Discount Offer
Go Back on PCNSE Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

PCNSE Practice Test


Page 1 out of 59 Pages

PBF can address which two scenarios? (Choose two.)


A. Routing FTP to a backup ISP link to save bandwidth on the primary ISP link


B. Providing application connectivity the primary circuit fails


C. Enabling the firewall to bypass Layer 7 inspection


D. Forwarding all traffic by using source port 78249 to a specific egress interface





A.
  Routing FTP to a backup ISP link to save bandwidth on the primary ISP link

B.
  Providing application connectivity the primary circuit fails

Explanation: Policy-Based Forwarding (PBF) on Palo Alto Networks firewalls allows administrators to define forwarding decisions based on criteria other than the destination IP address, such as the application, source address, or user. It can address scenarios like:
A. Routing FTP to a backup ISP link to save bandwidth on the primary ISP link: PBF can be configured to identify FTP traffic and route it through a different ISP, preserving bandwidth on the primary link for other critical applications.
B. Providing application connectivity when the primary circuit fails: PBF can be used for failover purposes, directing traffic to an alternate path if the primary connection goes down, ensuring continuous application availability.
PBF is not designed to bypass Layer 7 inspection or forward traffic based solely on source port, as these tasks are managed through different mechanisms within the firewall's operating system.

Which two items must be configured when implementing application override and allowing traffic through the firewall? (Choose two.)


A. Application filter


B. Application override policy rule


C. Security policy rule


D. Custom app





B.
  Application override policy rule

C.
  Security policy rule

Explanation: When implementing an application override in a Palo Alto Networks firewall, the primary goal is to explicitly define how specific traffic is identified and processed by the firewall, bypassing the regular App-ID process. This is particularly useful for traffic that might be misidentified by App-ID or for applications that require special handling for performance reasons.
To successfully implement application override, the following items must be configured:
B. Application override policy rule: This is a specialized policy rule that you create to specify the criteria for the traffic you want to override. In this rule, you define the source and destination zones, addresses, and ports. Instead of relying on the App-ID engine to identify the application, the firewall uses the criteria defined in the application override policy to classify the traffic.
C. Security policy rule: After defining an application override policy, you must also configure a security policy rule to allow the overridden traffic through the firewall. This rule specifies the action (allow, deny, drop, etc.) for the traffic that matches the application override policy. It's essential to ensure that the security policy rule matches the traffic defined in the application override policy to ensure that the intended traffic is allowed through the firewall.
For detailed guidance on configuring application override and the necessary security policies, refer to the official Palo Alto Networks documentation. This resource provides step-by-step instructions and best practices for effectively managing traffic using application overrides.

Review the screenshot of the Certificates page.
An administrator for a small LLC has created a series of certificates as shown, to use for a planned Decryption roll out. The administrator has also installed the self-signed root certificate in all client systems.
When testing, they noticed that every time a user visited an SSL site, they received unsecured website warnings.
What is the cause of the unsecured website warnings?


A. The forward untrust certificate has not been signed by the self-singed root CA certificate.


B. The forward trust certificate has not been installed in client systems.


C. The self-signed CA certificate has the same CN as the forward trust and untrust certificates.


D. The forward trust certificate has not been signed by the self-singed root CA certificate.





D.
  The forward trust certificate has not been signed by the self-singed root CA certificate.

Explanation: The cause of the unsecured website warnings is that the forward trust certificate has not been signed by the self-signed root CA certificate. The forward trust certificate is used by the firewall to generate a copy of the server certificate for outbound SSL decryption (SSL Forward Proxy). The firewall signs the copy with the forward trust certificate and presents it to the client. The client then verifies the signature using the public key of the CA that issued the forward trust certificate. If the client does not trust the CA, it will display a warning message. Therefore, the forward trust certificate must be signed by a CA that is trusted by the client. In this case, the administrator has installed the self-signed root CA certificate in all client systems, so this CA should be used to sign the forward trust certificate. However, as shown in the screenshot, the forward trust certificate has a different issuer than the selfsigned root CA certificate, which means it has not been signed by it. This causes the client to reject the signature and show a warning message. To fix this issue, the administrator should generate a new forward trust certificate and sign it with the self-signed root CA certificate12.

Which three multi-factor authentication methods can be used to authenticate access to the firewall? (Choose three.)


A. Voice


B. Fingerprint


C. SMS


D. User certificate


E. One-time password





C.
  SMS

D.
  User certificate

E.
  One-time password

Explanation: The firewall can use three multi-factor authentication methods to authenticate access to the firewall: SMS, user certificate, and one-time password. These methods can be used in combination with other authentication factors, such as username and password, to provide stronger security for accessing the firewall web interface or CLI. The firewall can integrate with various MFA vendors that support these methods through RADIUS or SAML protocols5. Voice and fingerprint are not supported by the firewall as MFA methods. References: MFA Vendor Support, PCNSE Study Guide (page 48)

An administrator notices that an interface configuration has been overridden locally on a firewall. They require all configuration to be managed from Panorama and overrides are not allowed. What is one way the administrator can meet this requirement?


A. Perform a commit force from the CLI of the firewall.


B. Perform a template commit push from Panorama using the "Force Template Values" option.


C. Perform a device-group commit push from Panorama using the "Include Device and Network Templates" option.


D. Reload the running configuration and perform a Firewall local commit.





B.
  Perform a template commit push from Panorama using the "Force Template Values" option.

Explanation: The best way for the administrator to meet the requirement of managing all configuration from Panorama and preventing local overrides is B: Perform a template commit push from Panorama using the “Force Template Values” option. This option allows the administrator to overwrite any local configuration on the firewall with the values defined in the template1. This way, the administrator can ensure that the interface configuration and any other.


Page 1 out of 59 Pages