Free PCNSE Exam Braindumps (page: 29)

Page 28 of 152

Which log file can be used to identify SSL decryption failures?

  1. Traffic
  2. ACC
  3. Configuration
  4. Threats

Answer(s): A



A customer wants to set up a site-to-site VPN using tunnel interfaces. Which two formats are correct for naming tunnel interfaces? (Choose two.)

  1. tunnel.1
  2. vpn-tunnel.1
  3. tunnel.1025
  4. vpn-tunnel.1024

Answer(s): A,C



Based on the following image, what is the correct path of root, intermediate, and end-user certificate?

  1. Palo Alto Networks > Symantec > VeriSign
  2. VeriSign > Symantec > Palo Alto Networks
  3. Symantec > VeriSign > Palo Alto Networks
  4. VeriSign > Palo Alto Networks > Symantec

Answer(s): B



An administrator wants a new Palo Alto Networks NGFW to obtain automatic application updates daily, so it is configured to use a scheduler for the application database. Unfortunately, they required the management network to be isolated so that it cannot reach the Internet.

Which configuration will enable the firewall to download and install application updates automatically?

  1. Download and install application updates cannot be done automatically if the MGT port cannot reach the Internet.
  2. Configure a service route for Palo Alto Networks Services that uses a dataplane interface that can route traffic to the Internet, and create a Security policy rule to allow the traffic from that interface to the update servers if necessary.
  3. Configure a Policy Based Forwarding policy rule for the update server IP address so that traffic sourced from the management interfaced destined for the update servers goes out of the interface acting as your Internet connection.
  4. Configure a Security policy rule to allow all traffic to and from the update servers.

Answer(s): B






Post your Comments and Discuss Palo Alto Networks PCNSE exam with other Community members:

PCNSE Discussions & Posts