Question # 1
Which log type is supported in the Log Forwarding profile? A. ConfigurationB. GlobalProtectC. TunnelD. User-ID
Reveal Answer
C. Tunnel
Explanation:
A Log Forwarding profile in Palo Alto Networks is used to send specific types of logs to an external destination, such as a syslog server, SNMP manager, or email server. These profiles are highly customizable and can be applied to different rules and zones to forward logs based on specific criteria.
The following log types are commonly supported in a Log Forwarding profile:
1.Traffic: Logs related to network sessions (start, end, deny, drop).
2.Threat: Logs for security events like viruses, spyware, vulnerabilities, and other threats.
3.URL Filtering: Logs related to web browsing activity, including which URLs were allowed or blocked.
4.WildFire Submissions: Logs for files sent to the WildFire analysis cloud.
5.Data Filtering: Logs for sensitive data (e.g., credit card numbers) detected in network traffic.
6.Tunnel: Logs for tunnel activity, such as GlobalProtect, IPsec VPN, and GTP.
7.Authentication: Logs for user authentication events.
8.Decryption: Logs for SSL/TLS decryption sessions.
9.HIP Match: Logs for host information profile (HIP) matches.
Based on this list, Tunnel is a supported log type within a Log Forwarding profile.
Why the other options are incorrect:
A. Configuration: Configuration logs are system-wide logs that record changes to the firewall configuration. They are not part of a Log Forwarding profile applied to security policies. Instead, they are forwarded directly from the Device > Log Settings tab.
B. GlobalProtect: While GlobalProtect generates logs, the specific log type used for forwarding is often categorized under other names. The Tunnel log type is the general category for all tunnel-related events, including GlobalProtect VPNs. The Log Forwarding profile has a specific "Tunnel" log type option.
D. User-ID: The User-ID log type is used to track the mapping of IP addresses to usernames. Like Configuration logs, User-ID logs are typically configured for forwarding under the Device > Log Settings menu, not within a Log Forwarding profile that is tied to a security policy rule.
Reference
This information can be found in the Palo Alto Networks official documentation, specifically within the sections on Objects > Log Forwarding and Device > Log Settings. These guides provide detailed breakdowns of which log types can be forwarded via a Log Forwarding profile and which are configured through other means. The distinction is a key concept in the PCNSE exam, as it tests the administrator's knowledge of the different logging mechanisms available on the firewall.
Question # 2
Forwarding of which two log types is configured in Device > Log Settings? (Choose two.) A. ThreatB. HIP MatchC. TrafficD. Configuration
Reveal Answer
B. HIP MatchD. Configuration
Explanation: Based on PAN-OS 11.0 documentation, the forwarding configuration for
specific log types in Device > Log Settings involves selecting log types for system-level
logs, which include HIP Match and Configuration logs.
Explanation for Each Option
A. Threat
Threat logs record detected security threats such as malware, viruses, and
vulnerabilities.
Forwarding of Threat logs is not configured in Device > Log Settings. Instead,
Threat logs are forwarded using Log Forwarding Profiles applied to Security
Policies.
Verdict: Incorrect.
B. HIP Match
HIP Match logs capture information about endpoint compliance reported by
GlobalProtect clients.
These logs can be configured for forwarding in Device > Log Settings for
monitoring and compliance purposes.
Verdict: Correct.
C. Traffic
Traffic logs provide details about allowed or denied network traffic.
Forwarding of Traffic logs is configured using Log Forwarding Profiles applied to
Security Policies, not in Device > Log Settings.
Verdict: Incorrect.
D. Configuration
Configuration logs track administrative changes to the firewall, such as updates to
policies, settings, and objects.
These logs can be forwarded from Device > Log Settings for auditing purposes.
Verdict: Correct.
Correct Answer
B. HIP MatchD. Configuration
Key Points from PAN-OS 11.0 Documentation
Device > Log Settings is specifically for system-related logs like HIP Match and
Configuration.
Logs like Threat and Traffic are handled through Log Forwarding Profiles applied
to Security or NAT policies.
Question # 3
An engineer is configuring Packet Buffer Protection on ingress zones to protect from singlesession
DoS attacks.
Which sessions does Packet Buffer Protection apply to? A. It applies to existing sessions and is global.
B. It applies to new sessions and is not global.
C. It applies to existing sessions and is not global.
D. It applies to new sessions and is global.
Reveal Answer
D. It applies to new sessions and is global.
Explanation:
An engineer is configuring Packet Buffer Protection on ingress zones to protect a Palo Alto Networks firewall from single-session Denial of Service (DoS) attacks, which overwhelm packet buffers by exhausting resources with individual session floods. Packet Buffer Protection, enabled under Device > Setup > Session > Packet Buffer Protection, is a global feature designed to manage data plane resources by limiting the number of packets a single session can buffer. It applies to new sessions because it evaluates and enforces limits as sessions are initiated, preventing resource exhaustion from the outset. The protection is global across the firewall, affecting all interfaces and zones, though its thresholds can be influenced by zone-specific configurations (e.g., via Zone Protection profiles).
Why Other Options Are Incorrect:
A. It applies to existing sessions and is global: This is incorrect because Packet Buffer Protection does not retroactively apply to existing sessions. It is proactive, targeting new sessions to prevent buffer overflow. The PCNSE Study Guide notes its forward-looking nature.
B. It applies to new sessions and is not global: This is incorrect because, while it applies to new sessions, Packet Buffer Protection is a global configuration that affects the entire firewall’s data plane, not just specific zones or interfaces unless enhanced by zone profiles. The PAN-OS 11.1 Administrator’s Guide confirms its global scope.
C. It applies to existing sessions and is not global: This is incorrect for two reasons: it does not apply to existing sessions (as explained above), and it is a global setting, not zone-specific by default. The PCNSE Study Guide clarifies its global application.
Practical Steps:
Navigate to Device > Setup > Session.
Expand Packet Buffer Protection and enable it.
Set global thresholds (e.g., maximum packets per session, burst size) to handle DoS attacks.
Optionally, enhance protection by applying a Zone Protection profile (Network > Zone Protection) to ingress zones, configuring flood protection thresholds.
Commit the configuration.
Monitor buffer utilization via Dashboard > Resources Widget or CLI show running resource-monitor.
Verify dropped sessions in Monitor > Threat Logs for DoS-related events.
Additional Considerations:
Adjust thresholds based on normal traffic patterns to avoid false positives.
Combine with Zone Protection profiles for zone-specific tuning if needed.
Ensure PAN-OS version (e.g., 11.1) supports this feature, which it does by default.
References:
Palo Alto Networks PAN-OS 11.1 Administrator’s Guide: Details Packet Buffer Protection scope.
Palo Alto Networks PCNSE Study Guide: Explains its application to new sessions.
Question # 4
An internal audit team has requested additional information to be included inside traffic logs
forwarded from Palo Alto Networks firewalls to an interal syslog server. Where can the
firewall engineer define the data to be added into each forwarded log? A. Data Patterns within Objects > Custom ObjectsB. Custom Log Format within Device Server Profiles> SyslogC. Built-in Actions within Objects > Log Forwarding ProfileD. Logging and Reporting Settings within Device > Setup > Management
Reveal Answer
B. Custom Log Format within Device Server Profiles> Syslog
Explanation:
The question asks where to define additional information to be included in each forwarded log. This is the exact purpose of a Custom Log Format.
Here’s the breakdown:
1.Location: The path is Device > Server Profiles > Syslog. Here, you create or edit a syslog server profile that defines where to send the logs.
2.Feature: Within each syslog server profile, there is a section called "Custom Log Format".
3.Function: This feature allows you to build a custom template for the log message that will be sent to the syslog server. You can add, remove, and rearrange the fields (variables) that are included in the log.
You can add fields that are not in the standard format, such as action, app-category, rule-name, src-vm-name, dst-vm-name, and many more.
This provides the flexibility to include the exact "additional information" requested by the audit team.
Steps to Configure:
Navigate to Device > Server Profiles > Syslog.
Edit an existing profile or create a new one.
Click the "Custom Log Format" toggle to enable it.
Use the drop-down menus to add the desired fields to the log format template.
Detailed Analysis of the Other Options:
A. Data Patterns within Objects > Custom Objects
Why it's wrong: Data Patterns are used to define custom strings of data (like credit card numbers or employee IDs) for use in Data Filtering profiles to detect and prevent data exfiltration. They are not used to modify the structure or content of log messages sent to syslog.
C. Built-in Actions within Objects > Log Forwarding Profile
Why it's wrong: This is a distractor. There is no menu called "Objects > Log Forwarding Profile". Log forwarding profiles are server profiles created under Device > Server Profiles > Syslog. "Built-in Actions" is not a term associated with log formatting.
D. Logging and Reporting Settings within Device > Setup > Management
Why it's wrong: This path (Device > Setup > Management) is where you configure fundamental logging parameters, such as:
The number of logs to store on the firewall.
The log export schedule.
The IP address of the Panorama management server.
It does not contain any settings for customizing the content or format of individual log messages forwarded to a syslog server.
Reference & Key Takeaway:
Core Concept: Understanding the difference between where to send logs (the server profile) and what to send (the log format). The Custom Log Format feature gives you granular control over the "what".
Use Case: This is essential for integration with third-party SIEM systems that may require a specific log format or need additional contextual fields for correlation and analysis.
Syntax: The custom format uses variables like $action, $rule, etc., to represent the data fields in the log message.
Question # 5
Users have reported an issue when they are trying to access a server on your network. The
requests aren’t taking the expected route. You discover that there are two different static
routes on the firewall for the server. What is used to determine which route has priority? A. The first route installedB. The route with the lowest administrative distanceC. Bidirectional Forwarding DetectionD. The route with the highest administrative distance
Reveal Answer
B. The route with the lowest administrative distance
Explanation:
When multiple static routes exist for the same destination on a Palo Alto Networks firewall, the firewall uses Administrative Distance (AD) to determine which route takes precedence. The route with the lowest AD is considered more trustworthy and is installed in the Routing Information Base (RIB) and Forwarding Information Base (FIB).
Static routes typically have a default AD of 10
Dynamic protocols like OSPF or BGP have higher ADs (e.g., OSPF internal = 30, BGP external = 20)
If two static routes exist, the one with the lower AD will be preferred—even if both have the same destination and prefix length
This mechanism ensures predictable routing behavior and allows administrators to configure backup routes by assigning them a higher AD, so they’re only used if the primary route fails.
❌ Why the Other Options Are Incorrect:
A. The first route installed → Route installation order is irrelevant. AD is the deciding factor.
C. Bidirectional Forwarding Detection (BFD) → BFD is used for route health monitoring, not for route selection. It can remove a route if the peer fails, but it doesn’t determine priority.
D. The route with the highest administrative distance → Opposite of correct. Higher AD means lower priority.
📚 Reference:
Static Route Overview – Palo Alto Networks
Route Preference Logic – Palo Alto Knowledge Base
Question # 6
What are three tasks that cannot be configured from Panorama by using a template stack?
(Choose three.) A. Change the firewall management IP addressB. Configure a device block listC. Add administrator accountsD. Rename a vsys on a multi-vsys firewallE. Enable operational modes such as normal mode, multi-vsys mode, or FIPS-CC mode
Reveal Answer
A. Change the firewall management IP addressC. Add administrator accountsE. Enable operational modes such as normal mode, multi-vsys mode, or FIPS-CC mode
Explanation:
Template Stacks in Panorama are used to push network and device-level configurations (e.g., interfaces, zones, virtual routers, DNS, NTP) to managed firewalls. However, certain system-level and administrative settings cannot be configured via templates and must be done directly on the firewall or in the device-specific context in Panorama.
Tasks That CANNOT Be Configured via Template Stack:
A. Change the firewall management IP address: This is a device-specific system setting configured under Device > Setup > Management on the firewall itself or in the Device Settings for the specific firewall in Panorama. It cannot be defined in a shared template.
C. Add administrator accounts: Administrator accounts are system-wide settings managed under Device > Administrators. These are not part of network configuration and are applied directly to the firewall's management plane, not pushed via templates.
E. Enable operational modes (e.g., normal, multi-vsys, FIPS-CC mode): These are device-specific modes that define the fundamental operation of the firewall. They are set under Device > Setup > Operations on the local firewall and cannot be controlled by a template.
Why the Other Options Are Incorrect:
B. Configure a device block list: This is a security policy object (Address or Address Group) that can be configured in a Device Group and pushed from Panorama. It is not a template-specific feature.
D. Rename a vsys on a multi-vsys firewall: While vsys creation/deletion is device-specific, renaming a vsys can be done via a template if the vsys is managed by that template. The template defines the vsys structure and its name.
Reference:
PAN-OS documentation specifies that templates manage network settings, while device-specific configurations (e.g., management IP, admin accounts, operational modes) are configured in Device Settings or locally on the firewall (PAN-OS Administrator’s Guide, "Templates" section). Operational modes like FIPS require a reboot and are immutable via templates.
Question # 7
A security engineer wants to upgrade the company's deployed firewalls from PAN-OS 10.1
to 11.0.x to take advantage of the new TLSvl.3 support for management access.
What is the recommended upgrade path procedure from PAN-OS 10.1 to 11.0.x? A. Required : Download PAN-OS 10.2.0 or earlier release that is not EOL.
Required : Download and install the latest preferred PAN-OS 10.2 maintenance release and
reboot.Required : Download PAN-OS 11.0.0. Required: Download and install the desired
PAN-OS 11.0.x. B. Required : Download and install the latest preferred PAN-OS 10.1 maintenance release
and reboot.
Required : Download PAN-OS 10.2.0.
Required : Download and install the latest preferred PAN-OS 10.2 maintenance release and
reboot.Required : Download PAN-OS 11.0.0.Required : Download and install the desired
PAN-OS 11.0.x. C. Optional : Download and install the latest preferred PAN-OS 10.1 release.Optional :
Install the latest preferred PAN-OS 10.2 maintenance release.Required : Download PANOS
11.0.0.Required : Download and install the desired PAN-OS 11.0.x. D. Required : Download and install the latest preferred PAN-OS 10.1 maintenance release
and reboot.Required : Download PAN-OS 10.2.0.
Optional : Install the latest preferred PAN-OS 10.2 maintenance release.Required :
Download PAN-OS 11.0.0.Required : Download and install the desired PAN-OS 11.0.x.
Reveal Answer
B. Required : Download and install the latest preferred PAN-OS 10.1 maintenance release
and reboot.
Required : Download PAN-OS 10.2.0.
Required : Download and install the latest preferred PAN-OS 10.2 maintenance release and
reboot.Required : Download PAN-OS 11.0.0.Required : Download and install the desired
PAN-OS 11.0.x.
Explanation:
When upgrading between major PAN-OS feature releases, Palo Alto Networks requires stepping through each feature release family (major version), installing a base release, then applying the latest maintenance release before moving to the next family.
For 10.1 → 11.0.x upgrade path:
Step 1: Stay current in the existing release (10.1).
First, upgrade to the latest preferred 10.1 maintenance release (for stability and bug fixes).
Reboot.
Step 2: Move to 10.2.
Download 10.2.0 (required base).
Then, upgrade to the latest preferred 10.2 maintenance release (e.g., 10.2.6-h6 or higher, depending on what is available).
Reboot.
Step 3: Move to 11.0.
Download 11.0.0 (required base).
Then upgrade to the desired 11.0.x maintenance release (e.g., 11.0.3-h3 or later).
This procedure ensures database compatibility, avoids skipping schema changes, and is officially recommended by Palo Alto Networks.
❌ Why other options are incorrect
A. Skips installing the latest preferred 10.1 maintenance release, which is required before moving to 10.2.
C. Lists 10.1 and 10.2 as optional. This is incorrect — you must install the latest preferred 10.1 and 10.2 releases before moving to 11.0.
D. Says installing the latest 10.2 maintenance release is optional. Wrong — Palo Alto requires it before moving to the next feature release.
📖 Reference
Palo Alto Networks TechDocs – Upgrade to PAN-OS 11.0
PAN-OS Upgrade Guide: Always upgrade to the latest preferred maintenance release of each major family in the path.
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.