PCNSE7 Premium Bundle

PCNSE7 Premium Bundle

Palo Alto Networks Certified Network Security Engineer Certification Exam

4.5 
(34590 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 5, 2024Last update

Paloalto-Networks PCNSE7 Free Practice Questions

Q1. Given the following table.

 

Which configuration change on the firewall would cause it to use 10.66.24.88 as the next hop for the 192.168.93.0/30 network?

A. Configuring the administrative Distance for RIP to be lower than that of OSPF Int.

B. Configuring the metric for RIP to be higher than that of OSPF Int.

C. Configuring the administrative Distance for RIP to be higher than that of OSPF Ext.

D. Configuring the metric for RIP to be lower than that OSPF Ext. 

Answer: A

Q2. A network Administrator needs to view the default action for a specific spyware signature. The administrator follows the tabs and menus through Objects> Security Profiles> Anti-Spyware and select default profile. What should be done next?

A. Click the simple-critical rule and then click the Action drop-down list.

B. Click the Exceptions tab and then click show all signatures.

C. View the default actions displayed in the Action column.

D. Click the Rules tab and then look for rules with "default" in the Action column. 

Answer: B

Q3. Which interface configuration will accept specific VLAN IDs?

A. Tab Mode

B. Subinterface

C. Access Interface

D. Trunk Interface 

Answer: B

Q4. Which command can be used to validate a Captive Portal policy?

A. eval captive-portal policy <criteria>

B. request cp-policy-eval <criteria>

C. test cp-policy-match <criteria>

D. debug cp-policy <criteria> 

Answer: C

Q5. A network administrator uses Panorama to push security polices to managed firewalls at branch offices. Which policy type should be configured on Panorama if the administrators at the branch office sites to override these products?

A. Pre Rules

B. Post Rules

C. Explicit Rules

D. Implicit Rules 

Answer: A

Q6. Which command can be used to validate a Captive Portal policy?

A. eval captive-portal policy <criteria>

B. request cp-policy-eval <criteria>

C. test cp-policy-match <criteria>

D. debug cp-policy <criteria> 

Answer: C

Q7. Given the following table.

 

Which configuration change on the firewall would cause it to use 10.66.24.88 as the next hop for the 192.168.93.0/30 network?

A. Configuring the administrative Distance for RIP to be lower than that of OSPF Int.

B. Configuring the metric for RIP to be higher than that of OSPF Int.

C. Configuring the administrative Distance for RIP to be higher than that of OSPF Ext.

D. Configuring the metric for RIP to be lower than that OSPF Ext. 

Answer: A

Q8. A client is deploying a pair of PA-5000 series firewalls using High Availability (HA) in Active/Passive mode. Which statement is true about this deployment?

A. The two devices must share a routable floating IP address

B. The two devices may be different models within the PA-5000 series

C. The HA1 IP address from each peer must be on a different subnet

D. The management port may be used for a backup control connection 

Answer: D

Q9. The GlobalProtect Portal interface and IP address have been configured. Which other value needs to be defined to complete the network settings configuration of GlobalPortect

Portal?

A. Server Certificate

B. Client Certificate

C. Authentication Profile

D. Certificate Profile 

Answer: A

Explanation:

(https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-GlobalProtect/ta-p/58351)

Q10. What can missing SSL packets when performing a packet capture on dataplane interfaces?

A. The packets are hardware offloaded to the offloaded processor on the dataplane

B. The missing packets are offloaded to the management plane CPU

C. The packets are not captured because they are encrypted

D. There is a hardware problem with offloading FPGA on the management plane 

Answer: A

Q11. The IT department has received complaints abou VoIP call jitter when the sales staff is making or receiving calls. QoS is enabled on all firewall interfaces, but there is no QoS policy written in the rulebase. The IT manager wants to find out what traffic is causing the jitter in real time when a user reports the jitter.

Which feature can be used to identify, in real time, the applications taking up the most bandwidth?

A. QoS Statistics

B. Applications Report

C. Application Command Center (ACC)

D. QoS Log 

Answer: A

Q12. The web server is configured to listen for HTTP traffic on port 8080. The clients access the web server using the IP address 1.1.1.100 on TCP Port 80. The destination NAT rule is configured to translate both IP address and report to 10.1.1.100 on TCP Port 8080.

 

Which NAT and security rules must be configured on the firewall? (Choose two)

A. A security policy with a source of any from untrust-I3 Zone to a destination of 10.1.1.100 in dmz-I3 zone using web-browsing application

B. A NAT rule with a source of any from untrust-I3 zone to a destination of 10.1.1.100 in dmz-zone using service-http service.

C. A NAT rule with a source of any from untrust-I3 zone to a destination of 1.1.1.100 in untrust-I3 zone using service-http service.

D. A security policy with a source of any from untrust-I3 zone to a destination of 1.1.100 in dmz-I3 zone using web-browsing application.

Answer: B,D

Q13. Click the Exhibit button below,

 

 

A firewall has three PBF rules and a default route with a next hop of 172.20.10.1 that is configured in the default VR. A user named Will has a PC with a 192.168.10.10 IP address. He makes an HTTPS connection to 172.16.10.20.

Which is the next hop IP address for the HTTPS traffic from Will's PC?

A. 172.20.30.1

B. 172.20.40.1

C. 172.20.20.1

D. 172.20.10.1

Answer: B

Q14. The web server is configured to listen for HTTP traffic on port 8080. The clients access the web server using the IP address 1.1.1.100 on TCP Port 80. The destination NAT rule is configured to translate both IP address and report to 10.1.1.100 on TCP Port 8080.

 

Which NAT and security rules must be configured on the firewall? (Choose two)

A. A security policy with a source of any from untrust-I3 Zone to a destination of 10.1.1.100 in dmz-I3 zone using web-browsing application

B. A NAT rule with a source of any from untrust-I3 zone to a destination of 10.1.1.100 in dmz-zone using service-http service.

C. A NAT rule with a source of any from untrust-I3 zone to a destination of 1.1.1.100 in untrust-I3 zone using service-http service.

D. A security policy with a source of any from untrust-I3 zone to a destination of 1.1.100 in dmz-I3 zone using web-browsing application.

Answer: B,D

Q15. Which Security Policy Rule configuration option disables antivirus and anti-spyware scanning of server-to- client flows only?

A. Disable Server Response Inspection

B. Apply an Application Override

C. Disable HIP Profile

D. Add server IP Security Policy exception 

Answer: A

Q16. Which two methods can be used to mitigate resource exhaustion of an application server? (Choose two)

A. Vulnerability Object

B. DoS Protection Profile

C. Data Filtering Profile

D. Zone Protection Profile 

Answer: B,D

Q17. How does Panorama handle incoming logs when it reaches the maximum storage capacity?

A. Panorama discards incoming logs when storage capacity full.

B. Panorama stops accepting logs until licenses for additional storage space are applied

C. Panorama stops accepting logs until a reboot to clean storage space.

D. Panorama automatically deletes older logs to create space for new ones. 

Answer: D

Explanation:

(https://www.paloaltonetworks.com/documentation/60/panorama/panorama_adminguide/se t-up-panorama/determine-panorama-log-storage-requirements)

Q18. A company hosts a publically accessible web server behind a Palo Alto Networks next generation firewall with the following configuration information.

? Users outside the company are in the "Untrust-L3" zone

? The web server physically resides in the "Trust-L3" zone.

? Web server public IP address: 23.54.6.10

? Web server private IP address: 192.168.1.10

Which two items must be NAT policy contain to allow users in the untrust-L3 zone to access the web server? (Choose two)

A. Untrust-L3 for both Source and Destination zone

B. Destination IP of 192.168.1.10

C. Untrust-L3 for Source Zone and Trust-L3 for Destination Zone

D. Destination IP of 23.54.6.10 

Answer: A,D

Q19. Site-A and Site-B have a site-to-site VPN set up between them. OSPF is configured to dynamically create the routes between the sites. The OSPF configuration in Site-A is configured properly, but the route for the tunner  is not being established. The Site-B interfaces in the graphic are using a broadcast Link Type. The administrator has determined that the OSPF configuration in Site-B is using the wrong Link Type for one of its interfaces.

 

Which Link Type setting will correct the error?

A. Set tunnel. 1 to p2p

B. Set tunnel. 1 to p2mp

C. Set Ethernet 1/1 to p2mp

D. Set Ethernet 1/1 to p2p 

Answer: A

START PCNSE7 EXAM