PCNSE Exam Questions

Total 321 Questions

Last Updated Exam : 15-Apr-2025

The firewall team has been asked to deploy a new Panorama server and to forward all firewall logs to this server By default, which component of the Palo Alto Networks firewall architect is responsible for log forwarding and should be checked for early signs of overutilization?


A. Management plane CPU


B. Dataplane CPU


C. Packet buffers


D. On-chip packet descriptors





A.
  Management plane CPU

A company has configured GlobalProtect to allow their users to work from home. A decrease in performance for remote workers has been reported during peak-use hours. Which two steps are likely to mitigate the issue? (Choose TWO)


A. Exclude video traffic


B. Enable decryption


C. Block traffic that is not work-related


D. Create a Tunnel Inspection policy





A.
  Exclude video traffic

C.
  Block traffic that is not work-related

An administrator is configuring a Panorama device group. Which two objects are configurable? (Choose two.)


A. DNS Proxy


B. SSL/TLS profiles


C. address groups


D. URL Filtering profiles





C.
  address groups

D.
  URL Filtering profiles

An engineer is configuring a Protection profile to defend specific endpoints and resources against malicious activity.
The profile is configured to provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet.
Which profile is the engineer configuring?


A. Packet Buffer Protection


B. Zone Protection


C. Vulnerability Protection


D. DoS Protection





D.
  DoS Protection

Explanation: The engineer is configuring a DoS Protection profile to defend specific endpoints and resources against malicious activity. A DoS Protection profile is a feature that enables the firewall to detect and prevent denial-of-service (DoS) attacks that attempt to overwhelm network resources or disrupt services. A DoS Protection profile can provide granular defense against targeted flood attacks for specific critical systems that are accessed by users from the internet, such as web servers, DNS servers, or VPN gateways. A DoS Protection profile can be applied to a security policy rule that matches the traffic to and from the protected systems, and can specify the thresholds and actions for different types of flood attacks, such as SYN, UDP, ICMP, or other IP floods12. References: DoS Protection, PCNSE Study Guide (page 58)

Review the information below. A firewall engineer creates a U-NAT rule to allow users in the trust zone access to a server in the same zone by using an external, public NAT IP for that server.
Given the rule below, what change should be made to make sure the NAT works as expected?


A. Change destination NAT zone to Trust_L3.


B. Change destination translation to Dynamic IP (with session distribution) using firewall ethI/2 address.


C. Change Source NAT zone to Untrust_L3.


D. Add source Translation to translate original source IP to the firewall eth1/2 interface translation.





D.
  Add source Translation to translate original source IP to the firewall eth1/2 interface translation.

A firewall engineer is configuring quality of service (OoS) policy for the IP address of a specific server in an effort to limit the bandwidth consumed by frequent downloads of large files from the internet. Which combination of pre-NAT and / or post-NAT information should be used in the QoS rule?


A. Post-NAT source IP address Pre-NAT source zone


B. Post-NAT source IP address Post-NAT source zone


C. Pre-NAT source IP address Post-NAT source zone


D. Pre-NAT source IP address Pre-NAT source zone





D.
  Pre-NAT source IP address Pre-NAT source zone

Explanation: When configuring Quality of Service (QoS) policies, particularly for traffic going to or from specific IP addresses and involving NAT, it's important to base the rule on how the firewall processes the traffic. For QoS, the firewall evaluates traffic using pre-NAT IP addresses and zones because QoS policies typically need to be applied before the NAT action occurs. This is especially true for inbound traffic, where the goal is to limit bandwidth before the destination IP is translated.
The correct combination for a QoS rule in this scenario, where the aim is to limit bandwidth for downloads from a specific server (implying inbound traffic to the server), would be:
D. Pre-NAT source IP address Pre-NAT source zone:
Pre-NAT source IP address: This refers to the original IP address of the client or source device before any NAT rules are applied. Since QoS policies are evaluated before NAT, using the pre-NAT IP address ensures that the policy applies to the correct traffic.
Pre-NAT source zone: This is the zone associated with the source interface before NAT takes place. Using the pre-NAT zone ensures that the QoS policy is applied to traffic as it enters the firewall, before any translations or routing decisions are made.
By configuring the QoS rule with pre-NAT information, the firewall can accurately apply bandwidth limitations to the intended traffic, ensuring efficient use of network resources and mitigating the impact of large file downloads from the specified server.
For detailed guidelines on configuring QoS policies, refer to the Palo Alto Networks documentation, which provides comprehensive instructions and best practices for managing bandwidth and traffic priorities on the network.

A company configures its WildFire analysis profile to forward any file type to the WildFire public cloud. A company employee receives an email containing an unknown link that downloads a malicious Portable Executable (PE) file. What does Advanced WildFire do when the link is clicked?


A. Performs malicious content analysis on the linked page, but not the corresponding PE file.


B. Performs malicious content analysis on the linked page and the corresponding PE file.


C. Does not perform malicious content analysis on either the linked page or the corresponding PE file.


D. Does not perform malicious content analysis on the linked page, but performs it on the corresponding PE file.





B.
  Performs malicious content analysis on the linked page and the corresponding PE file.

Explanation: Advanced WildFire analyzes both the webpage linked by the URL and any files (like PE files) that are downloaded as a result of clicking that link. This includes checking the linked webpage for malicious content and sending any downloaded files for further analysis to determine their behavior and potential malicious intent. The PCNSA Study Guide outlines that WildFire inspects and analyzes both content downloaded and webpages involved when integrated into the organization's security profile . This dual-layered approach ensures comprehensive protection against threats from both the webpage and its payloads.
Explanation: Advanced WildFire analyzes both the webpage linked by the URL and any files (like PE files) that are downloaded as a result of clicking that link. This includes checking the linked webpage for malicious content and sending any downloaded files for further analysis to determine their behavior and potential malicious intent.
The PCNSA Study Guide outlines that WildFire inspects and analyzes both content downloaded and webpages involved when integrated into the organization's security profile . This dual-layered approach ensures comprehensive protection against threats from both the webpage and its payloads.
Step-by-Step Explanation
Link Clicked and File Download Triggered:
URL Inspection by WildFire:
Forwarding the PE File for Analysis:
Dynamic and Static Analysis:
Threat Verdict:
Automated Response:
Signature Update:
Advanced WildFire Configuration and Behavior
Forwarding File Types:
The WildFire analysis profile must be configured to forward relevant file types. In this case:
PE files are commonly forwarded by default since they are a known vector for malware.
Administrators can define custom forwarding rules based on file type and traffic.
Integration with the Security Profile:
WildFire integrates with other security profiles (e.g., Antivirus, Anti-Spyware, URL Filtering).
URL Filtering ensures that the link itself is categorized and blocked if malicious.
WildFire's output informs and updates the threat prevention database dynamically.
Why the Answer is B?
WildFire performs dual analysis:
This layered analysis ensures robust protection against modern threats, which often combine malicious webpages with harmful payloads.

Four configuration choices are listed, and each could be used to block access to a specific URL. If you configured each choice to block the same URL, then which choice would be evaluated last in the processing order to block access to the URL?


A. Custom URL category in URL Filtering profile


B. EDL in URL Filtering profile


C. PAN-DB URL category in URL Filtering profile


D. Custom URL category in Security policy rule





C.
  PAN-DB URL category in URL Filtering profile


A security engineer has configured a GlobalProtect portal agent with four gateways Which GlobalProtect Gateway will users connect to based on the chart provided?


A. South


B. West


C. East


D. Central





C.
  East

Explanation: Based on the provided table, the GlobalProtect portal agent configuration includes four gateways with varying priorities and response times. Users will connect to the gateway with the highest priority and, if multiple gateways share the same priority, the one with the lowest response time.
Answer Determination

  • Prioritize by Priority Level:
  • Evaluate Response Times Within Each Priority:
Given the highest priority is "East" with a response time of 35 ms, users will connect to the East gateway based on the highest priority.

A network administrator notices a false-positive state after enabling Security profiles. When the administrator checks the threat prevention logs, the related signature displays the following:
threat type: spyware category: dns-c2 threat ID: 1000011111
Which set of steps should the administrator take to configure an exception for this signature?


A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS exceptions tabs Search related threat ID and click enable Commit


B. Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the signature exceptions tab and then click show all signatures Search related threat ID and click enable Change the default action Commit


C. Navigate to Objects > Security Profiles > Vulnerability Protection
Select related profile
Select the Exceptions lab and then click show all signatures
Search related threat ID and click enable
Commit


D. Navigate to Objects > Security Profiles > Anti-Spyware
Select related profile
Select the Exceptions lab and then click show all signatures
Search related threat ID and click enable Commit





A.
  Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS exceptions tabs Search related threat ID and click enable Commit

Explanation: When dealing with a false positive, particularly for a spyware threat detected through DNS queries (as indicated by the category "dns-c2"), the correct course of action involves creating an exception in the Anti-Spyware profile, not the Vulnerability Protection profile. This is because the Anti-Spyware profile in Palo Alto Networks firewalls is designed to detect and block spyware threats, which can include command and control (C2) activities often signaled by DNS queries.
The steps to configure an exception for this specific spyware signature (threat ID: 1000011111) are as follows:
Navigate to Objects > Security Profiles > Anti-Spyware. This is where all the Anti- Spyware profiles are listed.
Select the related Anti-Spyware profile that is currently applied to the security policy which is generating the false positive.
Within the profile, go to the DNS Exceptions tab. This tab allows you to specify exceptions based on DNS signatures.
Search for the related threat ID (in this case, 1000011111) and click enable to create an exception for it. By doing this, you instruct the firewall to bypass the detection for this specific signature, effectively treating it as a false positive.
Commit the changes to make the exception active.
By following these steps, the administrator can effectively address the false positive without disabling the overall spyware protection capabilities of the firewall.


Page 9 out of 33 Pages
Previous