PCNSC (Wing)
PCNSC (Wing)
Question: 1
Answer: A
Question: 2
A web server in the DMZ is being mapped to a public address through DNAT.
Which Security policy rule will allow traffic to flow to the web server?
https://www.dumpsschool.com/
Questions & Answers PDF P-3
Answer: B
Question: 3
Which version of Global Protect supports split tunneling based on destination domain, client process,
and HTTP/HTTPs video streaming application?
Answer: C
Question: 4
A firewall administrator has been asked to configure a Palo Alto Networks NGFW to prevent against
compromised hosts trying to phone-number or bacon out to eternal command-and-control (C2)
servers.
Which Security Profile type will prevent these behaviors?
A. Vulnerability Protection
B. Antivirus
C. Wildfire
D. Anti-Spyware
Answer: D
Question: 5
An administrator has users accessing network resources through Citrix XenApp 7 .x. Which User-ID
mapping solution will map multiple mat who using Citrix to connect to the network and access
resources?
A. Client Probing
B. Globa1Protect
C. Terminal Services agent
D. Syslog Monitoring
Answer: C
Question: 6
A speed/duplex negotiation mismatch is between the Palo Alto Networks management port and the
switch it connect.
How would an administrator configure the interface to IGbps?
https://www.dumpsschool.com/
Questions & Answers PDF P-4
Answer: D
Question: 7
A. Single Sign-On
B. Redirect
C. Transparent
D. NTLM
Answer: B
Question: 8
Which method will dynamically register tags on the Palo Alto Networks NGFW?
A. Restful API or the VMware API on the firewall or on the User.-D agent or the ready -only domain
controller
B. XML API or the VMware API on the firewall on the User-ID agent or the CLI
C. Restful API or the VMware API on the firewall or on the User-ID Agent
D. XML- API or lite VM Monitoring agent on the NGFW or on the User- ID agent
Answer: D
Question: 9
A customer wants to combine multiple Ethernet interfaces into a single virtual interface using Link
aggregation.
Which two formats are correct for naming aggregate interlaces? (Choose two.)
A. aggregate.8
B. ae.8
C. ae.1
D. aggregate.1
Answer: B, C
Question: 10
https://www.dumpsschool.com/
Questions & Answers PDF P-5
Which CLI command enables an administrator to view detail about the firewall including uptime.
PAN -OS® version, and serial number?
Answer: C
Question: 11
An administrator pushes a new configuration from panorama to a pair of firewalls that are configured
as active/passive HA pair.
Which NGFW receives the configuration from panorama?
Answer: D
Question: 12
A. hello heartbeats
B. User-ID in information
C. session synchronization
D. HA state information
Answer: C
Question: 13
A Security policy rule is configured with a Vulnerability Protection Profile and an action of Deny".
Which action will this configuration cause on the matched traffic?
A. The configuration is invalid it will cause the firewall to Skip this Security policy rule A warning will
be displayed during a command.
B. The configuration is valid It will cause the firewall to deny the matched sessions. Any configured
Security Profiles have no effect if the Security policy rule action is set to "Deny"
The configuration will allow the matched session unless a vulnerability signature is detected. The
"Deny" action will supersede the per. defined, severity defined actions defined in the associated
Vulnerability Protection Profile.
https://www.dumpsschool.com/
Questions & Answers PDF P-6
D. The configuration is invalid. The Profile Settings section will be- grayed out when the action is set
to "Deny"
Answer: C
Question: 14
Which DoS protection mechanism detects and prevents session exhaustion attacks?
Answer: C
Question: 15
An administrator wants multiple web servers in the DMZ to receive connections from the internet.
Traffic destined for 206.15.22.9 port 80/TCP needs to be forwarded to the server at 10 1.22
Based on the information shown in the age, which NAT rule will forward web-browsing traffic
correctly?
https://www.dumpsschool.com/
Questions & Answers PDF P-7
A)
B)
C)
https://www.dumpsschool.com/
Questions & Answers PDF P-8
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Question: 16
Answer: D
Question: 17
https://www.dumpsschool.com/
Questions & Answers PDF P-9
An administrator logs in to the Palo Alto Networks NGFW and reports and reports that the WebUI is
missing the policies tab. Which profile is the cause of the missing policies tab?
A. WebUI
B. Admin Role
C. Authorization
D. Authentication
Answer: B
Question: 18
What should an administrator consider when planning to revert Panorama to a pre-PAN-OS 8.1
version?
A. When Panorama is reverted to an earlier PAN-OS release, variable used in template stacks will be
removed authentically.
B. Panorama cannot be reverted to an earlier PAN-OS release if variables are used in templates or
stacks.
C. An administrator must use the Expedition tool to adapt the configuration to the pre-pan-OS 8.1
state.
D. Administrators need to manually update variable characters to those to used in pre-PAN-OS 8.1.
Answer: B
Question: 19
Which option would an administration choose to define the certificate and protect that Panorama
and its managed devices uses for SSL/ITS services?
Answer: B
Question: 20
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter"
method, which login will be detected as credential theft?
https://www.dumpsschool.com/
Questions & Answers PDF P-10
Answer: D
Question: 21
Which three authentication faction factors does PAN-OS® software support for MFA? (Choose three.)
A. Voice
B. Pull
C. SMS
D. Push
E. Okta Adaptive
Answer: A, B, D
Question: 22
Which User-ID method should b configured to map addresses to usernames for users connected
through a terminal server?
A. XFF header
B. Client probing
C. port mapping
D. server monitoring
Answer: C
Question: 23
An administrator has been asked to configure active/active HA for a pair of Palo Alto Networks
NGFWs. The firewalls use layer 3 interface to send traffic to a single gateway IP for the pair.
Which configuration will enable this HA scenario?
Answer: D
Question: 24
An administrator using an enterprise PKI needs to establish a unique chain of trust to ensure mutual
authentication between panorama and the managed firewall and Log Collectors. How would the
https://www.dumpsschool.com/
Questions & Answers PDF P-11
Answer: C
Question: 25
What will be the egress interface if the traffic’s ingress interface is Ethernet 1/6 sourcing form
192.168.11.3 and to the destination 10.46.41.113.during the.
https://www.dumpsschool.com/
Questions & Answers PDF P-12
A. ethernet 1/6
B. ethernet 1/5
C. ethernet 1/3
D. ethernet 1/7
Answer: C
https://www.dumpsschool.com/
Questions & Answers PDF P-13
Question: 26
An administrator sees several inbound sessions identified as unknown tcp in the Traffic logs. The
administrator determines that these sessions are from external users accessing the company’s
propriety accounting application. The administrator wants to reliability identity this as their
accounting application and to scan this traffic for threats.
Which option would achieve this result?
A. Create an Application Override policy and a custom threat signature for the application.
B. Create a custom App-ID and use the "ordered condition cheek box.
C. Create an Application Override policy
D. Create a custom App-ID and enable scanning on the advanced tab.
Answer: A
Question: 27
An administrator has enabled OSPF on a virtual router on the NGFW OSPF is not adding new routes
to the virtual router.
Which two options enable the administrator top troubleshoot this issue? (Choose two.)
Answer: B, D
Question: 28
What are two benefits of nested device groups in panorama? (Choose two )
Answer: B, C
Question: 29
Which feature prevents the submission of login information into website froms?
https://www.dumpsschool.com/
Questions & Answers PDF P-14
D. data filtering
Answer: A
Question: 30
Which feature prevents the submission of corporate login information into website forms?
Answer: A
Question: 31
A. port inspection
B. certification revocation
C. Content-ID
D. App-ID
Answer: D
Question: 32
A Palo Alto Networks NGFW just submitted a file lo WildFire tor analysis Assume a 5-minute window
for analysis. The firewall is configured to check for verdicts every 5 minutes.
How quickly will the firewall receive back a verdict?
A. 10 to 15 minutes
B. 5 to 10 minutes
C. More than 15 minutes
D. 5 minutes
Answer: B
Question: 33
Winch three steps will reduce the CPU utilization on the management plane? (Choose three. )
Disable logging at session start in Security policies.
https://www.dumpsschool.com/
Questions & Answers PDF P-15
Answer: A, B, C
Question: 34
If an administrator wants to decrypt SMTP traffic and possesses the saver’s certificate, which SSL
decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?
Answer: C
Question: 36
An administrator encountered problems with inbound decryption. Which option should the
administrator investigate as part of triage?
Answer: D
Question: 37
A. aggregate interlaces
B. multiple virtual systems
C. Globallprotect
D. machine learning
Answer: C
Question: 38
Which two benefits come from assigning a Decrypting Profile to a Decryption rule with a” NO
Decrypt” action? (Choose two.)
https://www.dumpsschool.com/
Questions & Answers PDF P-16
Answer: B, E
Question: 39
A. heartbeats
B. HA state information
C. session information
D. User-ID information
Answer: C
Question: 40
Which PAN-OS® policy must you configure to force a user to provide additional credential before he
is allowed to access an internal application that contains highly sensitive business data?
A. Authentication policy
B. Decryption policy
C. Security policy
D. Application Override policy
Answer: A
Question: 41
An administrator has left a firewall to used default port for all management services. Which three
function performed by the dataplane? (Choose three.)
A. NTP
B. antivirus
C. NAT
D. WildFire updates
E. file blocking
Answer: A, C, D
Question: 42
https://www.dumpsschool.com/
Questions & Answers PDF P-17
An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port.
Which log entry can the administrator use to verify that sessions are being decrypted?
A. Decryption tag
B. In the details of the Threat log entries
C. In the details of the Traffic log entries
D. Data filtering log
Answer: C
Question: 43
Answer: C
Question: 44
A Company needs to preconfigured firewalls to be sent to remote sites with the least amount of
preconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple
regional data centers to include the future regional data centers.
Which VPN configuration would adapt to changes when deployed to Hie future site?
Answer: A
Question: 45
https://www.dumpsschool.com/
Questions & Answers PDF P-18
An administrator cannot see any of the Traffic logs from the Palo Alto Networks NGFW on Panoram
a. The configuration problem seems to be on the firewall side. Where is the best place on the Palo
Alto Networks NGFW to check whether the configuration is correct?
A)
B)
https://www.dumpsschool.com/
Questions & Answers PDF P-19
C)
D)
https://www.dumpsschool.com/
Questions & Answers PDF P-20
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Question: 46
VPN traffic intended for an administrator's Palo Alto Networks NGfW is being maliciously intercepted
and retransmitted by the interceptor. When Creating a VPN tunnel, which protection profile cm be
enabled to prevent this malicious behavior?
A. zone Protection
B. Web Application
https://www.dumpsschool.com/
Questions & Answers PDF P-21
C. DoS Protection
D. Replay
Answer: A
Question: 47
A. The application name assigned to the traffic by the security rule is written to the traffic log. B.
The Palo Alto Networks NGFW Steps App-ID processing at Layer 4.
C. Threat-ID processing time is decreased.
D. App-ID processing time is increased.
Answer: B
Question: 48
The firewall identified a popular application as a unknown-tcp. Which options are available to
identify the application? (Choose two.)
Answer: B, D
Question: 49
Which three file types can be forward to WildMFire for analysis a part of the basic WildMFire
service?
A. .exe
B. .apk
C. .dil
D. .jar
E. .pdf
F. .fon
Answer: B, D, E
Question: 50
Which two methods can be configured to validate the revocation status of a certificate? (Choose
two)
https://www.dumpsschool.com/
Questions & Answers PDF P-22
A. CRL
B. Cert-Validation-Profile
C. OCSP
D. CRT
E. SSL /TLS Service Profile
Answer: B, D
Question: 51
A. Ping-Path
B. Path Monitoring
C. Failover
D. Heartbeat Monitoring
Answer: B
Question: 52
The administrator has enabled BGP on a virtual router on the Palo Alto Networks NGFW, but new
routes do not seem to be populating the virtual router.
Which two options would help the administrator Troubleshoot this issue? (Choose two.)
Answer: C, D
Question: 53
A global corporate office has a large-scale network with only one User-ID agent, which creates a
bottleneck near the User-ID agent server. Which solution in PAN -OS® software would help in this
case?
A. content inspection
B. application override
C. Virtual Wire mode
D. redistribution of user mappings
Answer: D
https://www.dumpsschool.com/
Questions & Answers PDF P-23
Question: 54
During the packet flow process, which two processes are performed in application identification?
(Choose two.)
Answer: B, D
Question: 55
An administrator is using Panorama and multiple Palo Alto Networks NGFWs. After upgrading all
devices to the latest PAN-OS® software, the administrator enables logs forwarding from the firewalls
to panorama Pre-existing logs from the firewall are not appearing in Panoram
a.
Which action would enables the firewalls to send their preexisting logs to Panorama?
A. A CLI command will forward the pre-existing logs to Panorama.
B. Use the import option to pull logs panorama.
C. Use the ACC to consolidate pre-existing logs.
D. The- log database will need to be exported from the firewall and manually imported into
Panorama.
Answer: A
Question: 56
A. RADIUS
B. SSH keys
C. Certification
D. LDAP
Answer: A
Question: 57
A client has a sensitive application server in their data center and is particularly concerned about
resource exhaustion because of distributed denial-of-service attacks.
How can the Palo Alto Networks NGFW be configured to specifically protect tins server against
resource exhaustion originating from multiple IP address (DDoS attack)?
A. Define a custom App-ID to ensure that only legitimate application traffic reaches the server
https://www.dumpsschool.com/
Questions & Answers PDF P-24
Answer: B
Question: 58
A. RADIUS
B. SSH keys
C. Certification
D. LDAP
Answer: B
Question: 59
A web server is hosted in the DMZ and the server re configured to listen for income connections on
TCP port 443. A Security policies rules allowing access from the Trust zone to the DMZ zone needs to
be configured to allow web-browsing access. The web server host its contents over Traffic from Trust
to DMZ is being decrypted with a Forward Proxy rule.
Which combination of service and application, and order of Security policy rules needs to be
configured to allow cleaned web-browsing traffic to the server on tcp/443?
Answer: C
Question: 60
Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?
https://www.dumpsschool.com/
Questions & Answers PDF P-25
Answer: A
Question: 61
An administrator deploys PA-500 NGFWs as an active/passive high availability pair . The devices are
not participating in dynamic router and preemption is disabled.
What must be verified to upgrade the firewalls to the most recent version of PAN OS® software?
Answer: B
Question: 62
Which processing order will be enabled when a panorama administrator selects the setting "Objects
defined in ancestors will takes higher precedence?
Answer: B
Question: 63
An administrator accidentally closed the commit window/screen before the commit was finished.
Which two options could the administrator use to verify the progress or success of that commit task?
(Choose two.)
A)
B)
https://www.dumpsschool.com/
Questions & Answers PDF P-26
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A, B, C
Question: 64
https://www.dumpsschool.com/
Questions & Answers PDF P-27
How would an administrator monitor/capture traffic on the management interface of the Palo Alto
Networks NGFW?
Answer: A
Question: 65
An organization has Palo Alto Networks MGfWs that send logs to remote monitoring and security
management platforms. The network team has report has excessive traffic on the corporate WAN.
How could the Palo Alto Networks NOFW administrator reduce WAN traffic while maintaining
support for all the existing monitoring/security platforms?
A. forward logs from firewalls only to Panorama, and have Panorama forward log* lo other external
service.
B. Any configuration on an M-500 would address the insufficient bandwidth concerns.
C. Configure log compression and optimization features on all remote firewalls.
D. Forward logs from external sources to Panorama for correlation, arid from Panorama send to the
NGFW
Answer: A
Question: 66
A user's traffic traversing a Palo Alto Networks NGFW sometime can reach http//www company com
At the session times out. The NGFW has been configured with a PBF rule that the user's traffic
matches when it goes to http //www company com.
How con the firewall be configured to automatically disable the PBF rule if the next hop goes down?
A. Configure path monitoring for tine next hop gateway on the default route in tin- virtual router.
B. Enable and configure a Link Monitoring Profile for the external interface of the firewall.
C. Create and add a Monitor Profile with an action of Wait Recover in the PBF rule in question.
D. Create and add a Monitor Profile with an action of Fail Over in the PBF rule in question.
https://www.dumpsschool.com/
Questions & Answers PDF P-28
Answer: D
Question: 67
Which two methods can be used to verify firewall connectivity to Autofocus? (Choose two. )
Answer: A, E
Question: 68
An administrator creates a custom application containing Layer 7 signatures. The latest application
and threat dynamic update is downloaded to the same NGFW. THE update contains application that
matches the same traffic signatures as the customer application.
Which application should be used to identify traffic traversing the NGFW?
A. custom application
B. Custom and downloaded application signature files are merged and are used
C. System longs show an application errors and signature is used.
D. downloaded application
Answer: A
Question: 69
A. Configuration synchronization
B. Virtual link
C. active/passive deployment
D. session synchronization
E. synchronization of IPsec security associations
Answer: A, C, E
Question: 70
Which two options prevents the firewall from capturing traffic passing through it? (Choose two.)
https://www.dumpsschool.com/
Questions & Answers PDF P-29
Answer: B, C
Question: 71
Which two action would be part of an automatic solution that would block sites with untrusted
certificates without enabling SSL forward proxy? (Choose two.)
Answer: B, D
Question: 72
Answer: A
Question: 73
Which two subscriptions are available when configuring panorama to push dynamic updates to
connected devices? (Choose two.)
A. User-ID
B. Antivirus
C. Application and Threats
D. Content-ID
Answer: B, C
Question: 74
Which three user authentication services can be modified in to provide the Palo Alto Networks
NGFW with both username and role names? (Choose three.)
https://www.dumpsschool.com/
Questions & Answers PDF P-30
A. PAP
B. SAML
C. LDAP
D. TACACS+
E. RADIUS
F. Kerberos
Answer: C, D, E
Question: 75
An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks
NGFWs. The administrator assigns priority 100 to the active firewall.
Which priority is collect tot the passive firewall?
A. 0
B. 1
C. 90
D. 255
Answer: D
Question: 75
When a malware-infected host attempts to resolve a known command-and-control server, the traffic
matches a security policy with DNS sinhole enabled, generating a traffic log.
What will be the destination IP Address in that log entry?
Answer: C
https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Verify-DNS-Sinkhole-Function-
is-Working/ta-p/65864
https://www.dumpsschool.com/