Mock P C N S E Exam 5

Mock P C N S E Exam 5

1st - 5th Grade

75 Qs

quiz-placeholder

Similar activities

Production Tech Semester Model

Production Tech Semester Model

KG - Professional Development

76 Qs

LABELS

LABELS

3rd - 9th Grade

80 Qs

Real Estate

Real Estate

KG - University

70 Qs

Computer Fundamentals

Computer Fundamentals

KG - University

74 Qs

LEZZ GO CHARLIE

LEZZ GO CHARLIE

KG - Professional Development

78 Qs

CCNA 1 v7 Modules 16 – 17

CCNA 1 v7 Modules 16 – 17

1st Grade

72 Qs

Special Quiz For Pemantau

Special Quiz For Pemantau

5th Grade

70 Qs

Mock P C N S E Exam 5

Mock P C N S E Exam 5

Assessment

Quiz

Professional Development

1st - 5th Grade

Easy

Created by

Steve Brusas

Used 9+ times

FREE Resource

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An administrator connects four new remote offices to the corporate data center. The administrator decides to use the Large Scale VPN (LSVPN) feature on the Palo Alto Networks next-generation firewall.

What should the administrator configure in order to connect the sites?

Generic Routing Encapsulation (GRE) Tunnels

GlobalProtect Satellite

SD-WAN

IKE Gateways

Answer explanation

GlobalProtect Satellite—A Palo Alto Networks firewall at a remote site that establishes IPSec tunnels with the gateway(s) at your corporate office(s) for secure access to centralized resources. Configuration on the satellite firewall is minimal, enabling you to quickly and easily scale your VPN as you add new sites.

https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/large-scale-vpn-lsvpn/lsvpn-overview#id6b64ee5f-9e3f-4246-9296-945c25cd6c3b

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A customer wants to set up a site-to-site VPN using tunnel interfaces.

What format is the correct naming convention for tunnel interfaces?

tun.1025

tunnel.50

vpn.1024

gre1/2

Answer explanation

tunnel is the default name on the setup page, while 50 is the number you assigned for the tunnel... and when you finish creating the tunnel, the wizard adds the default name and assigned number together making it tunnel.50

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An engineer notices that the tunnel monitoring has been failing for a day and the VPN should have failed over to a backup path.

What part of the network profile configuration should the engineer verify?

Destination IP

Threshold

Action

Interval

Answer explanation

Configure a Monitoring Profile.

Network > Network Profiles > Monitor > Add

Make sure "Fail Over" Option is selected. < Action Settings

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POO0CAO

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three multi-factor authentication methods can be used to authenticate access to the firewall? (Choose three.)

One-time password

User certificate

SMS

Voice

Fingerprint

Answer explanation

Push

An endpoint device (such as a phone or tablet) prompts the user to allow or deny authentication.

Short message service (SMS)

An SMS message on the endpoint device prompts the user to allow or deny authentication. In some cases, the endpoint device provides a code that the user must enter in the MFA login page.

Voice

An automated phone call prompts the user to authenticate by pressing a key on the phone or entering a code in the MFA login page.

One-time password (OTP)

An endpoint device provides an automatically generated alphanumeric string, which the user enters in the MFA login page to enable authentication for a single transaction or session.

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)

LDAP

Log Ingestion

HTTP

Log Forwarding

Answer explanation

>Threat logs, create a log forwarding profile to define how you want the firewall or Panorama to handle logs.

>Configure an HTTP server profile to forward logs to a remote User-ID agent.

> Select the log forwarding profile you created then select this server profile as the HTTP server profile

https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/use-auto-tagging-to-automate-security-actions

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the PAN-OS NPTv6 feature based on RFC 6296 used for?

Application port number translation

IPv6-to-IPv6 network prefix translation

Stateful translation to provide better security

IPv6-to-IPv6 host portion translation

Answer explanation

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

An administrator has been tasked with deploying SSL Forward Proxy.

Which two types of certificates are used to decrypt the traffic? (Choose two.)

Device certificate

Subordinate CA from the administrator’s own PKI infrastructure

Self-signed root CA

External CA certificate

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?