Question # 1
An enterprise Information Security team has deployed policies based on AD groups to
restrict user access to critical infrastructure systems. However, a recent phishing campaign
against the organization has prompted Information Security to look for more controls that
can secure access to critical assets. For users that need to access these systems.
Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to
enforce MFA.
What should the enterprise do to use PAN-OS MFA? A. Configure a Captive Portal authentication policy that uses an authentication sequence.B. Configure a Captive Portal authentication policy that uses an authentication profile that
references a RADIUS profile.C. Create an authentication profile and assign another authentication factor to be used by a
Captive Portal authentication policy.D. Use a Credential Phishing agent to detect, prevent, and mitigate credential phishing
campaigns.
Reveal Answer
C. Create an authentication profile and assign another authentication factor to be used by a
Captive Portal authentication policy.
Explanation:
To enforce multi-factor authentication (MFA) for users accessing critical infrastructure, Palo Alto Networks firewalls use Authentication Policies in conjunction with Captive Portal. The correct approach involves:
Creating an Authentication Profile for the first factor (e.g., LDAP, RADIUS).
Adding an MFA Server Profile for the second factor (e.g., via vendor API or RADIUS).
Configuring a Captive Portal Authentication Policy that references both profiles.
This setup allows the firewall to:
Redirect users to a web form for initial authentication.
Trigger additional authentication factors via integrated MFA services.
Dynamically enforce access control based on user identity and authentication status.
❌ Why Other Options Are Incorrect:
A. Configure a Captive Portal authentication policy that uses an authentication sequence Authentication sequences are used for fallback across multiple profiles—not for MFA chaining.
B. Configure a Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile This only handles single-factor authentication unless combined with an MFA server profile.
D. Use a Credential Phishing agent to detect, prevent, and mitigate credential phishing campaigns This is a separate feature for threat detection—not for enforcing MFA.
🔗 Authoritative Reference:
Palo Alto Networks TechDocs: Configure Multi-Factor Authentication
Question # 2
An organization has recently migrated its infrastructure and configuration to NGFWs, for
which Panorama manages the devices. The organization is coming from a L2-L4 firewall
vendor, but wants to use App-ID while identifying policies that are no longer needed.
Which Panorama tool can provide a solution? A. Application GroupsB. Policy OptimizerC. Test Policy MatchD. Config Audit
Reveal Answer
B. Policy Optimizer
Explanation:
1.Problem Context
The organization is coming from an L2–L4 firewall vendor (so their legacy policies are mostly port-based).
They want to start leveraging Palo Alto Networks’ App-ID for Layer 7 visibility and control.
They also want to identify policies that are no longer needed (e.g., unused or shadowed rules).
2.Policy Optimizer in Panorama
Policy Optimizer helps administrators:
Convert legacy port-based rules → into App-ID based rules.
Find rules that are unused (never hit).
Find rules that are too broad (allowing "any app" or "any service").
Refine rules to improve security posture and reduce attack surface.
Why not the others?
A. Application Groups ❌ → Just a way to group multiple App-IDs together for easier policy management. Does not help identify unused/port-based rules.
C. Test Policy Match ❌ → Used for testing which rule a specific traffic flow would match. It won’t optimize policies.
D. Config Audit ❌ → Compares running vs. candidate configurations (or between snapshots). Good for change tracking, not for identifying unused policies.
Reference
Palo Alto TechDocs – Policy Optimizer
PANW Best Practices – Security policy migration guide
Question # 3
When using certificate authentication for firewall administration, which method is used for
authorization? A. LocalB. RadiusC. KerberosD. LDAP
Reveal Answer
A. Local
Explanation:
When using certificate-based authentication for firewall administration, the authorization method used is Local. Here's why:
Certificate authentication validates the identity of the administrator using a client certificate.
Once authenticated, the firewall uses its local configuration to determine what roles and permissions the authenticated user has.
This means the firewall must have a locally defined admin account that matches the certificate’s identity (usually the Common Name or Subject).
So, even though the authentication is done via certificate, the authorization—which determines what the admin can do—is handled locally.
❌ Why Other Options Are Incorrect:
B. RADIUS, C. Kerberos, and D. LDAP are external authentication methods. They can be used for username/password-based authentication, but not for certificate-based admin login authorization.
Valid Reference:
PCNSE Video Series: Authentication & Authorization
Pass4Success PCNSE Discussion – Certificate Authentication Authorization Method
Question # 4
A security engineer needs firewall management access on a trusted interface.
Which three settings are required on an SSL/TLS Service Profile to provide secure Web UI
authentication? (Choose three.) A. Minimum TLS version
B. Certificate
C. Encryption Algorithm
D. Maximum TLS version
E. Authentication Algorithm
Reveal Answer
A. Minimum TLS version
B. Certificate
D. Maximum TLS version
Explanation:
To enable secure Web UI access on a Palo Alto Networks firewall via a trusted interface, the administrator must configure an SSL/TLS Service Profile with the following key settings:
Certificate
This is the server certificate used to authenticate the firewall to the browser.
It must be valid and trusted by client systems to avoid certificate warnings.
You can import a third-party certificate or generate one on the firewall.
Minimum TLS Version
Defines the lowest TLS protocol version allowed for secure connections.
Recommended to set this to TLS 1.2 or higher to avoid weak protocols.
Maximum TLS Version
Defines the highest TLS protocol version supported.
For management access, TLS 1.3 is supported and preferred for stronger security.
These three settings ensure that the Web UI uses a trusted certificate and secure protocol versions, which are essential for encrypted management access.
❌ Why the Other Options Are Incorrect:
C. Encryption Algorithm → Not directly configurable in the SSL/TLS Service Profile. Cipher suites are automatically selected based on the TLS versions.
E. Authentication Algorithm → Not a setting in SSL/TLS Service Profiles. Authentication is handled separately via admin credentials or certificate-based auth.
References:
Configure an SSL/TLS Service Profile – Palo Alto Networks
Secure Web-GUI Access Using Certificates – Knowledge Base
Question # 5
An engineer configures a specific service route in an environment with multiple virtual
systems instead of using the inherited global service route configuration.
What type of service route can be used for this configuration? A. IPv6 Source or Destination Address
B. Destination-Based Service Route
C. IPv4 Source Interface
D. Inherit Global Setting
Reveal Answer
C. IPv4 Source Interface
Explanation:
When configuring service routes on a Palo Alto firewall:
By default, all services (DNS, updates, PAN-DB, WildFire, etc.) use the management interface (global setting).
In multi-vsys environments, you can override this global configuration and define service routes per virtual system.
The supported type of service route override in this context is:
IPv4 Source Interface (and Source Address if needed) → This allows traffic for services to egress from a specific data interface rather than the management interface.
This gives admins more flexibility and security by isolating services per VSYS.
❌ Why other options are incorrect
A. IPv6 Source or Destination Address
❌ Not correct.Service routes support IPv4 source interface/source address. IPv6 service routes are supported in PAN-OS, but per-vsys overrides are specifically IPv4-based.
B. Destination-Based Service Route
❌ Not correct. Service routes are configured based on the service type (e.g., DNS, updates, WildFire), not based on the destination.
D. Inherit Global Setting
❌ Not correct. This is the default behavior (inherit from global configuration). The question specifically says the engineer configures a specific service route instead of using inherited global config, so this is not the answer.
📖 Reference
Palo Alto Networks TechDocs – Service Routes
PCNSE Study Guide: Service routes can be configured per-vsys using IPv4 source interface/address.
Question # 6
Which GloDalProtecI gateway setting is required to enable split-tunneting by access route,
destination domain and application? A. Tunnel modeB. Satellite modeC. IPSec modeD. No Direct Access to local networks
Reveal Answer
A. Tunnel mode
Explanation:
Why Tunnel Mode?
1.Split-Tunneling Requirements:
Access Route: Defines which traffic goes through the VPN (e.g., corporate subnets).
Destination Domain: Allows tunneling only for specific domains (e.g., *.company.com).
Application: Controls VPN routing per application (e.g., only tunnel Outlook).
Tunnel Mode is the only GlobalProtect gateway setting that supports all three split-tunneling methods simultaneously.
2.How It Works:
In Tunnel Mode, the GlobalProtect client:
Evaluates traffic against split-tunnel rules (routes/domains/apps).
Selectively routes matching traffic through the VPN.
Non-matching traffic (e.g., public web browsing) goes directly to the internet.
Why Not Other Options?
B. Satellite Mode Used for cloud gateways, not split-tunneling control.
C. IPSec Mode Legacy VPN (no support for domain/application-based split-tunneling).
D. No Direct Access Disables split-tunneling entirely (forces all traffic through VPN).
Key Configuration:
Under Network > GlobalProtect > Gateways > [Gateway] > Agent > Split Tunnel:
Enable Tunnel Mode.
Configure:
Access Routes (e.g., 10.0.0.0/8).
Domains (e.g., *.internal.com).
Applications (e.g., ms-outlook.exe).
Reference:
Palo Alto GlobalProtect Admin Guide:
"Tunnel Mode enables granular split-tunneling by access route, domain, and application.
Question # 7
When creating a Policy-Based Forwarding (PBF) policy, which two components can be
used? (Choose two.) A. ScheduleB. Source DeviceC. Custom ApplicationD. Source Interface
Reveal Answer
A. ScheduleD. Source Interface
Explanation:
In a Palo Alto Networks firewall, a Policy-Based Forwarding (PBF) policy is used to control how traffic is routed based on specific criteria, overriding the default routing table. PBF policies are configured under Policies > Policy Based Forwarding and allow administrators to define rules that direct traffic to specific interfaces, next hops, or virtual routers based on various match conditions. The question asks which components can be used in a PBF policy, with Schedule and Source Interface being valid options.
Correct Answers
A. Schedule:
A Schedule can be used in a PBF policy to specify when the policy is active (e.g., during business hours, specific days). This is configured in the General tab of the PBF policy under Schedule, where a predefined or custom schedule (created under Objects > Schedules) is selected. The schedule determines when the policy’s forwarding rules apply, allowing time-based traffic routing control.
Example: A PBF policy routes traffic to a backup link only during maintenance windows defined by a schedule.
D. Source Interface:
The Source Interface is a match condition in a PBF policy, specified in the Source tab. It defines the ingress interface (e.g., ethernet1/1) from which traffic must originate for the policy to apply. This allows granular control over which traffic is subject to the PBF rule based on the interface it enters.
Example: A PBF policy routes traffic entering via ethernet1/2 to a specific next-hop gateway.
Why Other Options Are Incorrect
B. Source Device:
Source Device is not a valid match condition in PBF policies. While PBF policies can use Source Address, Source Zone, or Source User, there is no “Source Device” field. Device-specific criteria are used in other contexts, like GlobalProtect HIP profiles, but not in PBF.
C. Custom Application:
While PBF policies can match traffic based on Applications (including custom applications defined under Objects > Applications), the question’s phrasing suggests distinct components. Custom applications are part of the Application match condition, but Schedule and Source Interface are more fundamental components of the policy structure itself, making this option less precise.
Technical Details
PBF Policy Configuration:
Navigate to Policies > Policy Based Forwarding, create a rule, and set:
Schedule in the General tab (e.g., select “business-hours”).
Source Interface in the Source tab (e.g., ethernet1/1).
Define forwarding actions (e.g., next-hop IP, egress interface) in the Forwarding tab.
CLI: set rulebase pbf rules source interface schedule .
Other Match Conditions: PBF supports Source Zone, Source Address, Source User, Destination Address, Service, and Application.
Monitoring: Verify PBF application via Monitor > Logs > Traffic or CLI (show running pbf-policy).
Best Practice: Use schedules for time-based routing and source interfaces for precise traffic control.
PCNSE Relevance
The PCNSE exam tests your ability to configure PBF policies for advanced traffic routing. Understanding valid components like Schedule and Source Interface ensures effective policy creation and troubleshooting.
References:
Palo Alto Networks Documentation (PAN-OS Admin Guide): Details PBF policy components, including Schedule and Source Interface.
Palo Alto Networks Knowledge Base (Article ID: 000052678): Explains PBF match conditions, confirming Source Interface and Schedule support.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.