Your Path to PCNSE Certification Success

Practice makes perfect—and our PCNSE practice test make passing a certainty. Get ready to conquer your exam with ease! Prepare PCNSE Exam

image image image image image image
3000

Monthly Visitors

1

PCNSE Exam

250+

Questions With Answers

250

Students Passed

5

Monthly Updates

PCNSE Practice Test

At pcnsepracticetest.com, we offer expertly designed Palo Alto PCNSE practice test to help you gain the confidence and knowledge needed to pass the Palo Alto certified network security engineer exam on your first attempt. Our PCNSE exam questions are tailored to reflect the real exam experience, covering all critical topics such as firewall configuration, security policies, VPNs, threat prevention, and more.


Why Choose Us?


1. Exam-Aligned Questions: Our PCNSE practice exam is based on the latest exam objectives, ensuring you’re prepared for what’s on the actual exam.
2. Detailed Feedback: Get clear explanations for every Palo Alto certified network security engineer exam question to deepen your knowledge and learn from mistakes.
3. Track Your Progress: Monitor your performance over time and focus on areas that need improvement.
4. Flexible Practice: Study anytime, anywhere, and at your own pace with our user-friendly platform.


Palo Alto PCNSE Practice Exam Questions



Question # 1

An existing log forwarding profile is currently configured to forward all threat logs to Panorama. The firewall engineer wants to add syslog as an additional log forwarding method. The requirement is to forward only medium or higher severity threat logs to syslog. Forwarding to Panorama must not be changed. Which set of actions should the engineer take to achieve this goal?
A. 1- Open the current log forwarding profile.
2. Open the existing match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.
B. 1. Create a new log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the Panorama and syslog forward methods.
C. 1. Open the current log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.
D. 1. Create a new log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.


C. 1. Open the current log forwarding profile.
2. Add a new match list for threat log type.
3. Define the filter.
4. Select the syslog forward method.
Explanation:
To achieve the goal of forwarding only medium or higher severity threat logs to a new destination (syslog) while maintaining the existing forwarding to Panorama, the engineer should follow these steps:

1.Open the existing log forwarding profile.
The current profile is already configured to send all threat logs to Panorama. Since you want to keep this configuration, you should modify the existing profile rather than create a new one.
2.Add a new match list for the threat log type.
Log forwarding profiles use a series of "match lists" to define different forwarding rules based on log type and filters. You need to create a new match list specifically for the syslog forwarding.
3.Define the filter.
Within the new match list, you must specify a filter. The filter should be set to capture logs with a severity of "medium" or higher. The filter expression would look something like (severity geq medium).
4.Select the syslog forward method.
For this new match list, you should select the syslog server as the forwarding destination. The existing match list for Panorama will continue to function independently, forwarding all logs as configured.




Question # 2

A superuser is tasked with creating administrator accounts for three contractors. For compliance purposes, all three contractors will be working with different device-groups in their hierarchy to deploy policies and objects. Which type of role-based access is most appropriate for this project?
A. Create a Dynamic Read only superuser
B. Create a Dynamic Admin with the Panorama Administrator role
C. Create a Device Group and Template Admin
D. Create a Custom Panorama Admin


C. Create a Device Group and Template Admin
Explanation:
The Device Group and Template Admin role is specifically designed for delegated administration in Panorama. It allows you to assign access to specific device groups and templates, which is exactly what’s needed when contractors are working in separate hierarchies and must manage policies and objects independently.

This role ensures compliance and separation of duties, as each contractor can only see and modify the device groups and templates assigned to them — no cross-access.

❌ Why the others are incorrect:
A. Dynamic Read only superuser:
This role provides read-only access across the system. It’s unsuitable for contractors who need to deploy policies and objects, which requires write permissions.

B. Dynamic Admin with the Panorama Administrator role:
This grants full access to Panorama, including all device groups and templates. It violates the principle of least privilege and compliance boundaries, as contractors would see and potentially modify areas outside their scope.

D. Custom Panorama Admin:
While flexible, it requires manual configuration of granular permissions. It’s more error-prone and less efficient than using the purpose-built Device Group and Template Admin role, which simplifies scoped access.

📚 References:
Palo Alto Networks TechDocs: Role-Based Access Control in Panorama




Question # 3

A firewall administrator is changing a packet capture filter to troubleshoot a specific traffic flow Upon opening the newly created packet capture, the administrator still sees traffic for the previous fitter What can the administrator do to limit the captured traffic to the newly configured filter?
A. Command line > debug dataplane packet-diag clear filter-marked-session all
B. In the GLH under Monitor > Packet Capture > Manage Filters under Ingress Interface select an interface
C. Command line> debug dataplane packet-diag clear filter all
D. In the GUI under Monitor > Packet Capture > Manage Filters under the Non-IP field, select "exclude"


C. Command line> debug dataplane packet-diag clear filter all
Explanation:
When you apply a new packet capture filter, the firewall may still continue capturing traffic matching the old filter, because the previously configured filter is still cached in the dataplane.
To make sure only the new filter applies, you must clear the old filter configuration before starting a new capture.

The CLI command is:
> debug dataplane packet-diag clear filter all
This ensures that all previous filter conditions are removed, so the next packet capture will only use the newly configured filter.

❌ Why the other options are wrong:
A. debug dataplane packet-diag clear filter-marked-session all
This clears session-based debug filters, not the packet capture filter. Different purpose.
B. GUI under Monitor > Packet Capture > Manage Filters > Ingress Interface
Selecting an interface narrows the capture scope, but it does not clear the old filter, so stale matches may still show up.
D. GUI under Non-IP field, select "exclude"
This only filters out non-IP traffic, not the old filter set. Doesn’t solve the stale filter issue.

📖 Reference:
Palo Alto Networks TechDocs – Use Packet Capture:




Question # 4

Which three methods are supported for split tunneling in the GlobalProtect Gateway? (Choose three.)
A. Destination user/group
B. URL Category
C. Destination Domain
D. video streaming application
E. Source Domain


C. Destination Domain
D. video streaming application

Explanation:
GlobalProtect split tunneling allows administrators to define which traffic is sent through the VPN tunnel (to be inspected by the firewall) and which traffic is sent directly to the internet. The three supported methods for creating these rules are:

1.B. URL Category:
Traffic destined for websites belonging to a specific URL category (e.g., "financial-services," "health-and-medicine," "not-resolved") can be either tunneled or excluded from the tunnel.
2.C. Destination Domain:
Traffic destined for a specific fully qualified domain name (FQDN) (e.g., sensitive-app.corp.com) can be matched and the tunnel action applied.
3.F. Client Application Process:
Traffic generated by a specific application process running on the endpoint (e.g., my_browser.exe, company_erp.exe) can be forced through the tunnel or allowed to go direct.

Why the Other Options Are Incorrect:
A. Destination user/group:
Split tunnel rules are based on network traffic characteristics (domain, IP, URL, application), not on the user identity. User/Group is used elsewhere in GlobalProtect for authentication and connection policies, but not for defining split tunnel traffic matches.
D. Video streaming application:
This is a specific use case, not a configurable matching criterion. While you could create a rule based on the URL category "streaming-media" or the application "netflix," "video streaming application" itself is not a selectable option in the split tunnel configuration.
E. Source Domain:
Split tunnel policies are concerned with the destination of the traffic (where it's going), not its source domain. The source is always the GlobalProtect client.

Reference:
Palo Alto Networks Administrator Guide | GlobalProtect | Gateway Configuration | Split Tunnel:
The official documentation lists the specific Include List and Exclude List criteria for split tunneling, which are: IP Address, Domain, URL Category, and Application. "Application" here refers to the Client Application Process.




Question # 5

A firewall engineer creates a source NAT rule to allow the company's internal private network 10.0.0.0/23 to access the internet. However, for security reasons, one server in that subnet (10.0.0.10/32) should not be allowed to access the internet, and therefore should not be translated with the NAT rule. Which set of steps should the engineer take to accomplish this objective?
A. 1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port.
2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none.
3. Place (NAT-Rule-1) above (NAT-Rule-2).
B. 1- Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.0/23.
2. Check the box for negate option to negate this IP subnet from NAT translation.
C. 1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port.
2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none.
3. Place (NAT-Rule-2) above (NAT-Rule-1).
D. 1. Create a NAT rule (NAT-Rule-1) and set the source address in the original packet to 10.0.0.10/32.
2. Check the box for negate option to negate this IP from the NAT translation.


C. 1. Create a source NAT rule (NAT-Rule-1) to translate 10.0.0/23 with source address translation set to dynamic IP and port.
2. Create another NAT rule (NAT-Rule-2) with source IP address in the original packet set to 10.0.0.10/32 and source translation set to none.
3. Place (NAT-Rule-2) above (NAT-Rule-1).
Explanation:
NAT rules on Palo Alto Networks firewalls are evaluated top-down, and the first matching rule is applied. To exclude a specific IP from NAT, you must create a more specific rule above the general rule.

step 1
This is the general rule for the entire subnet 10.0.0.0/23, translating it to a public IP.
Step 2 (NAT-Rule-2):
This rule matches only the server 10.0.0.10/32 and sets Source Translation to None, meaning no NAT is applied.
step 3
This ensures that traffic from 10.0.0.10 matches the more specific rule first and is excluded from NAT. The broader rule then handles the rest of the subnet.

Why the Other Options Are Incorrect:
A.: Placing the general rule (NAT-Rule-1) above the exception rule (NAT-Rule-2) would cause the server 10.0.0.10 to match the broader rule first and be translated, ignoring the exception.
B. & D.: The NAT rule configuration does not have a "negate" option for source addresses. Negation is available in security policies but not in NAT rules. This is not a valid method.

Reference:
PAN-OS NAT rule processing follows a top-down order, and exceptions must be placed above broader rules (PAN-OS Administrator’s Guide, "NAT Rule Evaluation" section). Setting Source Translation to None is the correct way to exclude an IP from NAT.




Question # 6

Review the screenshots.

What is the most likely reason for this decryption error log?
A. The Certificate fingerprint could not be found.
B. The client expected a certificate from a different CA than the one provided.
C. The client received a CA certificate that has expired or is not valid.
D. Entrust is not a trusted root certificate authority (CA).


C. The client received a CA certificate that has expired or is not valid.
Explanation:

Key Evidence from the Log:
1.Certificate Details:
Issuer: Entrust Certification Authority - L1M
Root CA: Entrust Root Certification Authority - G2 (trusted).
Expiry Date: 2022/04/01 15:38:03 (log timestamp: 2022/03/03).
The certificate was still valid at the time of the session, but the log shows a deny action.
2.Error Context:
Action: deny (blocked by rule Social-Media-Override).
Application: ssl (TLS/SSL handshake failure).
3.Possible Causes:
Intermediate CA (L1M) expired/revoked: Though the root CA is trusted, the chain might be broken.
Certificate validation failure: The firewall or client rejected the intermediate CA.

Why Not Other Options?
ANo mention of fingerprint mismatch in the log.
BThe log confirms the expected CA (Entrust).
DEntrust is trusted (Root CA is listed as trusted).

Root Cause Analysis:
The intermediate CA (L1M) might have been:
Revoked (not shown in the log but plausible).
Expired post-log (though the log shows it was valid at the time).
The firewall’s decryption profile likely enforced strict validation, rejecting the chain.

Reference:
Palo Alto Decryption Troubleshooting:
"Denied SSL sessions often result from invalid intermediate CA certificates or revocation checks."




Question # 7

After implementing a new NGFW, a firewall engineer sees a VoIP traffic issue going through the firewall After troubleshooting the engineer finds that the firewall performs NAT on the voice packets payload and opens dynamic pinholes for media ports What can the engineer do to solve the VoIP traffic issue?
A. Disable ALG under H.323 application
B. Increase the TCP timeout under H.323 application
C. Increase the TCP timeout under SIP application
D. Disable ALG under SIP application


D. Disable ALG under SIP application
Explanation:

Why Disable SIP ALG?
1.The Problem:
The firewall is modifying SIP/H.323 payloads (e.g., NATing internal IPs/ports in VoIP packets).
This breaks VoIP signaling, as endpoints expect original headers for media negotiation.
2.The Cause:
SIP ALG (Application Layer Gateway) is enabled by default on NGFWs.
ALG inspects and rewrites SIP/H.323 packets, often misinterpreting VoIP traffic.
3.The Fix:
Disabling SIP ALG stops the firewall from:
Altering SIP packet payloads.
Opening incorrect dynamic pinholes for RTP/RTCP media streams.

Steps to Disable SIP ALG:
Navigate to: Device > Setup > Session
Under Application Identification, uncheck:
SIP (and optionally H.323 if used).

Why Not Other Options?
A.H.323 ALG is unrelated if SIP is the primary VoIP protocol.
B/C.Timeout adjustments don’t fix NAT-induced payload corruption.

Additional VoIP Best Practices:
Use dedicated SIP security profiles (e.g., allow only SIP/RTP/RTCP).
Ensure NAT policies exclude VoIP traffic (or use static NAT).

Reference:
Palo Alto VoIP Troubleshooting Guide:
"Disable SIP ALG when endpoints handle NAT traversal independently (e.g., via STUN/ICE)."



How to Pass PCNSE Exam?

PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.

Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.

Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types. Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.