Go Back on PCNSE Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

PCNSE Practice Test


Page 7 out of 55 Pages

Topic 1 : Main Questions pool

Which feature prevents the submission of corporate login information into website forms? 


A.

Data filtering


B.

User-ID


C.

File blocking


D.

Credential phishing prevention





D.
  

Credential phishing prevention



https://www.paloaltonetworks.com/cyberpedia/how-the-next-generation-security-platform-contributes-to-gdpr-compliance

A client has a sensitive application server in their data center and is particularlyconcerned about session
flooding because of denial of-service attacks.How can the Palo Alto Networks NGFW be configured to specifically protect this server against session floods originating from a single IP address?


A.

Define a custom App-ID to ensure that only legitimate application traffic reaches the server


B.

Add QoS Profiles to throttle incoming requests


C.

Add a tuned DoS Protection Profile


D.

Add an Anti-Spyware Profile to block attacking IP address





C.
  

Add a tuned DoS Protection Profile



A company needs to preconfigure firewalls to be sent to remote sites with the least amount of reconfiguration.
Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include
the future regional data centers.
Which VPN configuration would adapt to changes when deployed to the future site?


A.

Preconfigured GlobalProtect satellite


B.

Preconfigured GlobalProtectclient


C.

Preconfigured IPsec tunnels


D.

Preconfigured PPTP Tunnels





A.
  

Preconfigured GlobalProtect satellite



Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?


A.

web-browsing and 443


B.

SSL and 80


C.

SSL and 443


D.

web-browsing and 80





A.
  

web-browsing and 443



Which DoS protection mechanism detects and prevents session exhaustion attacks?


A.

Packet Based Attack Protection


B.

Flood Protection


C.

Resource Protection


D.

TCP Port Scan Protection





C.
  

Resource Protection



Reference: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/dos-protection-profiles


Page 7 out of 55 Pages
Previous