Discount Offer
Go Back on PCNSE Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

PCNSE Practice Test


Page 16 out of 59 Pages

Exhibit.

Review the screenshots and consider the following information:
1. FW-1is assigned to the FW-1_DG device group, and FW-2 is assigned to OFFICE_FW_DC
2. There are no objects configured in REGIONAL_DG and OFFICE_FW_DG device groups.
Which IP address will be pushed to the firewalls inside Address Object Server-1?


A. Server-1 on FW-1 will have IP 4.4.4.4. Server-1 on FW-2 will have IP 1.1.1.1


B. Server-1 on FW-1 will have IR 111.1. Server-1 will not be pushed to FW-2.


C. Server-1 on FW-1 will have IP 2.2.2.2. Server-1 will not be pushed to FW-2.


D. Server-1 on FW-1 will have IP 3.3.3.3. Server-1 will not be pushed to FW-2.





A.
  Server-1 on FW-1 will have IP 4.4.4.4. Server-1 on FW-2 will have IP 1.1.1.1

Explanation: Device Group Hierarchy
Shared
DATACENTER_DG
DC_FW_DG
REGIONAL_DG
OFFICE_FW_DG
FW-1_DG
Analysis
Considerations:

FW-1 is assigned to the FW-1_DG device group.
FW-2 is assigned to the OFFICE_FW_DG device group.
There are no objects configured in REGIONAL_DG and OFFICE_FW_DG device groups.
The address object Server-1 appears in multiple device groups with different IP addresses.
The device groups have a hierarchy, which means objects can be inherited from parent groups unless overridden in the child group.

To ensure that a Security policy has the highest priority, how should an administrator configure a Security policy in the device group hierarchy?


A. Add the policy to the target device group and apply a master device to the device group.


B. Reference the targeted device's templates in the target device group.


C. Clone the security policy and add it to the other device groups.


D. Add the policy in the shared device group as a pre-rule





D.
  Add the policy in the shared device group as a pre-rule

A standalone firewall with local objects and policies needs to be migrated into Panorama. What procedure should you use so Panorama is fully managing the firewall?


A. Use the "import device configuration to Panorama" operation, commit to Panorama, then "export or push device config bundle" to push the configuration.


B. Use the "import Panorama configuration snapshot" operation, commit to Panorama, then "export or push device config bundle" to push the configuration.


C. Use the "import device configuration to Panorama" operation, commit to Panorama, then perform a device-group commit push with "include device and network templates".


D. Use the "import Panorama configuration snapshot" operation, commit to Panorama, then perform a device-group commit push with "include device and network templates".





C.
  Use the "import device configuration to Panorama" operation, commit to Panorama, then perform a device-group commit push with "include device and network templates".

An administrator is informed that the engineer who previously managed all the VPNs has left the company. According to company policies the administrator must update all the IPSec VPNs with new pre-shared keys Where are the pre-shared keys located on the firewall?


A. Network/lPSec Tunnels


B. Network/Network Profiles/IKE Gateways


C. Network/Network ProfilesTlPSec Crypto


D. Network/Network Profiles/IKE Crypto





B.
  Network/Network Profiles/IKE Gateways

A new application server 192.168.197.40 has been deployed in the DMZ. There are no public IP addresses available resulting in the server sharing MAT IP 198 51 100 B8 with another OMZ serve that uses IP address 192 168 19? 60 Firewall security and NAT rules have been configured The application team has confirmed mat the new server is able to establish a secure connection to an external database with IP address 203.0.113.40. The database team reports that they are unable to establish a secure connection to 196 51 100 88 from 203.0.113.40 However it confirm a successful prig test to 198 51 100 88 Referring to the MAT configuration and traffic logs provided how can the firewall engineer resolve the situation and ensure inbound and outbound connections work concurrently for both DMZ servers?


A. Replace the two NAT rules with a single rule that has both DMZ servers as "Source Address." both external servers as "Destination Address." and Source Translation remaining as is with bidirectional option enabled


B. Sharing a single NAT IP is possible for outbound connectivity not for inbound, therefore, a new public IP address must be obtained for the new DMZ server and used in the NAT rule 6 DMZ server 2.


C. Configure separate source NAT and destination NAT rules for the two DMZ servers without using the bidirectional option.


D. Move the NAT rule 6 DMZ server 2 above NAT rule 5 DMZ server 1.





C.
  Configure separate source NAT and destination NAT rules for the two DMZ servers without using the bidirectional option.

Explanation: The table displays NAT rules configured on the firewall. The key points are:

  • Source Zone and Destination Zone define the traffic flow.
  • Source Address and Destination Address specify the IP addresses involved.
  • Service indicates the type of traffic (e.g., any, ping).
  • Source Translation and Destination Translation show the translated IP addresses for NAT.
Issue and Resolution Options:
The application server at 192.168.197.40 can establish outbound connections but faces issues with inbound connections due to the shared NAT IP 198.51.100.88. The external database server cannot establish a secure connection back to 192.168.197.40.
Options to Resolve the Issue:
  • Replace the Two NAT Rules with a Single Rule:
  • New Public IP Address:
  • Separate Source NAT and Destination NAT Rules:
  • Move the NAT Rule:


Page 16 out of 59 Pages
Previous