Palo Alto Networks PCNSE Palo Alto Networks Certified Network Security Engineer Exam Online Training
Palo Alto Networks PCNSE Online Training
The questions for PCNSE were last updated at Apr 24,2025.
- Exam Code: PCNSE
- Exam Name: Palo Alto Networks Certified Network Security Engineer Exam
- Certification Provider: Palo Alto Networks
- Latest update: Apr 24,2025
What can be used as an Action when creating a Policy-Based Forwarding (PBF) policy?
- A . Deny
- B . Discard
- C . Allow
- D . Next VR
An administrator has two pairs of firewalls within the same subnet. Both pairs of firewalls have been configured to use High Availability mode with Active/Passive. The ARP tables for upstream routes display the same MAC address being shared for some of these firewalls.
What can be configured on one pair of firewalls to modify the MAC addresses so they are no longer in conflict?
- A . Configure a floating IP between the firewall pairs.
- B . Change the Group IDs in the High Availability settings to be different from the other firewall pair on the same subnet.
- C . Change the interface type on the interfaces that have conflicting MAC addresses from L3 to VLAN.
- D . On one pair of firewalls, run the CLI command: set network interface vlan arp.
An engineer creates a set of rules in a Device Group (Panorama) to permit traffic to various services for a specific LDAP user group.
What needs to be configured to ensure Panorama can retrieve user and group information for use in these rules?
- A . A service route to the LDAP server
- B . A Master Device
- C . Authentication Portal
- D . A User-ID agent on the LDAP server
A security engineer needs firewall management access on a trusted interface.
Which three settings are required on an SSL/TLS Service Profile to provide secure Web UI authentication? (Choose three.)
- A . Minimum TLS version
- B . Certificate
- C . Encryption Algorithm
- D . Maximum TLS version
- E . Authentication Algorithm
An administrator is attempting to create policies tor deployment of a device group and template
stack. When creating the policies, the zone drop down list does not include the required zone.
What must the administrator do to correct this issue?
- A . Specify the target device as the master device in the device group
- B . Enable "Share Unused Address and Service Objects with Devices" in Panorama settings
- C . Add the template as a reference template in the device group
- D . Add a firewall to both the device group and the template
An organization conducts research on the benefits of leveraging the Web Proxy feature of PAN-OS 11.0.
What are two benefits of using an explicit proxy method versus a transparent proxy method? (Choose two.)
- A . No client configuration is required for explicit proxy, which simplifies the deployment complexity.
- B . Explicit proxy supports interception of traffic using non-standard HTTPS ports.
- C . It supports the X-Authenticated-User (XAU) header, which contains the authenticated username in the outgoing request.
- D . Explicit proxy allows for easier troubleshooting, since the client browser is aware of the existence of the proxy.
Which three actions can Panorama perform when deploying PAN-OS images to its managed devices? (Choose three.)
- A . upload-onlys
- B . install and reboot
- C . upload and install
- D . upload and install and reboot
- E . verify and install
Which User-ID mapping method should be used in a high-security environment where all IP address-to-user mappings should always be explicitly known?
- A . PAN-OS integrated User-ID agent
- B . GlobalProtect
- C . Windows-based User-ID agent
- D . LDAP Server Profile configuration
A network security administrator wants to begin inspecting bulk user HTTPS traffic flows egressing out of the internet edge firewall.
Which certificate is the best choice to configure as an SSL Forward Trust certificate?
- A . A self-signed Certificate Authority certificate generated by the firewall
- B . A Machine Certificate for the firewall signed by the organization’s PKI
- C . A web server certificate signed by the organization’s PKI
- D . A subordinate Certificate Authority certificate signed by the organization’s PKI
Which operation will impact the performance of the management plane?
- A . Decrypting SSL sessions
- B . Generating a SaaS Application report
- C . Enabling DoS protection
- D . Enabling packet buffer protection