PCNSE Practice Test Questions

321 Questions


Which two policy components are required to block traffic in real time using a dynamic user group (DUG)? (Choose two.)


A. A Deny policy for the tagged traffic


B. An Allow policy for the initial traffic


C. A Decryption policy to decrypt the traffic and see the tag


D. A Deny policy with the "tag" App-ID to block the tagged traffic





A.
  A Deny policy for the tagged traffic

B.
  An Allow policy for the initial traffic

Explanation:

Dynamic User Groups (DUGs) in Palo Alto Networks firewalls are used to dynamically assign users to groups based on tags pushed from external systems like Cortex XSOAR, XDR, or via the XML API. These allow for real-time enforcement of security policies without requiring user logout/login or group refreshes.

To block traffic in real time using DUGs, the following policy components are needed:

๐Ÿ”น A. A Deny policy for the tagged traffic
This is the actual policy that references the Dynamic User Group and blocks traffic for users dynamically added to the group.
Once a user is tagged (e.g., as "malicious" or "violator"), this rule becomes effective immediately, blocking their access based on the DUG membership.

๐Ÿ”น B. An Allow policy for the initial traffic
Before the user is tagged and added to the DUG, they still need to be allowed to generate traffic so they can be evaluated or monitored.
This initial allow policy ensures the traffic is visible and can be tagged (e.g., by a monitoring or detection system like Cortex XDR).

โŒ Why the other options are incorrect:

C. A Decryption policy to decrypt the traffic and see the tag: Tags and DUG membership are independent of traffic decryption. DUG enforcement is based on user identity and tag, not packet content.
D. A Deny policy with the "tag" App-ID to block the tagged traffic: Tags are not App-IDs. A tag is an identifier for grouping users in DUGs, not an application signature. So there is no "tag" App-ID.

๐Ÿ” Reference:
Palo Alto Networks โ€“ Dynamic User Groups: Dynamic User Groups (DUGs) Overview

Best Practices for DUG Implementation: Palo Alto Live Community โ€“ Using Dynamic User Groups to Quarantine Users

A remote administrator needs access to the firewall on an untrust interface. Which three options would you configure on an interface Management profile to secure management access? (Choose three)


A. HTTPS


B. SSH


C. Permitted IP Addresses


D. HTTP


E. User-IO





A.
  HTTPS

B.
  SSH

C.
  Permitted IP Addresses

Explanation:

To securely allow remote management access on an untrust interface, the Interface Management Profile should include:

A. HTTPS โ€“ Enables secure web-based management (GUI/API access).
B. SSH โ€“ Allows secure CLI access for administrators.
C. Permitted IP Addresses โ€“ Restricts management access to specific trusted IPs (critical for security on an untrust interface).

Why the Others Are Incorrect:

D. HTTP โ€“ Unencrypted and insecure; should never be enabled on an untrust interface.
E. User-IO โ€“ Used for physical console access, irrelevant for remote management.

Best Practices:

Always disable HTTP and Ping on untrust interfaces.
Use certificate-based authentication for HTTPS/SSH if possible.

Reference:

Palo Alto Interface Management Profile Docs

Exhibit.

An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms The network team has reported excessive traffic on the corporate WAN How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all the existing monitoring/security platforms?


A. Any configuration on an M-500 would address the insufficient bandwidth concerns


B. Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW


C. Configure log compression and optimization features on all remote firewalls


D. Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services





D.
  Forward logs from firewalls only to Panorama and have Panorama forward logs to other external services

Explanation:

In the image, we see multiple firewalls at a remote site sending logs directly to both Panorama and to various management and monitoring systems at the data center, which consumes significant WAN bandwidth.

To reduce WAN traffic while maintaining the existing log visibility:
๐Ÿ”„ Centralize log forwarding: Send logs only once across the WAN โ€” from the firewalls to Panorama โ€” and let Panorama handle the log forwarding to all other systems (SIEM, monitoring tools, etc.).
This drastically cuts down on duplicate log traffic over the WAN.

๐Ÿ” Why the other options are incorrect:

A. Any configuration on an M-500 would address the insufficient bandwidth concerns:
โŒ Incorrect. The M-500 is a Panorama appliance, and its configuration affects log storage/management but doesn't inherently reduce WAN bandwidth unless used properly in architecture like option D.

B. Forward logs from external sources to Panorama for correlation, and from Panorama send them to the NGFW:
โŒ Reversed logic. Logs go from NGFWs to Panorama, not the other way around.

C. Configure log compression and optimization features on all remote firewalls:
โŒ PAN-OS does not support log compression across WAN links for remote log forwarding. So this option is not feasible.

๐Ÿง  Best Practice:

Use Panorama in "Log Collector mode" or dedicated log collectors to centralize logs.
Use Panoramaโ€™s Log Forwarding feature to relay logs to external monitoring and SIEM systems.
This keeps only one copy of each log traveling across the WAN, minimizing traffic and duplication.

๐Ÿ“š Reference:
Palo Alto Networks โ€“ Log Forwarding
Palo Alto Networks โ€“ Best Practices for Distributed Log Collection

Refer to the exhibit.

Which will be the egress interface if the traffic's ingress interface is ethernet1/7 sourcing from 192.168.111.3 and to the destination 10.46.41.113?


A. ethernet1/6


B. ethernet1/3


C. ethernet1/7


D. ethernet1/5





D.
  ethernet1/5

Explanation:

In the second image, VW ports mentioned are 1/5 and 1/7. Hence it can not be a part of any other routing. So if any traffic coming as ingress from 1/7, it has to go out via 1/5. The egress interface for the traffic with ingress interface ethernet1/7, source 192.168.111.3, and destination 10.46.41.113 will be ethernet1/5.

This is because the traffic will match the virtual wire with interfaces ethernet1/5 and ethernet1/7, which is configured to allow VLAN-tagged traffic with tags 10 and 201. The traffic will also match the security policy rule that allows traffic from zone Trust to zone Untrust, which are assigned to ethernet1/7 and ethernet1/5 respectively2. Therefore, the traffic will be forwarded to the same interface from which it was received, which is ethernet1/53.

A firewall administrator wants to be able at to see all NAT sessions that are going โ€˜through a firewall with source NAT. Which CLI command can the administrator use?


A. show session all filter nat-rule-source


B. show running nat-rule-ippool rule "rule_name


C. show running nat-policy


D. show session all filter nat source





D.
  show session all filter nat source

A superuser is tasked with creating administrator accounts for three contractors. For compliance purposes, all three contractors will be working with different device-groups in their hierarchy to deploy policies and objects. Which type of role-based access is most appropriate for this project?


A. Create a Dynamic Read only superuser


B. Create a Dynamic Admin with the Panorama Administrator role


C. Create a Device Group and Template Admin


D. Create a Custom Panorama Admin





C.
  Create a Device Group and Template Admin

Explanation: Custom Panorama Admin: Custom Panorama Admin roles allow you to customize the elements of Panorama that an administrator can access. You can hide tabs in the web interface, you can set specific items in Panorama to read-only, or you can limit an administratorโ€™s access to Panorama plugins. Custom Panorama Admin roles require planning and configuration, but they provide extensive flexibility because you can control what administrators can access through the web interface or the CLI. Device Group and Template Admin: Device Group and Template Admin roles also require configuration because there are no built-in examples. These Admin Roles allow you to define which Panorama templates or Panorama device groups an administrator can access and configure. You can hide tabs in the web interface or set specific items to read only to control what administrators can configure.

What would allow a network security administrator to authenticate and identify a user with a new BYOD-type device that is not joined to the corporate domain?


A. an Authentication policy with 'unknown' selected in the Source User field


B. an Authentication policy with 'known-user' selected in the Source User field


C. a Security policy with 'known-user' selected in the Source User field


D. a Security policy with 'unknown' selected in the Source User field





A.
  an Authentication policy with 'unknown' selected in the Source User field

Explanation: For a network security administrator to authenticate and identify a user with a new BYOD-type device that is not joined to the corporate domain, the most effective method is to use an Authentication policy targeting users not yet identified by the system.
A. an Authentication policy with 'unknown' selected in the Source User field:
An Authentication policy allows the firewall to challenge unidentified users for credentials. By selecting 'unknown' in the Source User field, the policy targets users who have not yet been identified by the firewall, which would include users on new BYOD devices not joined to the domain.
Once the user provides valid credentials, the firewall can authenticate the user and map their identity to subsequent sessions, enabling the application of user-based policy rules and monitoring.
This approach ensures that new and unknown devices can be properly authenticated and identified without compromising security or requiring the device to be part of the corporate domain.

Which GloDalProtecI gateway setting is required to enable split-tunneting by access route, destination domain and application?


A. Tunnel mode


B. Satellite mode


C. IPSec mode


D. No Direct Access to local networks





A.
  Tunnel mode

Please match the terms to their corresponding definitions.






An administrator has a Palo Alto Networks NGFW. All security subscriptions and decryption are enabled and the system is running close to its resource limits. Knowing that using decryption can be resource-intensive, how can the administrator reduce the load on the firewall?


A. Use RSA instead of ECDSA for traffic that isn't sensitive or high-priority.


B. Use the highest TLS protocol version to maximize security.


C. Use ECDSA instead of RSA for traffic that isn't sensitive or high-priority.


D. Use SSL Forward Proxy instead of SSL Inbound Inspection for decryption.





C.
  Use ECDSA instead of RSA for traffic that isn't sensitive or high-priority.

Explanation: Decryption can be resource-intensive, and in scenarios where the firewall is nearing its resource limits, optimizing decryption practices is crucial. One way to do this is by choosing more efficient encryption algorithms that require less computational power.
C. Use ECDSA instead of RSA for traffic that isn't sensitive or high-priority:
Elliptic Curve Digital Signature Algorithm (ECDSA) is known for requiring smaller key sizes compared to RSA for a comparable level of security. This translates to less computational overhead during the encryption and decryption processes.
By using ECDSA for traffic that isn't sensitive or high-priority, the administrator can reduce the processing load associated with decryption on the firewall. This is particularly beneficial in scenarios where resource optimization is necessary.
It's important to note that this approach does not compromise the security of encrypted traffic. Instead, it offers a more resource-efficient way to manage decryption, thus helping to maintain firewall performance even when system resources are under significant demand.
By judiciously applying this strategy, administrators can manage the decryption workload on the firewall, ensuring continued protection and inspection of encrypted traffic without overburdening the firewall's resources.

Which Panorama mode should be used so that all logs are sent to. and only stored in. Cortex Data Lake?


A. Log Collector


B. Panorama


C. Legacy


D. Management Only





D.
  Management Only

An engineer is troubleshooting a traffic-routing issue. What is the correct packet-flow sequence?


A. PBF > Zone Protection Profiles > Packet Buffer Protection


B. BGP > PBF > NAT


C. PBF > Static route > Security policy enforcement


D. NAT > Security policy enforcement > OSPF





C.
  PBF > Static route > Security policy enforcement

Explanation: The correct packet-flow sequence is C. PBF > Static route > Security policy enforcement. This sequence describes the order of operations that the firewall performs when processing a packet. PBF stands for Policy-Based Forwarding, which is a feature that allows the firewall to override the routing table and forward traffic based on the source and destination addresses, application, user, or service. PBF is evaluated before the static route lookup, which is the default method of forwarding traffic based on the destination address and the longest prefix match. Security policy enforcement is the stage where the firewall applies the security policy rules to allow or block traffic based on various criteria, such as zone, address, port, user, application, etc.


Page 2 out of 27 Pages
Previous