PCNSE Dumps

PCNSE Free Practice Test

Paloalto-Networks PCNSE: Palo Alto Networks Certified Security Engineer (PCNSE)PAN-OS 8.0

QUESTION 16

A firewall administrator needs to be able to inspect inbound HTTPS traffic on servers hosted in their DMZ to prevent the hosted service from being exploited. Which combination of features can allow PAN-OS to detect exploit traffic in a session with TLS encapsulation?

Correct Answer: C

QUESTION 17

You need to allow users to access the office-suite applications of their choice. How should you configure the firewall to allow access to any office-suite application?

Correct Answer: C

QUESTION 18

When using SSH keys for CLI authentication for firewall administration, which method is used for authorization?

Correct Answer: A
When using SSH keys for CLI authentication for firewall administration, the method used for authorization is local. This is described in the Palo Alto Networks PCNSE Study Guide in Chapter 4: Authentication and Authorization, under the section "CLI Authentication with SSH Keys":
"SSH keys use public key cryptography to authenticate users, but they do not provide a mechanism for authorization. Therefore, when using SSH keys for CLI authentication, authorization is always performed locally on the firewall."

QUESTION 19

The manager of the network security team has asked you to help configure the company's Security Profiles according to Palo Alto Networks best practice As part of that effort, the manager has assigned you the Vulnerability Protection profile for the internet gateway firewall.
Which action and packet-capture setting for items of high severity and critical severity best matches Palo Alto Networks best practice?

Correct Answer: C
https://docs.paloaltonetworks.com/best-practices/10-2/internet-gateway-best-practices/best-practice-internet-gate "Enable extended-capture for critical, high, and medium severity events and single-packet capture for low severity events. "
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-security-profiles-vulner

QUESTION 20

What are two valid deployment options for Decryption Broker? (Choose two)

Correct Answer: AB
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-broker