Palo Alto Networks PCNSE Palo Alto Networks Certified Network Security Engineer Exam Online Training
Palo Alto Networks PCNSE Online Training
The questions for PCNSE were last updated at Apr 24,2025.
- Exam Code: PCNSE
- Exam Name: Palo Alto Networks Certified Network Security Engineer Exam
- Certification Provider: Palo Alto Networks
- Latest update: Apr 24,2025
What type of address object would be useful for internal devices where the addressing structure assigns meaning to certain bits in the address, as illustrated in the diagram?
- A . IP Netmask
- B . IP Wildcard Mask
- C . IP Address
- D . IP Range
Information Security is enforcing group-based policies by using security-event monitoring on Windows User-ID agents for IP-to-User mapping in the network. During the rollout, Information Security identified a gap for users authenticating to their VPN and wireless networks.
Root cause analysis showed that users were authenticating via RADIUS and that authentication events were not captured on the domain controllers that were being monitored Information Security found that authentication events existed on the Identity Management solution (IDM). There did not appear to be direct integration between PAN-OS and the IDM solution
How can Information Security extract and learn iP-to-user mapping information from authentication events for VPN and wireless users?
- A . Add domain controllers that might be missing to perform security-event monitoring for VPN and wireless users.
- B . Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over TLS.
- C . Configure the User-ID XML API on PAN-OS firewalls to pull the authentication events directly from the IDM solution
- D . Configure the Windows User-ID agents to monitor the VPN concentrators and wireless controllers for IP-to-User mapping.
Which protocol is supported by GlobalProtect Clientless VPN?
- A . FTP
- B . RDP
- C . SSH
- D . HTTPS
Which type of zone will allow different virtual systems to communicate with each other?
- A . Tap
- B . External
- C . Virtual Wire
- D . Tunnel
A company has configured GlobalProtect to allow their users to work from home. A decrease in performance for remote workers has been reported during peak-use hours.
Which two steps are likely to mitigate the issue? (Choose TWO)
- A . Exclude video traffic
- B . Enable decryption
- C . Block traffic that is not work-related
- D . Create a Tunnel Inspection policy
During the implementation of SSL Forward Proxy decryption, an administrator imports the company’s Enterprise Root CA and Intermediate CA certificates onto the firewall. The company’s Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company’s Intermediate CA.
Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?
- A . Generate a single subordinate CA certificate for both Forward Trust and Forward Untrust.
- B . Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.
- C . Generate a single self-signed CA certificate for Forward Trust and another for Forward Untrust
- D . Generate two subordinate CA certificates, one for Forward Trust and one for Forward Untrust.
To ensure that a Security policy has the highest priority, how should an administrator configure a Security policy in the device group hierarchy?
- A . Add the policy to the target device group and apply a master device to the device group.
- B . Reference the targeted device’s templates in the target device group.
- C . Clone the security policy and add it to the other device groups.
- D . Add the policy in the shared device group as a pre-rule
An administrator notices that an interface configuration has been overridden locally on a firewall.
They require all configuration to be managed from Panorama and overrides are not allowed.
What is one way the administrator can meet this requirement?
- A . Perform a commit force from the CLI of the firewall.
- B . Perform a template commit push from Panorama using the "Force Template Values" option.
- C . Perform a device-group commit push from Panorama using the "Include Device and Network Templates" option.
- D . Reload the running configuration and perform a Firewall local commit.
Which GlobalProtect gateway selling is required to enable split-tunneling by access route, destination domain, and application?
- A . No Direct Access to local networks
- B . Tunnel mode
- C . iPSec mode
- D . Satellite mode
Which GlobalProtect gateway selling is required to enable split-tunneling by access route, destination domain, and application?
- A . No Direct Access to local networks
- B . Tunnel mode
- C . iPSec mode
- D . Satellite mode