffic logs. It collects metadata/statistics/configuration health only.
D. Telemetry data is shared in real time with Palo Alto Networks. ✅
→ Correct. Because telemetry data is streamed to PAN in near-real time, companies under strict privacy laws must confirm whether this sharing complies with legal requirements.
Reference:
Palo Alto Networks TechDocs – About Device Telemetry
Palo Alto KB – Device Telemetry FAQ
Question # 5
A company has configured a URL Filtering profile with override action on their firewall.
Which two profiles are needed to complete the configuration? (Choose two) A. SSL/TLS ServiceB. HTTP ServerC. DecryptionD. Interface Management
Reveal Answer
A. SSL/TLS ServiceC. Decryption
Explanation:
To properly implement URL Filtering with override actions, the firewall must inspect encrypted (HTTPS) traffic. This requires:
A. SSL/TLS Service Profile
Defines which SSL/TLS versions and cipher suites are allowed.
Ensures the firewall can properly decrypt and inspect traffic.
C. Decryption Profile
Specifies decryption rules (e.g., forward trust, forward untrust).
Required for SSL decryption, which is necessary for URL Filtering to analyze HTTPS traffic.
Why the Others Are Incorrect:
B. HTTP Server Profile → Used for firewall management access (GUI/API), not URL Filtering.
D. Interface Management Profile → Controls management access to interfaces, unrelated to decryption.
Reference:
Palo Alto URL Filtering with Decryption
Question # 6
Which CLI command displays the physical media that are connected to ethernet1/8? A. > show system state filter-pretty sys.si. p8. stats
B. > show system state filter-pretty sys.sl.p8.phy
C. > show system state filter-pretty sys.sl.p8.med
D. > show interface ethernet1/8
Reveal Answer
B. > show system state filter-pretty sys.sl.p8.phy
Explanation:
The question asks for the CLI command that displays the physical media connected to ethernet1/8 on a Palo Alto Networks firewall. This requires identifying a command that provides detailed interface information, specifically related to the physical layer (e.g., media type, connection status). Let’s evaluate the options to determine the correct one.
Why > show system state filter-pretty sys.sl.p8.phy?
Purpose: The show system state filter-pretty command is used to display detailed system state information in a human-readable format, filtered by specific parameters. The filter sys.sl.p8.phy targets the physical layer details of slot 1, port 8 (corresponding to ethernet1/8, where "p8" denotes port 8). This command provides information about the physical media, such as the type of cable or connection (e.g., copper, fiber) and its status.
Output: The command will display details like the media type, link state, and speed/duplex settings for ethernet1/8. This is useful for troubleshooting physical connectivity issues.
Syntax Breakdown:
sys: System state.
sl: Slot (typically 1 for most firewalls, as ethernet1/8 is in slot 1).
p8: Port 8 (matching ethernet1/8).
phy: Physical layer information.
Reference: Palo Alto Networks CLI Reference Guide indicates that show system state filter-pretty sys.sl.pX.phy is used to view physical media details for a specific port, where pX is the port number.
Why Not the Other Options?
A. > show system state filter-pretty sys.si.p8.stats:
Explanation: The filter sys.si.p8.stats likely refers to interface statistics (e.g., packet counters) for port 8 in slot 1. While this provides performance data, it does not specifically display physical media details (e.g., cable type or connection status).
Why Incorrect: This command focuses on statistics, not physical media.
C. > show system state filter-pretty sys.sl.p8.med:
Explanation: The filter sys.sl.p8.med appears to be a typo or incorrect syntax. There is no standard med parameter in the show system state command for physical media; the correct term is phy for physical layer details. This command would likely return no meaningful output or an error.
Why Incorrect: Invalid filter syntax makes this option non-functional.
D. > show interface ethernet1/8:
Explanation: The show interface ethernet1/8 command displays operational status and configuration details for the specified interface, including IP address, speed, duplex, and link state. While it provides some physical layer information (e.g., link up/down), it is less detailed than the show system state filter-pretty sys.sl.p8.phy command for physical media specifics (e.g., media type).
Why Incorrect: This command is broader and less targeted to physical media details compared to the correct option.
Additional Context:
Interface Naming: On Palo Alto Networks firewalls, ethernet1/8 refers to slot 1, port 8. The CLI uses this notation to identify physical interfaces.
Troubleshooting Tip: To verify physical connectivity, use > show system state filter-pretty sys.sl.p8.phy alongside > show interface ethernet1/8 for a comprehensive view.
Best Practices:
Check cable type and compatibility (e.g., copper vs. fiber) using the physical media details.
Ensure the interface is administratively up (> configure; set interface ethernet1/8 enable yes).
PCNSE Exam Relevance: This question tests your knowledge of CLI commands for interface troubleshooting, a key skill in the PCNSE exam. It requires understanding the nuances of show system state filters.
Conclusion:
The CLI command that displays the physical media connected to ethernet1/8 is > show system state filter-pretty sys.sl.p8.phy, as it specifically targets the physical layer details for that port.
References:
Palo Alto Networks CLI Reference Guide: System State Commands
Palo Alto Networks Documentation: Interface Management
ExamTopics PCNSE Discussion: CLI Interface Commands
Question # 7
Why are external zones required to be configured on a Palo Alto Networks NGFW in an
environment with multiple virtual systems? A. To allow traffic between zones in different virtual systems without the traffic leaving the
appliance
B. To allow traffic between zones in different virtual systems while the traffic is leaving the
appliance
C. External zones are required because the same external zone can be used on different
virtual systems
D. Multiple external zones are required in each virtual system to allow the communications
between virtual systems
Reveal Answer
B. To allow traffic between zones in different virtual systems while the traffic is leaving the
appliance
Explanation:
In a multi-virtual system (vsys) environment, each vsys is a separate security domain with its own interfaces, zones, and policies. By design, vsys do not share internal state or have direct internal pathways for traffic. Therefore:
For traffic to flow from a zone in one vsys to a zone in another vsys, it must be routed out of the firewall (e.g., via a physical or VLAN interface) and then back in through another interface.
External zones are configured to represent these "outside" networks (e.g., a transit VLAN) that carry traffic between vsys. They are called "external" because the traffic leaves the physical appliance.
This approach ensures that inter-vsys traffic is subjected to the same security policies (e.g., security, NAT, decryption) as any other traffic traversing the firewall, maintaining security and visibility.
Why the other options are incorrect:
A. To allow traffic between zones in different virtual systems without the traffic leaving the appliance: This is false. Traffic between vsys must leave the appliance; there is no internal switching between vsys.
C. External zones are required because the same external zone can be used on different virtual systems: While the same external zone name (e.g., "inter-vsys") can be configured in multiple vsys, this is not the primary reason. The key requirement is the need for traffic to exit and re-enter the firewall.
D. Multiple external zones are required in each virtual system to allow communications between virtual systems: Only one external zone per vsys is typically needed for inter-vsys communication (e.g., a dedicated "inter-vsys" zone). Multiple zones are not required.
Reference:
Palo Alto Networks Administrator Guide: The "Virtual Systems" chapter explains that inter-vsys traffic requires external zones because traffic must exit and re-enter the firewall. It details configuring zones for transit networks.
PCNSE Exam Blueprint (Domain 1: Architecture and Core Concepts): Understanding virtual system isolation and inter-vsys communication is a key architectural concept.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.