Question # 1
A firewall engineer has determined that, in an application developed by the company's
internal team, sessions often remain idle for hours before the client and server exchange
any data. The application is also currently identified as unknown-tcp by the firewalls. It is
determined that because of a high level of trust, the application does not require to be
scanned for threats, but it needs to be properly identified in Traffic logs for reporting
purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is
used to identify the application? A. Create a custom application with specific timeouts and signatures based on patterns
discovered in packet captures.B. Access the Palo Alto Networks website and raise a support request through the
Customer Support Portal.C. Create a custom application with specific timeouts, then create an application override
rule and reference the custom application.D. Access the Palo Alto Networks website and complete the online form to request that a
new application be added to App-ID.
Reveal Answer
C. Create a custom application with specific timeouts, then create an application override
rule and reference the custom application.
Explanation : For an application that is currently identified as unknown-tcp and has
sessions that often remain idle for long periods, creating a custom application and using an
application override rule is the most time-efficient solution.
C. The process involves:
Creating a custom application in the Palo Alto Networks firewall and configuring it
with specific timeouts to accommodate the application's idle session behavior. This
step ensures that the firewall does not prematurely close the application's sessions
due to inactivity.
Next, creating an application override rule that references the custom application.
This rule directs the firewall to identify traffic matching the rule criteria (such as
source, destination, and port information) as the custom application, bypassing the
App-ID engine's regular identification process.
This approach allows for the quick implementation of a solution that ensures the application
is properly identified in traffic logs without undergoing threat scanning, meeting the
requirements for both identification and reporting.
Question # 2
A firewall engineer needs to update a company's Panorama-managed firewalls to the latest
version of PAN-OS. Strict security requirements are blocking internet access to Panorama
and to the firewalls. The PAN-OS images have previously been downloaded to a secure
host on the network.
Which path should the engineer follow to deploy the PAN-OS images to the firewalls? A. Upload the image to Panorama > Software menu, and deploy it to the firewalls. *B. Upload the image to Panorama > Device Deployment > Dynamic Updates menu, and
deploy it to the firewalls.C. Upload the image to Panorama > Dynamic Updates menu, and deploy it to the firewalls.D. Upload the image to Panorama > Device Deployment > Software menu, and deploy it to
the firewalls.
Reveal Answer
D. Upload the image to Panorama > Device Deployment > Software menu, and deploy it to
the firewalls.
Explanation :
In a situation where Panorama and its managed firewalls lack internet access, updating
PAN-OS requires a manual upload of the downloaded PAN-OS images. The process
involves:
D. Upload the image to Panorama > Device Deployment > Software menu, and
deploy it to the firewalls:
The engineer first uploads the downloaded PAN-OS images to Panorama. This is
done through the "Device Deployment" section, specifically under the "Software"
menu. This area of Panorama's interface is designed for managing PAN-OS
versions and software updates for the managed devices.
Once the PAN-OS images are uploaded to Panorama, the engineer can then
deploy these images to the firewalls directly from Panorama. This process allows
for centralized management of software updates, ensuring that all firewalls can be
updated to the latest PAN-OS version in a consistent and controlled manner, even
without direct internet access.
This method streamlines the update process for environments with strict security
requirements, allowing for the efficient deployment of necessary PAN-OS updates to
maintain security and functionality.
Question # 3
Which two items must be configured when implementing application override and allowing
traffic through the firewall? (Choose two.) A. Application filterB. Application override policy ruleC. Security policy ruleD. Custom app
Reveal Answer
B. Application override policy ruleC. Security policy rule
Explanation : When implementing an application override in a Palo Alto Networks firewall,
the primary goal is to explicitly define how specific traffic is identified and processed by the
firewall, bypassing the regular App-ID process. This is particularly useful for traffic that
might be misidentified by App-ID or for applications that require special handling for
performance reasons.
To successfully implement application override, the following items must be configured:
B. Application override policy rule: This is a specialized policy rule that you create to
specify the criteria for the traffic you want to override. In this rule, you define the source and
destination zones, addresses, and ports. Instead of relying on the App-ID engine to identify
the application, the firewall uses the criteria defined in the application override policy to
classify the traffic.
C. Security policy rule: After defining an application override policy, you must also
configure a security policy rule to allow the overridden traffic through the firewall. This rule
specifies the action (allow, deny, drop, etc.) for the traffic that matches the application
override policy. It's essential to ensure that the security policy rule matches the traffic
defined in the application override policy to ensure that the intended traffic is allowed
through the firewall.
For detailed guidance on configuring application override and the necessary security
policies, refer to the official Palo Alto Networks documentation. This resource provides
step-by-step instructions and best practices for effectively managing traffic using
application overrides.
Question # 4
A network engineer troubleshoots a VPN Phase 2 mismatch and decides that PFS (Perfect
Forward Secrecy) needs to be enabled. What action should the engineer take? A. Enable PFS under the IKE gateway advanced options.
B. Enable PFS under the IPSec Tunnel advanced options.
C. Add an authentication algorithm in the IPSec Crypto profile.
D. Select the appropriate DH Group under the IPSec Crypto profile.
Reveal Answer
B. Enable PFS under the IPSec Tunnel advanced options.
Question # 5
An administrator configures a preemptive active-passive high availability (HA) pair of
firewalls and configures the HA election settings on firewall-02 with a device priority value
of 100, and firewall-01 with a device priority value of 90. When firewall-01 is rebooted, is there any action taken by the firewalls? A. No - Neither firewall takes any action because firewall-01 cannot be rebooted when
configured with device priority of 90.B. No - Neither firewall takes any action because firewall-02 is already the active-primary
member.C. Yes - Firewall-02 takes over as the active-primary firewall; firewall-01 takes over as the
active-primary member after it becomes functional.D. Yes - Firewall-02 takes over as the active-primary firewall; firewall-02 remains the
active-primary member after firewall-01 becomes functional.
Reveal Answer
C. Yes - Firewall-02 takes over as the active-primary firewall; firewall-01 takes over as the
active-primary member after it becomes functional.
Question # 6
Which three multi-factor authentication methods can be used to authenticate access to the
firewall? (Choose three.) A. VoiceB. FingerprintC. SMSD. User certificateE. One-time password
Reveal Answer
C. SMSD. User certificateE. One-time password
Explanation : The firewall can use three multi-factor authentication methods to authenticate
access to the firewall: SMS, user certificate, and one-time password. These methods can
be used in combination with other authentication factors, such as username and password,
to provide stronger security for accessing the firewall web interface or CLI. The firewall can
integrate with various MFA vendors that support these methods through RADIUS or SAML
protocols5. Voice and fingerprint are not supported by the firewall as MFA
methods. References: MFA Vendor Support, PCNSE Study Guide (page 48)
Question # 7
Which two scripting file types require direct upload to the Advanced WildFire portal/API for
analysis? (Choose two.) A. Ps1B. PerlC. PythonD. VBS
Reveal Answer
B. PerlD. VBS
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.