Pcnse - Test
Pcnse - Test
Networks
PCNSE
Palo Alto Networks Certified Network
Security Engineer PAN-OS 11.0 Version
QUESTION & ANSWERS
[Link]
QUESTION: 1
An engineer is reviewing the following high availability (HA) settings to understand a recent HA
failover event.
Which timer determines the frequency between packets sent to verify that the HA functionality
on the other HA firewall is operational?
Interval
Explanation/Reference:
The timer that determines the frequency between packets sent to verify that the HA functionality on the other
HA firewall is operational is the Hello Interval. The Hello Interval is the interval in milliseconds between hello
packets that are sent to check the HA status of the peer firewall. The default value for the Hello Interval is 8000
ms for all platforms, and the range is 8000- 60000 ms. If the firewall does not receive a hello packet from its
QUESTION: 2
An engineer notices that the tunnel monitoring has been failing for a day and the VPN should
have failed over to a backup path. What part of the network profile configuration should the
engineer verify?
Option A : Destination
IP Option B :
Threshold Option C :
Action
Option D : Interval
QUESTION: 3
Explanation/Reference:
Reference: [Link]
pbf/path- monitoring-for-pbf
QUESTION: 4
After switching to a different WAN connection, users have reported that various websites will not
load, and timeouts are occurring. The web servers work fine from other locations.
The firewall engineer discovers that some return traffic from these web servers is not reaching
the users behind the firewall. The engineer later concludes that the maximum transmission unit
(MTU) on an upstream router interface is set to 1400 bytes.
below 1500
(DF) setting.
Explanation/Reference:
The engineer should adjust the TCP maximum segment size (MSS) value on ethernet1/1 to remedy this problem.
This is because the MTU on an upstream router interface is set to 1400 bytes, which is causing the A. B. C. return
traffic from the web servers to not reach the users behind the firewall. By adjusting the TCP MSS value, the
engineer can ensure that the return traffic is able to reach the users without any issues. The TCP MSS is the
maximum amount of data that can be transmitted in a single TCP segment, excluding the TCP and IP headers.
The TCP MSS is usually derived from the MTU of the underlying network, which is the maximum packet size that
can be transmitted without fragmentation. For example, if the MTU is 1500 bytes, which is the default value for
ethernet interfaces, then the TCP MSS is 1460 bytes (1500 - 20 bytes for IP header - 20
bytes for TCP header). However, if there are intermediate devices or networks that have a lower MTU than the
end-to-end path, then the TCP MSS may need to be adjusted accordingly to avoid packet loss or fragmentation1.
In this case, the firewall has an MTU of 1500 bytes on ethernet1/1, which is connected to a WAN link. However, an
upstream router has an MTU of 1400 bytes on its interface, which means that any packet larger than 1400 bytes
will be either dropped or fragmented by the router. This can cause problems for the return traffic from the web
servers, which may have a TCP MSS of 1460 bytes or higher, depending on their MTU settings. If these packets
have the Don’t Fragment (DF) bit set in their IP header, which is common for TCP packets, then they will be
dropped by the router and never reach the firewall or the users behind it. If they do not have the DF bit set, then
they will be fragmented by the router and reassembled by the firewall, which can cause performance degradation
and overhead2. To avoid these problems, the engineer should adjust the TCP MSS value on ethernet1/1 to match
or be lower than the MTU of the upstream router. This can be done by using the CLI command set network
interface ethernet ethernet1/1 tcp-mss , where is an integer between 64 and 15003. For example, if the
engineer sets the TCP MSS value to 1360 bytes (1400 - 20 - 20), then this will ensure that any TCP packet sent or
received by ethernet1/1 will not exceed 1400 bytes in total size, and thus will not be dropped or fragmented by
the router. This will allow the return traffic from the web servers to reach the users behind the firewall without any
issues4. References: TCP Maximum Segment Size (MSS), Configure Session Settings, TCP MSS Adjustments,
QUESTION: 5
A customer is replacing their legacy remote access VPN solution The current solution is in place
to secure only internet egress for the connected clients Prisma Access has been selected to
replace the current remote access VPN solution During onboarding the following options and
licenses were selected and enabled - Prisma Access for Remote Networks 300Mbps - Prisma
Access for Mobile Users 1500 Users - Cortex Data Lake 2TB - Trusted Zones trust - Untrusted
Zones untrust - Parent Device Group shared How can you configure Prisma Access to provide the
same level of access as the current VPN solution?
Option A : Configure mobile users with trust-to-untrust Security policy rules to allow the desired
traffic outbound to the internet
Option B : Configure mobile users with a service connection and trust-to-trust Security
policy rules to allow the desired traffic outbound to the internet
Option C : Configure remote networks with a service connection and trust-to-untrust Security
policy rules to allow the desired traffic outbound to the internet
Option D : Configure remote networks with trust-to-trust Security policy rules to allow the desired
traffic outbound to the internet
Explanation/Reference:
To provide the same level of access as the current VPN solution, which is to secure only Internet egress for the
connected clients, you can configure mobile users with trust-to-untrust Security policy rules to allow the desired
traffic outbound to the Internet. This way, the mobile users will be assigned an IP address from a pool that
belongs to the trust zone, and they will be able to access the Internet through Prisma Access using a gateway
configure a service connection for this scenario, as a service connection is used to enable access between
mobile users and remote networks or private apps2 . You also do not need to configure trust-to-trust Security
policy rules, as they are used to enable access between mobile users and other trusted resources3.
References: 1: [Link]
the-prisma-access-inf2: [Link]
admin/prisma-access-service-co3: [Link]
managed-admin/prisma-access-mobile-us
QUESTION: 6
When planning to configure SSL Forward Proxy on a PA-5260, a user asks how SSL decryption can
be implemented using a phased approach in alignment with Palo Alto Networks best practices.
What should you recommend?
QUESTION: 7
An engineer is configuring a template in Panorama which will contain settings that need to be
applied to all firewalls in production. Which three parts of a template an engineer can configure?
(Choose three.)
NTP Server Address D. Service Route Configuration Short Explanation of Correct Answer Only: These parts of a
template can be configured on Panorama1. An antivirus profile and an authentication profile are not parts of a
[Link] templates-and-
groups/device-g
QUESTION: 8
When setting up a security profile, which three items can you use? (Choose three.)
Option A : Wildfire
analysis Option B : anti-
ransomware Option C :
antivirus
Option D : URL filtering
Option E : decryption
profile
Explanation/Reference:
Reference: [Link]
QUESTION: 9
In SSL Forward Proxy decryption, which two certificates can be used for certificate signing? (Choose
two.)
Option A : self-signed CA
certificate Option B : server
certificate
Option C : wildcard server
certificate Option D : client
certificate
Option E : enterprise CA certificate
Explanation/Reference:
Reference: [Link]
QUESTION: 10
QUESTION: 11
Starting with PAN-OS version 9.1, GlobalProtect logging information is now recorded in which
firewall log?
Option A :
GlobalProtect Option
B : System Option C :
Authentication Option
D : Configuration
Explanation/Reference:
for- [Link]
QUESTION: 12
A security engineer has configured a GlobalProtect portal agent with four gateways Which
GlobalProtect Gateway will users connect to based on the chart provided?
Option A : South
Option B : West
Option C : East
Option D : Central
Explanation/Reference:
Based on the provided table, the GlobalProtect portal agent configuration includes four gateways with varying
priorities and response times. Users will connect to the gateway with the highest priority and, if multiple gateways
share the same priority, the one with the lowest response time. Answer Determination Prioritize by Priority Level:
East: Highest South: High West: Medium Central: Low Evaluate Response Times Within Each Priority: East
(Highest): 35 ms South (High): 30 ms West (Medium): 50 ms Central (Low): 20 ms Given the highest priority is
"East" with a response time of 35 ms, users will connect to the East gateway based on the highest priority.
QUESTION: 13
An administrator configures a site-to-site IPsec VPN tunnel between a PA-850 and an external
customer on their policy-based VPN devices.
What should an administrator configure to route interesting traffic through the VPN tunnel?
Option C : GRE
Encapsulation Option D :
Tunnel Monitor
Explanation/Reference:
An administrator should configure proxy IDs to route interesting traffic through the VPN tunnel when the peer
device is a policy-based VPN device. Proxy IDs are used to identify the traffic that belongs to a particular IPSec
appropriate tunnel. Proxy IDs consist of a local IP address, a remote IP address, and an application (protocol and
port numbers). Each proxy ID is considered to be a VPN tunnel and is counted towards the IPSec VPN tunnel
are required for IKEv1 VPNs and optional for IKEv2 VPNs. If the proxy ID is not configured, the firewall uses the
default values of
source IP: [Link]/0, destination IP: [Link]/0, and application: any, which may not match the peer’s policy and
result in a failure to establish the VPN connection. References: Proxy ID for IPSec VPN Set Up an IPSec Tunnel
QUESTION: 14
An enterprise Information Security team has deployed policies based on AD groups to restrict
user access to critical infrastructure systems. However, a recent phishing campaign against the
organization has prompted Information Security to look for more controls that can secure access
to critical assets. For users that need to access these systems. Information Security wants to use
PAN-OS multi-factor authentication (MFA) integration to enforce MFA. What should the enterprise
do to use PAN-OS MFA?
Option A : Use a Credential Phishing agent to detect, prevent, and mitigate credential
phishing campaigns.
Option B : Create an authentication profile and assign another authentication factor to be used by
a Captive Portal authentication policy
Explanation/Reference:
To use PAN-OS multi-factor authentication (MFA) to secure access to critical assets, the enterprise should
configure a Captive Portal authentication policy that uses an authentication sequence. An authentication
sequence is a feature that allows the firewall to enforce multiple authentication methods (factors) for users who
access sensitive services or applications. An authentication sequence can include up to four factors, such as login
and password, Voice, SMS, Push, or One-time Password (OTP) authentication. The firewall can integrate with MFA
vendors through RADIUS or vendor APIs to provide the additional factors12. To configure an authentication
sequence, the enterprise needs to create an authentication profile for each factor and then add them to the
sequence in the desired order. The enterprise also needs to create a Captive Portal authentication policy that
matches the traffic that requires MFA and applies the authentication sequence to it. The Captive Portal is a web
page that the firewall displays to users who need to authenticate before accessing the network or the internet.
The Captive Portal can be customized to include a welcome message, a login prompt, a disclaimer, a certificate
download link, and a logout button34. When a user tries to access a service or application that matches the
Captive Portal authentication policy, the
firewall redirects the user to the Captive Portal web form for the first factor. After the user successfully
authenticates for the first factor, the firewall prompts the user for the second factor through RADIUS or vendor API
integration. The firewall repeats this process until all factors in the sequence are completed or until one factor
fails. If all factors are completed successfully, the firewall allows the user to access the service or application. If
one factor fails, the firewall denies access and logs an event56. Configuring a Captive Portal authentication policy
that uses an authentication profile that references a RADIUS profile is not sufficient to use PAN-OS MFA. This
option only provides one factor of authentication through RADIUS integration with an MFA vendor. To use multiple
factors of authentication, an authentication sequence is required. Creating an authentication profile and assigning
another authentication factor to be used by a Captive Portal authentication policy is not correct to use PAN-OS
MFA. This option does not specify how to create or apply an authentication sequence, which is necessary for
enforcing multiple factors of authentication. Using a Credential Phishing agent to detect, prevent, and mitigate
credential phishing campaigns is not relevant to use PAN-OS MFA. This option is a feature of Palo Alto Networks
Cortex XDR™ that helps protect endpoints from credential theft by malicious actors. It does not provide any MFA
functionality for accessing critical assets. References: Authentication Sequence, Configure Multi-Factor
QUESTION: 15
A firewall has been assigned to a new template stack that contains both 'Global' and 'Local'
templates in Panorama, and a successful commit and push has been performed. While validating
the configuration on the local firewall, the engineer discovers that some settings are not being
applied as [Link] setting values from the 'Global' template are applied to the firewall
instead of the 'Local' template that has different values for the same [Link] should be
done to ensure that the settings in the 'Local' template are applied while maintaining settings
from both templates?
Option A : Move the 'Global' template above the 'Local' template in the template
stack. Option B : Perform a commit and push with the 'Force Template Values'
option selected. Option C : Move the 'Local' template above the 'Global' template
in the template stack.
Explanation/Reference:
Explanation [Link]
routes-for-a- virtual-sy
QUESTION: 17
An administrator needs to gather information about the CPU utilization on both the management
plane and the data plane. Where does the administrator view the desired data?
Explanation/Reference:
Reference: [Link]
QUESTION: 18
SSL Forward Proxy decryption is configured, but the firewall uses Untrusted-CA to sign the
website [Link] certificate. End-users are receiving the "security
certificate is not trusted" [Link] SSL decryption, the web browser shows that the
website certificate is trusted and signed by a wellknown certificate chain: Well-Known-
Intermediate and [Link] network security administrator who represents the
customer requires the following two behaviors whenSSL Forward Proxy is enabled:1. End-users
must not get the warning for the [Link] website2. End-users
should get the warning for any other untrusted websiteWhich approach meets the two customer
requirements?
Option A : Clear the Forward Untrust Certificate check box on the Untrusted-CA certificate and
commit the configuration
Option B : Install the Well-Known-Intermediate-CA and Well-Known-Root-CA certificates on all end-
user systems in the user and local computer stores
Option C : Navigate to Device > Certificate Management > Certificates > Device Certificates,
import Well- KnownIntermediate-CA and Well-Known-Root-CA, select the Trusted Root CA
check box, and commit the configuration
Option D : Navigate to Device > Certificate Management > Certificates > Default Trusted
Certificate Authorities, import Well-Known-Intermediate-CA and Well-Known-Root-CA, select the
Trusted Root CA check box, and commit the configuration
QUESTION: 19
Option A : default-no-captive-portal
Option B : default-authentication-
bypass Option C : default-browser-
challenge Option D : default-web-
form
Explanation/Reference:
Reference: [Link]
QUESTION: 20
An engineer reviews high availability (HA) settings to understand a recent HA failover event.
Review the screenshot below.
Which timer determines the frequency at which the HA peers exchange messages in the form of
an ICMP (ping)
Explanation/Reference:
The heartbeat interval determines the frequency at which the HA peers exchange messages in the form of an
ICMP (ping). The default value is 1000 milliseconds (1 second). The heartbeat interval is used to detect failures
and trigger failover in an HA pair1. The other options are not correct. The hello interval determines the frequency
at which the HA peers exchange messages in the form of an HA packet. The default value is 3000 milliseconds (3
seconds). The hello interval is used to establish and maintain HA connectivity2. The promotion hold time
determines the amount of time that a passive firewall waits before it becomes active after detecting a failure on
failure after detecting a link down event on an interface. The default value is 2000 milliseconds (2 seconds)4.
References: 1: [Link]
timers 2:
[Link] 3:
[Link] 4
:[Link]
QUESTION: 21
An administrator wants to use LDAP, TACACS+, and Kerberos as external authentication services
for authenticating users. What should the administrator be aware of regarding the authentication
sequence, based on the Authentication profiles in the order Kerberos, LDAP, and TACACS+?
Option A : The priority assigned to the Authentication profile defines the order of the sequence.
Option B : The firewall evaluates the profiles in the alphabetical order the Authentication
profiles have been named until one profile successfully authenticates the user.
Option C : If the authentication times out for the first Authentication profile in the
authentication sequence, no further authentication attempts will be made
Option D : The firewall evaluates the profiles in top-to-bottom order until one Authentication
profile successfully authenticates the user.
QUESTION: 22
Which type of zone will allow different virtual systems to communicate with each other?
Option A : Tap
Option B :
External
Option C : Virtual Wire
Option D : Tunnel
Explanation/Reference:
An external zone is a type of zone that will allow different virtual systems to communicate with each other. An
external zone is a special zone that is shared by all virtual systems on the firewall and can be used to route traffic
without leaving the firewall. The external zone can also be used to route traffic to other zones within the same
virtual system1. The other options are not correct. A tap zone is a type of zone that is used to passively monitor
traffic without affecting the flow of packets2. A virtual wire zone is a type of zone that is used to create a
transparent bridge between two network segments without changing the original IP addressing or routing3. A
tunnel zone is a type of zone that is used to terminate VPN tunnels or other types of encapsulated traffic4.
interfaces/configure-a-tap-interface3 :[Link]
admin/networking/configure-interfaces/configure-a-virtual-wire4
:[Link] admin/networking/configure-interfaces/configure-a-tunnel-
inter
QUESTION: 23
A new application server [Link] has been deployed in the DMZ. There are no public
IP addresses available resulting in the server sharing MAT IP 198 51 100 B8 with another
OMZ serve that uses IP address 192 168 19? 60 Firewall security and NAT rules have been
configured The application team has confirmed mat the new server is able to establish a
secure connection to an external database with IP address [Link]. The database team
reports that they are unable to establish a secure connection to
196 51 100 88 from [Link] However it confirm a successful prig test to 198 51 100 88
Referring to the MAT configuration and traffic logs provided how can the firewall engineer resolve
the situation and ensure inbound and outbound connections work concurrently for both DMZ
servers?
Option
Option A
C ::
Configure separate source NAT and destination NAT rules for the two DMZ servers without using
the bidirectional option.
Option D : Move the NAT rule 6 DMZ server 2 above NAT rule 5 DMZ server 1.
Explanation/Reference:
The table displays NAT rules configured on the firewall. The key points are: Source Zone and Destination Zone
define the traffic flow. Source Address and Destination Address specify the IP addresses involved. Service
indicates the type of traffic (e.g., any, ping). Source Translation and Destination Translation show the translated
IP addresses for NAT. Issue and Resolution Options The application server at [Link] can establish
outbound connections but faces issues with inbound connections due to the shared NAT IP [Link]. The
[Link]. Options to Resolve the Issue: Replace the Two NAT Rules with a Single Rule: Combining both
DMZ servers into one NAT rule might simplify configuration but could cause issues in distinguishing inbound
traffic for each server. Pros: Simplifies rule management. Cons: Might not address the inbound traffic issue
properly. New Public IP Address: Obtaining a new public IP address for the new server ([Link]) ensures
dedicated inbound and outbound NAT. Pros: Clear separation of traffic, resolves inbound connectivity issues.
Cons: Requires additional public IP. Separate Source NAT and Destination NAT Rules: Configuring distinct NAT
rules for source and destination addresses without using the bidirectional option. Pros: Clear and distinct rules for
QUESTION: 25
Explanation/Reference:
Reference: [Link]
basedaccess- control/access-domains
QUESTION: 26
A network security administrator has an environment with multiple forms of authentication. There
is a network access control system in place that authenticates and restricts access for wireless
users, multiple Windows domain controllers, and an MDM solution for company-provided
smartphones. All of these devices have their authentication events logged. Given the information,
what is the best choice for deploying User-ID to ensure maximum coverage?
A syslog listener is the best choice for deploying User-ID to ensure maximum coverage in an environment with
multiple forms of authentication. A syslog listener is a feature that enables the firewall or Panorama to receive
syslog messages from other systems and parse them for IP address-to-username mappings. A syslog listener can
collect user mapping information from a variety of sources, such as network access control systems, domain
controllers, MDM solutions, VPN gateways, wireless controllers, proxies, and more2. A syslog listener can also
support multiple platforms and operating systems, such as Windows, Linux, macOS, iOS, Android, etc3.
Therefore, a syslog listener can provide a comprehensive and flexible solution for User-ID deployment in a large-
scale network. References: Configure a Syslog Listener for User Mapping, User-ID Agent Deployment Guide,
QUESTION: 27
A client wants to detect the use of weak and manufacturer-default passwords for IoT
[Link] option will help the customer?
QUESTION: 28
A firewall administrator notices that many Host Sweep scan attacks are being allowed through the
firewall sourced from the outside zone. What should the firewall administrator do to mitigate this
type of attack?
Option A : Create a Zone Protection profile, enable reconnaissance protection, set action to
Block, and apply it to the outside zone.
Option B : Create a DOS Protection profile with SYN Flood protection enabled and apply it to all
rules allowing traffic from the outside zone.
Option C : Enable packet buffer protection in the outside zone.
Option D : Create a Security rule to deny all ICMP traffic from the outside zone.
QUESTION: 29
Which three firewall multi-factor authentication factors are supported by PAN-OS? (Choose three)
QUESTION: 30
An administrator wants to grant read-only access to all firewall settings, except administrator
accounts, to a new-hire colleague in the IT department. Which dynamic role does the
administrator assign to the new-hire
colleague?
QUESTION: 31
An administrator has left a firewall to use the default port for all management
services. Which three functions are performed by the dataplane? (Choose three.)
Option B : NAT
Option C : NTP
Option D :
antivirus
QUESTION: 32
Option A : session
information Option B :
heartbeats
Option C : HA state information
Option D : User-ID information
Explanation/Reference:
links-and- backup-links
QUESTION: 33
What are three important considerations during SD-WAN configuration planning? (Choose three.)
Explanation/Reference:
[Link]
QUESTION: 34
Explanation/Reference:
Reference: [Link]
QUESTION: 35
Option A : routing FTP to a backup ISP link to save bandwidth on the primary ISP
link Option B : providing application connectivity the primary circuit fails
Option C : enabling the firewall to bypass Layer 7 inspection
Option D : forwarding all traffic by using source port 78249 to a specific egress interface
Explanation/Reference:
Reference: [Link]
pbf-for- outbound-access-with-dual-isps
QUESTION: 36
When you troubleshoot an SSL Decryption issue, which PAN-OS CLI command do you use to
check the details of the Forward Trust certificate, Forward Untrust certificate, and SSL Inbound
Inspection certificate?
Explanation/Reference:
To troubleshoot SSL Decryption issues and check the details of the Forward Trust certificate, Forward Untrust
certificate, and SSL Inbound Inspection certificate, the PAN-OS CLI command debug dataplane show ssl-decrypt
ssl-certs is used. This command provides detailed information about the SSL certificates involved in decryption
and inspection processes, allowing administrators to verify certificate validity, issuer details, and other critical
parameters. Understanding the certificate details is crucial in diagnosing issues related to SSL decryption, such as
QUESTION: 37
Which two events trigger the operation of automatic commit recovery? (Choose two.)
Option A : when an aggregate Ethernet interface component
fails Option B : when Panorama pushes a configuration
Option C : when a firewall performs a local
commit Option D : when a firewall HA pair fails
over
Explanation/Reference:
Reference: [Link]
automaticpanorama- [Link]
QUESTION: 38
Option A :
Choose the URL categories in the User Credential Submission column and set action to block
Select the User credential Detection tab and select Use Domain Credential Filter Commit
Option B :
Choose the URL categories in the User Credential Submission column and set action to block
Select the User credential Detection tab and select use IP User Mapping Commit
Option C :
Choose the URL categories on Site Access column and set action to block Click the User
credential Detection tab and select IP User Mapping Commit
Option D :
Choose the URL categories in the User Credential Submission column and set action to block
Select the URL filtering settings and enable Domain Credential Filter Commit
Explanation/Reference:
[Link]
phishing/set- up[Link]
credential-phishing/set-up-cre
QUESTION: 39
Which three items are import considerations during SD-WAN configuration planning? (Choose
three.)
Explanation/Reference:
[Link]
QUESTION: 40
How should an administrator enable the Advance Routing Engine on a Palo Alto Networks firewall?
Option A : Enable Advanced Routing Engine in Device > Setup > Session > Session Settings,
then commit and reboot.
Option B : Enable Advanced Routing in Network > Virtual Routers > Redistribution Profiles and
then commit.
Option C : Enable Advanced Routing in Network > Virtual Routers > Router Settings > General,
then commit and reboot.
Option D :
Enable Advanced Routing in General Settings of Device > Setup > Management, then commit
and reboot
Explanation/Reference:
Enable Advanced Routing in Network > Virtual Routers > Router Settings > General, then commit and reboot 1.
This means that the administrator can enable advanced routing features such asRIB filtering, BFD, multicast, and
redistribution profiles for each virtual router on the firewall. The firewall requires a reboot after enabling
QUESTION: 41
An administrator has configured PAN-OS SD-WAN and has received a request to find out the
reason for a session failover for a session that has already ended Where would you find this in
Panorama or firewall logs?
[Link]
QUESTION: 42
A threat intelligence team has requested more than a dozen Short signatures to be deployed on all
perimeter Palo Alto Networks firewalls. How does the firewall engineer fulfill this request with the
least time to implement?
Option A :
Option B :
Create custom vulnerability signatures manually on one firewall export them, and then import
them to the rest of the firewalls
Option C :
Use Panorama IPs Signature Converter to create custom vulnerability signatures, and push them
to the firewalls.
Option D : Create custom vulnerability signatures manually in Panorama, and push them to the
firewalls
QUESTION: 43
An administrator needs to upgrade an NGFW to the most current version of PAN-OS® software.
The followingis occurring:Firewall has internet connectivity through e 1/[Link] security rules
and security rules allowing all SSL and web-browsing traffic to and from any [Link] route is
configured, sourcing update traffic from e1/1.A communication error appears in the System logs
when updates are [Link] does not [Link] must be configured to enable
the firewall to download the current version of PAN-OS software?
QUESTION: 44
An engineer has been given approval to upgrade their environment to the latest version of PAN-
OS. The environment consists of both physical and virtual firewalls, a virtual Panorama, and
virtual log collectors. What is the recommended order of operational steps when upgrading?
When planning an upgrade in an environment that includes Panorama, firewalls, and log collectors, it's crucial to
follow the recommended sequence to ensure compatibility and minimize disruptions. Palo Alto Networks
recommends the following order: Upgrade Panorama: Start with Panorama because it's the central management
platform. Upgrading Panorama first ensures that it's compatible with the new PAN-OS versions that the managed
devices (firewalls and log collectors) will be upgraded to. Panorama must be able to support the new versions for it
to manage and monitor the devices effectively. Upgrade the log collectors: Next, upgrade the log collectors. Since
log collectors work closely with Panorama to aggregate and store logs from the firewalls, they should be upgraded
after Panorama to ensure compatibility. Upgrading the log collectors ensures they can handle the log formats and
features introduced in the new PAN-OS version. A. B. C. D. A. B. C. D. Upgrade the firewalls: Finally, upgrade the
firewalls. The firewalls are the last components to be upgraded to ensure that they remain compatible with the
management and log collection infrastructure. Upgrading the firewalls last minimizes the risk of compatibility
issues with Panorama and log collectors. This sequence ensures that all components are compatible and that the
management and logging infrastructure can fully support the firewalls running the latest PAN-OS version.
QUESTION: 45
Option A : Configure virtual routers to route the traffic for each Layer 3 interface
Option B : Configure Interface Management profiles, which need to be attached to each Layer 3
interface. Option C : Configure Security profiles, which need to be attached to each Layer 3
interface.
Option D : Configure service routes to route the traffic for each Layer 3 interface.
Explanation/Reference:
Reference: [Link]
[Link]
QUESTION: 46
A network engineer troubleshoots a VPN Phase 2 mismatch and decides that PFS (Perfect Forward
Secrecy) needs to be enabled. What action should the engineer take?
Option A : Microsoft Terminal Server, Red Hat Linux, and Microsoft Active
Directory Option B : Microsoft Active Directory, Red Hat Linux, and
Microsoft Exchange Option C : Microsoft Exchange, Microsoft Active
Directory, and Novell eDirectory
Option D : Novell eDirectory, Microsoft Terminal Server, and Microsoft Active Directory
Explanation/Reference:
[Link]
QUESTION: 48
A superuser is tasked with creating administrator accounts for three contractors. For compliance
purposes, all three contractors will be working with different device-groups in their hierarchy to
deploy policies and objects Which type of role-based access is most appropriate for this project?
Explanation/Reference:
Custom Panorama Admin: Custom Panorama Admin roles allow you to customize the elements of Panorama that
an administrator can access. You can hide tabs in the web interface, you can set specific items in Panorama to
read-only, or you can limit an administrator’s access to Panorama plugins. Custom Panorama Admin roles require
planning and configuration, but they provide extensive flexibility because you can control what administrators can
access through the web interface or the CLI. Device Group and Template Admin: Device Group and Template
Admin roles also require configuration because there are no built-in examples. These Admin Roles allow you to
define which Panorama templates or Panorama device groups an administrator can access and configure. You can
hide tabs in the web interface or set specific items to read only to control
An administrator pushes a new configuration from Panorama to a pair of firewalls that are
configured as an active/passive HA pair. Which NGFW receives the configuration from Panorama?
QUESTION: 50
Given the following snippet of a WildFire submission log, did the end user successfully download a
file?
Option B : Yes, because both the web-browsing application and the flash file have the
'alert" action. Option C : Yes, because the final action is set to "allow.''
Explanation/Reference:
Based on the snippet of the WildFire submission log provided, it appears that the end user was able to
successfully download a file. The key indicator here is that the final action for the web-browsing application and
the flash file is set to “allow.” This means that despite any alerts or other actions taken earlier in the process, the
QUESTION: 51
An administrator would like to determine which action the firewall will take for a specific CVE. Given
the screenshot below, where should the administrator navigate to view this information?
Explanation/Reference:
group in a policy to regulate traffic for the members of the group. You will need to configure at least two rules:
one to allow initial traffic to populate the dynamic user group and one to deny traffic for the activity you want to
prevent (in this case, questionable- activity). To tag users, the rule to allow traffic must have a higher rule number
policy/use-dynamic-user-groups-in-policy
QUESTION: 52
policy
QUESTION: 53
Which User-ID method maps IP addresses to usernames for users connecting through a web proxy
that has already authenticated the user?
Option A : syslog listening
Option B : server
monitoring Option C : client
probing Option D : port
mapping
QUESTION: 54
What are two valid deployment options for Decryption Broker? (Choose two.)
QUESTION: 55
Which Security profile generates a packet threat type found in threat logs?
Option A : WildFire
Option B : Zone
Protection Option C :
Anti-Spyware Option D :
Antivirus
QUESTION: 57
A company needs to preconfigure firewalls to be sent to remote sites with the least amount of
[Link] deployed, each firewall must establish secure tunnels back to multiple
regional data centers to include thefuture regional data [Link] VPN configuration would
adapt to changes when deployed to the future site?
QUESTION: 58
Option A : Active
Option B : Functional
Option C : Pending
Option D : Passive
Option E :
Suspended
Explanation/Reference:
Reference: [Link]
QUESTION: 59
Which Zone Pair and Rule Type will allow a successful connection for a user on the Internet zone to
a web server hosted on the DMZ zone? The web server is reachable using a Destination NAT policy
in the Palo Alto Networks firewall.
Option A :
Option B :
Option C :
Option D :
QUESTION: 60
An organization conducts research on the benefits of leveraging the Web Proxy feature of PAN-OS
11.0. What are two benefits of using an explicit proxy method versus a transparent proxy method?
(Choose two.)
Option A : No client configuration is required for explicit proxy, which simplifies the
deployment complexity.
Option B : Explicit proxy allows for easier troubleshooting, since the client browser is aware of the
existence of the proxy.
Option C : Explicit proxy supports interception of traffic using non-standard
HTTPS ports. Option D :
It supports the X-Authenticated-User (XAU) header, which contains the authenticated username in
the outgoing request
Explanation/Reference:
[Link]
mobile-us [Link]
web-proxy
QUESTION: 61
Which log type would provide information about traffic blocked by a Zone Protection profile?
Option A : Data
Filtering Option B : IP-
Tag
Option C :
Traffic Option
D : Threat
Explanation/Reference:
This is because Zone Protection profiles are used to protect the network from attacks, including common flood,
reconnaissance attacks, and other packet-based attacks1. These attacks are classified as threats by the firewall
and are logged in the threat log2. The threat log displays information such as the source and destination IP
addresses, ports, zones, applications, threat types, actions, and severity of the threats2. Verified References: 1:
Zone protection profiles - Palo Alto Networks Knowledge Base 2: Threat Log Fields - Palo Alto Networks
QUESTION: 62
An engineer must configure a new SSL decryption deployment. Which profile or certificate is
required before any traffic that matches an SSL decryption rule is decrypted?
Option A : A Decryption profile must be attached to the Decryption policy that the traffic
matches Option B : There must be a certificate with both the Forward Trust option and
Forward Untrust option selected.
Option C : A Decryption profile must be attached to the Security policy that the traffic
matches. Option D : There must be a certificate with only the Forward Trust option
selected.
Explanation/Reference:
To use PAN-OS multi-factor authentication (MFA) to secure access to critical assets, the enterprise should
configure a Captive Portal authentication policy that uses an authentication sequence. An authentication
sequence is a feature that allows the firewall to enforce multiple authentication methods (factors) for users who
access sensitive services or applications. An authentication sequence can include up to four factors, such as login
and password, Voice, SMS, Push, or One-time Password (OTP) authentication. The firewall can integrate with MFA
vendors through RADIUS or vendor APIs to provide the additional factors12. To configure an authentication
sequence, the enterprise needs to create an authentication profile for each factor and then add them to the
sequence in the desired order. The enterprise also needs to create a Captive Portal authentication policy that
matches the traffic that requires MFA and applies the authentication sequence to it. The Captive Portal is a web
page that the firewall displays to users who need to authenticate before accessing the network or the internet.
The Captive Portal can be customized to include a welcome message, a login prompt, a disclaimer, a certificate
download link, and a logout button34. When a user tries to access a service or application that matches the
Captive Portal authentication policy, the firewall redirects the user to the Captive Portal web form for the first
factor. After the user successfully authenticates for the first factor, the firewall prompts the user for the second
factor through RADIUS or vendor API integration. The firewall repeats this process until all factors in the sequence
are completed or until one factor fails. If all factors are completed successfully, the firewall allows the user to
access the service or application. If one factor fails, the firewall denies access and logs an event56. Configuring a
Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile is not
sufficient to use PAN-OS MFA. This option only provides one factor of authentication through RADIUS integration
with an MFA vendor. To use multiple factors of authentication, an authentication sequence is required. Creating an
authentication profile and assigning another authentication factor to be used by a Captive Portal authentication
policy is not correct to use PAN-OS MFA. This option does not specify how to create or apply an authentication
sequence, which is necessary for enforcing multiple factors of authentication. Using a Credential Phishing agent to
detect, prevent, and mitigate credential phishing campaigns is not relevant to use PAN-OS MFA. This option is a
feature of Palo Alto Networks Cortex XDR™ that helps protect endpoints from credential theft by malicious actors.
It does not provide any MFA functionality for accessing critical assets7. References: Authentication Sequence,
Configure Multi-Factor Authentication, Configure an Authentication Portal, Create an Authentication Profile, Create
an Authentication Sequence, Create a Captive Portal Authentication Policy, Credential Phishing Agent
QUESTION: 63
Explanation/Reference:
[Link]
QUESTION: 64
The SSL Forward Proxy decryption policy is configured. The following four certificate authority
(CA) certificates are installed on the firewall.
Option A : Forward-Untrust-Certificate
Option B : Forward-Trust-Certificate
Option C : Firewall-CA
Option D : Firewall-Trusted-Root-CA
QUESTION: 65
An organization has recently migrated its infrastructure and configuration to NGFWs, for which
Panorama manages the devices. The organization is coming from a L2-L4 firewall vendor, but
wants to use App-ID while identifying policies that are no longer needed. Which Panorama tool can
help this organization?
QUESTION: 66
An administrator has configured OSPF with Advanced Routing enabled on a Palo Alto Networks
firewall running PAN-OS 10.2. After OSPF was configured, the administrator noticed that OSPF
routes were not being learned. Which two actions could an administrator take to troubleshoot this
issue? (Choose two.)
,B
Explanation/Reference:
A: [Link]
routers/more D: [Link]
cheat-sheet-networking
QUESTION: 67
An administrator wants to enable WildFire inline machine learning. Which three file types does
WildFire inline ML analyze? (Choose three.)
Option A : APK
Option B :
VBscripts
Option C : Powershell scripts
Option D : ELF
Option E : MS Office
QUESTION: 68
In a security-first network, what is the recommended threshold value for content updates to be
dynamically updated?
Option A : 1 to 4 hours
Option B : 6 to 12
hours Option C : 24
hours Option D : 36
hours
Explanation/Reference:
Reference: [Link]
QUESTION: 69
A Panorama administrator configures a new zone and uses the zone in a new Security policy. After
the administrator commits the configuration to Panorama, which device-group commit push
operation should the administrator use to ensure that the push is successful?