Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

PCNSE Exam Dumps - Paloalto Networks Palo Alto Certifications and Accreditations Questions and Answers

Question # 4

When a new firewall joins a high availability (HA) cluster, the cluster members will synchronize all existing sessions over which HA port?

Options:

A.

HA1

B.

HA3

C.

HA2

D.

HA4

Buy Now
Question # 5

Which three methods are supported for split tunneling in the GlobalProtect Gateway? (Choose three.)

Options:

A.

Destination user/group

B.

URL Category

C.

Destination Domain

D.

video streaming application

E.

Source Domain

F.

Client Application Process

Buy Now
Question # 6

An existing log forwarding profile is currently configured to forward all threat logs to Panorama. The firewall engineer wants to add syslog as an additional log forwarding method. The requirement is to forward only medium or higher severity threat logs to syslog. Forwarding to Panorama must not be changed.

Which set of actions should the engineer take to achieve this goal?

Options:

A.

1- Open the current log forwarding profile.2. Open the existing match list for threat log type.3. Define the filter.4. Select the syslog forward method.

B.

1. Create a new log forwarding profile.2. Add a new match list for threat log type.3. Define the filter.4. Select the Panorama and syslog forward methods.

C.

1. Open the current log forwarding profile.2. Add a new match list for threat log type.3. Define the filter.4. Select the syslog forward method.

D.

1. Create a new log forwarding profile.2. Add a new match list for threat log type.3. Define the filter.4. Select the syslog forward method.

Buy Now
Question # 7

The vulnerability protection profile of an on-premises Palo Alto Networks firewall is triggering on a common Threat ID, and it has been determined to be a false positive. The issue causes an outage of a critical service. When the vulnerability protection profile is opened to add the exception, the Threat ID is missing. Which action will most efficiently find and implement the exception?

Options:

A.

Review high-severity system logs to identify why the threat is missing in "Vulnerability Profile Exceptions"

B.

Select "Show all signatures" within the vulnerability protection profile under "Exceptions"

C.

Review traffic logs to add the exception from there

D.

Open a support case

Buy Now
Question # 8

An administrator connects a new fiber cable and transceiver Ethernet1/1 on a Palo Alto Networks firewall. However, the link does not come up. How can the administrator troubleshoot to confirm the transceiver type, tx-power, rxpower, vendor name, and part number by using the CLI?

Options:

A.

show chassis status slot s1

B.

show s/stem state filter ethernet1/1

C.

show s/stem state filter sw.dev interface config

D.

show s/stem state filter-pretty sys.sl*

Buy Now
Question # 9

An administrator is attempting to create policies tor deployment of a device group and template stack. When creating the policies, the zone drop down list does not include the required zone.

What must the administrator do to correct this issue?

Options:

A.

Specify the target device as the master device in the device group

B.

Enable "Share Unused Address and Service Objects with Devices" in Panorama settings

C.

Add the template as a reference template in the device group

D.

Add a firewall to both the device group and the template

Buy Now
Question # 10

Which DoS Protection Profile detects and prevents session exhaustion attacks against specific destinations?

Options:

A.

Resource Protection

B.

TCP Port Scan Protection

C.

Packet Based Attack Protection

D.

Packet Buffer Protection

Buy Now
Question # 11

During the implementation of SSL Forward Proxy decryption, an administrator imports the company's Enterprise Root CA and Intermediate CA certificates onto the firewall. The company's Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company's Intermediate CA.

Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

Options:

A.

Generate a single subordinate CA certificate for both Forward Trust and Forward Untrust.

B.

Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.

C.

Generate a single self-signed CA certificate for Forward Trust and another for Forward Untrust

D.

Generate two subordinate CA certificates, one for Forward Trust and one for Forward Untrust.

Buy Now
Question # 12

Which two profiles should be configured when sharing tags from threat logs with a User-ID agent? (Choose two.)

Options:

A.

HTTP

B.

LDAP

C.

Log Ingestion

D.

Log Forwarding

Buy Now
Question # 13

An organization has recently migrated its infrastructure and configuration to NGFWs, for which Panorama manages the devices. The organization is coming from a L2-L4 firewall vendor, but wants to use App-ID while identifying policies that are no longer needed.

Which Panorama tool can provide a solution?

Options:

A.

Application Groups

B.

Policy Optimizer

C.

Test Policy Match

D.

Config Audit

Buy Now
Exam Code: PCNSE
Exam Name: Palo Alto Networks Certified Security Engineer (PCNSE) PAN-OS 11.0
Last Update: Aug 17, 2025
Questions: 374
PCNSE pdf

PCNSE PDF

$29.75  $84.99
PCNSE Engine

PCNSE Testing Engine

$33.25  $94.99
PCNSE PDF + Engine

PCNSE PDF + Testing Engine

$47.25  $134.99