Exam PCNSE: Palo Alto Networks Certified Network Security Engineer
Exam Number: PCNSE | Length of test: 120 mins |
Exam Name: Palo Alto Networks Certified Network Security Engineer | Number of questions in the actual exam: 50 |
Format: PDF, VPLUS | Passing Score: +70% |
Total Questions: 426
FREE
Premium VPLUS file
Download practice test questions
Title | Size | Hits | Download |
---|---|---|---|
Palo-Alto-Networks.PCNSE.vJul-2024.by.Jane.252q | 8.12 MB | 46 | Download |
Palo-Alto-Networks.PCNSE.vJul-2024.by.Jane.252q | 7.05 MB | 41 | Download |
Palo-Alto-Networks.PCNSE.vJun-2024.by.Gary.238q | 7.54 MB | 49 | Download |
Palo-Alto-Networks.PCNSE.vJun-2024.by.Gary.238q | 6.49 MB | 49 | Download |
Palo-Alto-Networks.PCNSE .vMar-2024.by.Ricky.118 | 2.18 MB | 52 | Download |
Palo-Alto-Networks.PCNSE .vMar-2024.by.Ricky.118 | 5.86 MB | 43 | Download |
Some new questions:
Q
A security team has enabled real-time WildFire signature lookup on all its firewalls. Which additional action will further reduce the likelihood of newly discovered malware being allowed through the firewalls?
A. increase the frequency of the applications and threats dynamic updates.
B. Increase the frequency of the antivirus dynamic updates
C. Enable the ‘Hold Mode’ option in Objects > Security Profiles > Antivirus.
D. Enable the ‘Report Grayware Files’ option in Device > Setup > WildFire.
Q
Forwarding of which two log types is configured in Device > Log Settings? (Choose two.)
A. Threat
B. HIP Match
C. Traffic
D. Configuration
Q
Which two are required by IPSec in transport mode? (Choose two.)
A. Auto generated key
B. NAT Traversal
C. IKEv1
D. DH-group 20 (ECP-384 bits)
Q
What are three prerequisites to enable Credential Phishing Prevention over SSL? (Choose three
A. Configure a URL profile to block the phishing category.
B. Create a URL filtering profile
C. Enable User-ID.
D. Create an anti-virus profile.
E. Create a decryption policy rule.
Answer: B, C, E
Q
A firewall engineer is tasked with defining signatures for a custom application. Which two sources can the engineer use to gather information about the application patterns’? (Choose two.)
A. Traffic logs
B. Data filtering logs
C. Policy Optimizer
D. Wireshark
Q
A firewall administrator is configuring an IPSec tunnel between a company’s HQ and a remote location. On the HQ firewall, the interface used to terminate the IPSec tunnel has a static IP. At the remote location, the interface used to terminate the IPSec tunnel has a DHCP assigned IP address.
Which two actions are required for this scenario to work? (Choose two.)
A. On the HQ firewall select peer IP address type FQDN
B. On the remote location firewall select peer IP address type Dynamic
C. On the HQ firewall enable DDNS under the interface used for the IPSec tunnel
D. On the remote location firewall enable DONS under the interface used for the IPSec tunnel
…………….