Free PCNSE Exam Braindumps (page: 54)

Page 53 of 152

Which three statements accurately describe Decryption Mirror? (Choose three.)

  1. Decryption, storage, inspection, and use of SSL traffic regulated in certain countries.
  2. You should consult with your corporate counsel before activating and using Decryption Mirror in a production environment.
  3. Decryption Mirror requires a tap interface on the firewall.
  4. Only management consent is required to use the Decryption Mirror future.
  5. Use of Decryption Mirror might enable malicious users with administrative access to the firewall to harvest sensitive information that is submitted via an encrypted channel.

Answer(s): A,B,E


Reference:

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-concepts/decryption-mirroring



As a best practice, which URL category should you target first for SSL decryption?

  1. Health and Medicine
  2. High Risk
  3. Online Storage and Backup
  4. Financial Services

Answer(s): B


Reference:

https://docs.paloaltonetworks.com/best-practices/8-1/decryption-best-practices/decryption-best-practices/deploy-ssl-decryption-using-best-practices.html



Which User-ID mapping method should be used in a high-security environment where all IP address-to-user mappings should always be explicitly known?

  1. LDAP Server Profile configuration
  2. GlobalProtect
  3. Windows-based User-ID agent
  4. PAN-OS integrated User-ID agent

Answer(s): B



DRAG DROP (Drag and Drop is not supported)
Below are the steps in the workflow for creating a Best Practice Assessment in a firewall and Panorama configuration. Place the steps in order.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:






Post your Comments and Discuss Palo Alto Networks PCNSE exam with other Community members:

PCNSE Exam Discussions & Posts