Question # 1
A new firewall has the Threat Prevention subscription, but the Antivirus does not appear in
Dynamic Updates.
What must occur to have Antivirus signatures update? A. An Antivirus license is needed first, then a Security profile for Antivirus needs to be
created.B. An Antivirus license must be obtained before Dynamic Updates can be downloaded or
installed.C. An Advanced Threat Prevention license is required to see the Dynamic Updates for
Antivirus.D. Install the Application and Threats updates first, then refresh the Dynamic Updates.
Reveal Answer
D. Install the Application and Threats updates first, then refresh the Dynamic Updates.
Explanation:
1: Recall how Antivirus (AV) updates work
Palo Alto Antivirus signatures (for malware, spyware, C2 traffic) are part of the Threat Prevention subscription.
They are not tied to a separate “Antivirus license” (that doesn’t exist as a standalone).
AV updates depend on Application & Threats content being installed first, because the engine relies on the App-ID/Threat framework to identify traffic.
👉 So if you install Applications and Threats updates, then refresh Dynamic Updates, the Antivirus section appears.
2: Analyze the options
A. An Antivirus license is needed first…
❌ Wrong. There is no separate Antivirus license. Antivirus is included in Threat Prevention.
B. An Antivirus license must be obtained…
❌ Same as A — no such license exists.
C. An Advanced Threat Prevention license is required…
❌ Wrong. ATP (formerly Threat Prevention Cloud/ML-based inline detection) is a different subscription. Antivirus signatures are still part of Threat Prevention.
D. Install the Application and Threats updates first, then refresh the Dynamic Updates.
✅ Correct. This is the required step to make the Antivirus option appear in Dynamic Updates.
🔹 Key Takeaway (for PCNSE)
Threat Prevention subscription includes Antivirus, Anti-Spyware, Vulnerability, and DNS signatures.
No standalone AV license.
Antivirus updates require App+Threats content installed first, otherwise they won’t show.
📖 Reference:
Palo Alto Networks — Content and Threat Signatures
“You must install Applications and Threats content before Antivirus updates can be downloaded.”
Question # 2
Which User-ID mapping method should be used in a high-security environment where all IP
address-to-user mappings should always be explicitly known? A. PAN-OS integrated User-ID agentB. GlobalProtectC. Windows-based User-ID agentD. LDAP Server Profile configuration
Reveal Answer
B. GlobalProtect
Explanation:
For high-security environments where IP-to-user mappings must be explicitly known, GlobalProtect is the most reliable method. GlobalProtect is a comprehensive solution that not only provides secure remote access but also tightly integrates with the User-ID framework.
When a user connects through a GlobalProtect gateway, the gateway authenticates the user and creates a direct, explicit mapping of the user's IP address to their username. This mapping is then shared with the firewall's User-ID subsystem. This method is considered the most secure and accurate because the mapping is created and managed directly by the Palo Alto Networks platform itself, ensuring that the identity is verified and tied directly to the source IP at the time of connection.
Why the Other Options Are Incorrect
A. PAN-OS integrated User-ID agent: While PAN-OS firewalls have an integrated User-ID agent, its primary function is to monitor and collect user-to-IP mappings from sources like a directory service (LDAP) or a domain controller. This is effective but can have delays and is not as direct or explicit as a GlobalProtect-based mapping. It relies on a "pull" or "listen" mechanism.
C. Windows-based User-ID agent: This agent is installed on a Windows domain controller and listens for login events. While this is a widely used and effective method, it is still an inference-based mapping. The agent correlates a login event with an IP address, but this isn't as direct as a user-authenticated connection through a VPN tunnel. In high-security environments, the possibility of a missed or delayed log can be a concern.
D. LDAP Server Profile configuration: An LDAP server profile is used to connect to a directory service like Active Directory to authenticate users and fetch group information. It does not, by itself, create the IP-to-user mapping. It provides the user and group context for policies, but another mechanism (like a User-ID agent or GlobalProtect) is required to perform the initial IP address to user name mapping.
Question # 3
A company CISO updates the business Security policy to identify vulnerable assets and
services and deploy protection for quantum-related attacks. As a part of this update, the
firewall team is reviewing the cryptography used by any devices they manage. The firewall
architect is reviewing the Palo Alto Networks NGFWs for their VPN tunnel configurations. It
is noted in the review that the NGFWs are running PAN-OS 11.2. Which two NGFW
settings could the firewall architect recommend to deploy protections per the new policy?
(Choose two) A. IKEv1 only to deactivate the use of public key encryptionB. IKEv2 with Hybrid Key exchangeC. IKEv2 with Post-Quantum Pre-shared KeysD. IPsec with Hybrid ID exchange
Reveal Answer
B. IKEv2 with Hybrid Key exchangeC. IKEv2 with Post-Quantum Pre-shared Keys
Explanation:
With PAN-OS 11.2, Palo Alto Networks NGFWs support quantum-resistant VPN configurations using two key standards:
✅ B. IKEv2 with Hybrid Key Exchange
Based on RFC 9242 and RFC 9370, this method uses multiple Key Exchange Mechanisms (KEMs)—including post-quantum algorithms like Crystals-Kyber, BIKE, HQC—alongside traditional Diffie-Hellman groups.
The result is a hybrid key that remains secure even if one KEM is compromised.
This protects against Harvest Now, Decrypt Later (HNDL) attacks by ensuring long-term confidentiality.
✅ C. IKEv2 with Post-Quantum Pre-shared Keys (PPKs)
Based on RFC 8784, this method uses pre-shared keys that are quantum-safe.
It’s simpler to deploy and provides defense-in-depth when used alongside hybrid key exchange.
Ideal for environments where full hybrid KEM negotiation isn’t feasible or where simplicity is preferred.
❌ Why the Other Options Are Incorrect:
A. IKEv1 only to deactivate public key encryption → IKEv1 is deprecated and lacks support for post-quantum features. It’s less secure and should be avoided.
D. IPsec with Hybrid ID exchange → No such configuration exists. Hybrid key exchange applies to IKEv2, not IPsec phase directly.
📚 References:
Configure Post-Quantum IKEv2 VPNs with Hybrid Keys
Quantum Safe VPN with RFC 8784, 9242, and 9370
Question # 4
Which GlobalProtect gateway selling is required to enable split-tunneling by access route,
destination domain, and application? A. No Direct Access to local networksB. Tunnel modeC. iPSec modeD. Satellite mode
Reveal Answer
B. Tunnel mode
Explanation:
Why Tunnel Mode?
1.Split-Tunneling Granularity:
Tunnel mode is the only GlobalProtect gateway setting that supports split-tunneling by access route, destination domain, and application simultaneously.
It allows administrators to define:
Access Routes: Specific IP subnets to tunnel (e.g., corporate networks).
Domains: Destination domains (e.g., *.company.com) to tunnel.
Applications: Specific executables (e.g., outlook.exe) to tunnel.
2.How It Works:
Traffic matching any of these criteria is routed through the VPN tunnel.
Non-matching traffic (e.g., general web browsing) accesses the internet directly.
Why Not Other Options?
A Disables split-tunneling entirely (forces all traffic through VPN).
C IPSec mode is legacy and does not support domain/application-based split-tunneling.
D Satellite mode is for cloud gateways and lacks granular split-tunneling controls.
Configuration Steps:
Navigate to: Network > GlobalProtect > Gateways > [Gateway] > Agent > Split Tunnel.
Set Tunnel Mode = Enabled.
Configure:
Access Routes (e.g., 10.0.0.0/8).
Domains (e.g., *.internal.com).
Applications (e.g., ms-outlook.exe).
Reference:
Palo Alto GlobalProtect Admin Guide
"Tunnel mode enables advanced split-tunneling by access route, domain, and application."
Question # 5
An engineer troubleshoots a Panorama-managed firewall that is unable to reach the DNS
servers configured via a global template. As a troubleshooting step, the engineer needs to
configure a local DNS server in place of the template value.
Which two actions can be taken to ensure that only the specific firewall is affected during
this process? (Choose two ) A. Configure the DNS server locally on the firewall.
B. Change the DNS server on the global template.
C. Override the DNS server on the template stack.
D. Configure a service route for DNS on a different interface.
Reveal Answer
A. Configure the DNS server locally on the firewall.
C. Override the DNS server on the template stack.
Explanation:
The goal is to change the DNS server for one specific firewall without affecting others managed by Panorama. This requires a method that overrides the template-derived configuration locally.
A. Configure the DNS server locally on the firewall:
This is done directly on the firewall's web interface under Device > Setup > Services > DNS.
A local configuration always takes precedence over a template-pushed configuration for the same setting. This ensures only this firewall uses the new DNS server.
C. Override the DNS server on the template stack:
In Panorama, you can create an override for a specific device within a template stack.
Navigate to Panorama > Templates > [Your Template Stack], select the firewall, and override the DNS setting. This change applies only to that firewall while leaving the global template unchanged for others.
Why the Other Options Are Incorrect:
B. Change the DNS server on the global template: This would affect all firewalls using that template, violating the requirement to isolate the change to one device.
D. Configure a service route for DNS on a different interface: This changes the path for DNS queries but does not alter the DNS server IP address itself. It is unrelated to replacing the template-configured DNS server value.
Reference:
PAN-OS documentation confirms that local device settings override template settings (Admin Guide: "Template Overrides"). Overrides in a template stack allow device-specific modifications without altering the base template.
Question # 6
Which three methods are supported for split tunneling in the GlobalProtect Gateway?
(Choose three.) A. Destination user/groupB. URL CategoryC. Destination DomainD. video streaming applicationE. Source Domain
Reveal Answer
C. Destination DomainD. video streaming application
Explanation:
GlobalProtect split tunneling allows administrators to define which traffic is sent through the VPN tunnel (to be inspected by the firewall) and which traffic is sent directly to the internet. The three supported methods for creating these rules are:
1.B. URL Category: Traffic destined for websites belonging to a specific URL category (e.g., "financial-services," "health-and-medicine," "not-resolved") can be either tunneled or excluded from the tunnel.
2.C. Destination Domain: Traffic destined for a specific fully qualified domain name (FQDN) (e.g., sensitive-app.corp.com) can be matched and the tunnel action applied.
3.F. Client Application Process: Traffic generated by a specific application process running on the endpoint (e.g., my_browser.exe, company_erp.exe) can be forced through the tunnel or allowed to go direct.
Why the Other Options Are Incorrect:
A. Destination user/group: Split tunnel rules are based on network traffic characteristics (domain, IP, URL, application), not on the user identity. User/Group is used elsewhere in GlobalProtect for authentication and connection policies, but not for defining split tunnel traffic matches.
D. Video streaming application: This is a specific use case, not a configurable matching criterion. While you could create a rule based on the URL category "streaming-media" or the application "netflix," "video streaming application" itself is not a selectable option in the split tunnel configuration.
E. Source Domain: Split tunnel policies are concerned with the destination of the traffic (where it's going), not its source domain. The source is always the GlobalProtect client.
Reference:
Palo Alto Networks Administrator Guide | GlobalProtect | Gateway Configuration | Split Tunnel: The official documentation lists the specific Include List and Exclude List criteria for split tunneling, which are: IP Address, Domain, URL Category, and Application. "Application" here refers to the Client Application Process.
Question # 7
An engineer is designing a deployment of multi-vsys firewalls.
What must be taken into consideration when designing the device group structure? A. Only one vsys or one firewall can be assigned to a device group, and a multi-vsys
firewall can have each vsys in a different device group.B. Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall
can have each vsys in a different device group.C. Only one vsys or one firewall can be assigned to a device group, except for a multi-vsys
firewall, which must have all its vsys in a single device group.D. Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall
must have all its vsys in a single device group.
Reveal Answer
B. Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall
can have each vsys in a different device group.
Explanation:
Key Concept: Device Groups in Panorama
Device Groups in Panorama are used to manage policies and objects (security rules, NAT, address objects, etc.) across multiple firewalls.
In multi-vsys (virtual system) firewalls, each vsys is treated like a separate firewall from a Panorama perspective.
That means Panorama can assign different vsys to different device groups.
❌ Eliminating Wrong Answers
A. Only one vsys or one firewall can be assigned to a device group, and a multi-vsys firewall can have each vsys in a different device group.
→ Wrong. A device group can manage multiple firewalls and multiple vsys, not just one.
C. Only one vsys or one firewall can be assigned to a device group, except for a multi-vsys firewall, which must have all its vsys in a single device group.
→ Wrong. Multi-vsys firewalls do not require all vsys to be in the same device group.
D. Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall must have all its vsys in a single device group.
→ Wrong. "Must" is the trap. PAN-OS allows flexibility — each vsys can go to a different device group.
✅ Correct Answer
B. Multiple vsys and firewalls can be assigned to a device group, and a multi-vsys firewall can have each vsys in a different device group.
📖 Reference (Official Docs)
Palo Alto Networks TechDocs – Panorama Admin Guide: Device Groups
How to Pass PCNSE Exam?
PCNSE certification validates your expertise in designing, deploying, configuring, and managing Palo Alto Networks firewalls and Panorama, making it essential to thoroughly understand both the concepts and practical applications.
Official PCNSE Study Guide is an excellent resource to help you prepare effectively. Consider enrolling in official training courses like the Firewall Essentials: Configuration and Management (EDU-210) or Panorama: Managing Firewalls at Scale (EDU-220). Setting up a lab environment using Palo Alto firewalls, either physical or virtual, allows you to practice configuring and managing the platform in real-world scenarios. Focus on key tasks such as configuring security policies, NAT, VPNs, and high availability, as well as implementing App-ID, Content-ID, and User-ID.
Our PCNSE practice test help you identify areas where you need improvement and familiarize you with the exam format and question types.
Engaging with the Palo Alto Networks community through forums like the LIVE Community or Reddit can also provide valuable insights and tips from others who have taken the Palo Alto certified network security engineer exam.