Question # 1
ln a security-first network, what is the recommended threshold value for apps and threats to
be dynamically updated? A. 1 to 4 hours
B. 6 to 12 hours
C. 24 hours
D. 36 hours
Reveal Answer
B. 6 to 12 hours
Explanation :
Schedule content updates so that they download-and-install automatically. Then, set a
Threshold that determines the amount of time the firewall waits before installing the latest
content. In a security-first network, schedule a six to twelve hour threshold.
Question # 2
A firewall engineer supports a mission-critical network that has zero tolerance for
application downtime. A best-practice action taken by the engineer is configure an
applications and Threats update schedule with a new App-ID threshold of 48 hours. Which
two additional best-practice guideline actions should be taken with regard to dynamic
updates? (Choose two.) A. Create a Security policy rule with an application filter to always allow certain categories
of new App-IDs.B. Click "Review Apps" after application updates are installed in order to assess how the
changes might impact Security policy.C. Select the action "download-only" when configuring an Applications and Threats update
schedule.D. Configure an Applications and Threats update schedule with a threshold of 24 to 48
hours
Reveal Answer
B. Click "Review Apps" after application updates are installed in order to assess how the
changes might impact Security policy.C. Select the action "download-only" when configuring an Applications and Threats update
schedule.
Question # 3
Which three multi-factor authentication methods can be used to authenticate access to the
firewall? (Choose three.) A. VoiceB. FingerprintC. SMSD. User certificateE. One-time password
Reveal Answer
C. SMSD. User certificateE. One-time password
Explanation : The firewall can use three multi-factor authentication methods to authenticate
access to the firewall: SMS, user certificate, and one-time password. These methods can
be used in combination with other authentication factors, such as username and password,
to provide stronger security for accessing the firewall web interface or CLI. The firewall can
integrate with various MFA vendors that support these methods through RADIUS or SAML
protocols5. Voice and fingerprint are not supported by the firewall as MFA
methods. References: MFA Vendor Support, PCNSE Study Guide (page 48)
Question # 4
Which operation will impact the performance of the management plane? A. Decrypting SSL sessionsB. Generating a SaaS Application reportC. Enabling DoS protectionD. Enabling packet buffer protection
Reveal Answer
B. Generating a SaaS Application report
Question # 5
If an administrator wants to apply QoS to traffic based on source, what must be specified in
a QoS policy rule? A. Post-NAT destination address
B. Pre-NAT destination address
C. Post-NAT source address
D. Pre-NAT source address
Reveal Answer
C. Post-NAT source address
Explanation : If an administrator wants to apply QoS to traffic based on source, they must
specify the post-NAT source address in a QoS policy rule. This is because QoS is enforced
on traffic as it egresses the firewall, and the firewall applies NAT rules before QoS rules.
Therefore, the firewall will match the QoS policy rule based on the translated source
address, not the original source address. If the administrator uses the pre-NAT source
address in the QoS policy rule, the firewall will not be able to identify the traffic correctly
and apply the desired QoS treatment.
Question # 6
A firewall administrator is investigating high packet buffer utilization in the company firewall.
After looking at the threat logs and seeing many flood attacks coming from a single source
that are dropped by the firewall, the administrator decides to enable packet buffer
protection to protect against similar attacks.
The administrator enables packet buffer protection globally in the firewall but still sees a
high packet buffer utilization rate.
What else should the administrator do to stop packet buffers from being overflowed? A. Apply DOS profile to security rules allow traffic from outside.B. Add the default Vulnerability Protection profile to all security rules that allow traffic from
outside.C. Enable packet buffer protection for the affected zones.D. Add a Zone Protection profile to the affected zones
Reveal Answer
C. Enable packet buffer protection for the affected zones.
Question # 7
Which type of policy in Palo Alto Networks firewalls can use Device-ID as a match
condition? A. NATB. DOS protectionC. QoSD. Tunnel inspection
Reveal Answer
C. QoS
Explanation :
The type of policy in Palo Alto Networks firewalls that can use Device-ID as a match
condition is QoS. This is because Device-ID is a feature that allows the firewall to identify
and classify devices on the network based on their characteristics, such as vendor, model,
OS, and role1. QoS policies are used to allocate bandwidth and prioritize traffic based on
various criteria, such as application, user, source, destination, and device2. By using
Device-ID as a match condition in QoS policies, the firewall can apply different QoS actions
to different types of devices, such as IoT devices, laptops, smartphones, etc3. This can
help optimize the network performance and ensure the quality of service for critical
applications and devices.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.