Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Paloalto Networks PCNSE Practice Exam with Questions & Answers | Set: 10

Questions 91

To connect the Palo Alto Networks firewall to AutoFocus, which setting must be enabled?

Options:
A.

Device>Setup>Services>AutoFocus

B.

Device> Setup>Management >AutoFocus

C.

AutoFocus is enabled by default on the Palo Alto Networks NGFW

D.

Device>Setup>WildFire>AutoFocus

E.

Device>Setup> Management> Logging and Reporting Settings

Paloalto Networks PCNSE Premium Access
Questions 92

A firewall engineer is investigating high dataplane CPU utilization. To decrease the load on this CPU, what should be reduced?

Options:
A.

The amount of decrypted traffic

B.

The timeout value for admin sessions

C.

The number of mapped User-ID groups

D.

The number of permitted IP addresses on the management interface

Questions 93

An administrator is tasked to provide secure access to applications running on a server in the company's on-premises datacenter.

What must the administrator consider as they prepare to configure the decryption policy?

Options:
A.

Ensure HA3 interfaces are configured in a HA pair environment to sync decrypted sessions.

B.

Obtain or generate the server certificate and private key from the datacenter server.

C.

Obtain or generate the self-signed certificate with private key in the firewall

D.

Obtain or generate the forward trust and forward untrust certificate from the datacenter server.

Questions 94

After importing a pre-configured firewall configuration to Panorama, what step is required to ensure a commit/push is successful without duplicating local configurations?

Options:
A.

Ensure Force Template Values is checked when pushing configuration.

B.

Push the Template first, then push Device Group to the newly managed firewall.

C.

Perform the Export or push Device Config Bundle to the newly managed firewall.

D.

Push the Device Group first, then push Template to the newly managed firewall

Questions 95

Which statement accurately describes how web proxy is run on a firewall with multiple virtual systems?

Options:
A.

It can run on a single virtual system and multiple virtual systems.

B.

It can run on multiple virtual systems without issue.

C.

It can run only on a single virtual system.

D.

It can run only on a virtual system with an alias named "web proxy.

Questions 96

An administrator Just enabled HA Heartbeat Backup on two devices However, the status on tie firewall's dashboard is showing as down High Availability.

PCNSE Question 96

What could an administrator do to troubleshoot the issue?

Options:
A.

Go to Device > High Availability> General > HA Pair Settings > Setup and configuring the peer IP for heartbeat backup

B.

Check peer IP address In the permit list In Device > Setup > Management > Interfaces > Management Interface Settings

C.

Go to Device > High Availability > HA Communications> General> and check the Heartbeat Backup under Election Settings

D.

Check peer IP address for heartbeat backup to Device > High Availability > HA Communications > Packet Forwarding settings.

Questions 97

A firewall administrator has been tasked with ensuring that all firewalls forward System logs to Panorama. In which section is this configured?

Options:
A.

Monitor > Logs > System

B.

Objects > Log Forwarding

C.

Panorama > Managed Devices

D.

Device > Log Settings

Questions 98

As a best practice, which URL category should you target first for SSL decryption?

Options:
A.

Online Storage and Backup

B.

High Risk

C.

Health and Medicine

D.

Financial Services

Questions 99

What happens when an A/P firewall pair synchronizes IPsec tunnel security associations (SAs)?

Options:
A.

Phase 1 and Phase 2 SAs are synchronized over HA3 links.

B.

Phase 2 SAs are synchronized over HA2 links.

C.

Phase 1 and Phase 2 SAs are synchronized over HA2 links.

D.

Phase 1 SAs are synchronized over HA1 links.

Questions 100

An engineer is tasked with deploying SSL Forward Proxy decryption for their organization.

What should they review with their leadership before implementation?

Options:
A.

Browser-supported cipher documentation

B.

Cipher documentation supported by the endpoint operating system

C.

URL risk-based category distinctions

D.

Legal compliance regulations and acceptable usage policies