Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

  • Upload
    momohs

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    1/19

    PassGuide.PCNSE6 (48Q)

    Number: PCNSE6Passing Score: 800Time Limit: 120 minFile Version: 4.9

     

     

    PCNSE6

    Palo Alto Networks Certified Network Security Engineer 6.0

    1. I was so happy when I cleared the exam with great scores 94%.2. How great and perfect exam preparation tool is that!3. I’ve used this, and want everyone else to benefit from it too.4. You can now be victorious in test by simply preparing from the online guide .

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    2/19

    Exam A

    QUESTION 1Two firewalls are configured in an Active/Passive High Availability (HA) pair with the following electionsettings:

    Firewall 5050-B is presently in the "Active" state and 5050-A is presently in the "Passive" state. Firewall5050-B reboots causing 5050-A to become Active.

    Which firewall will be in the "Active" state after firewall 5050-B has completed its reboot and is back online?

    A. Both firewalls are active (split brain)

    B. Firewall 5050-BC. Firewall 5050-A

    D. It could be either firewall

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 2Which two statements are true about DoS Protection Profiles and Policies? Choose 2 answers

    A. They mitigate against SYN, UDP, ICMP, ICMPv6, and other IP Flood attacks on a zone basis,regardless of interface(s). They provide reconnaissance protection against TCP/UDP port scans andhost sweeps.

    B. They mitigate against SYN, UDP, ICMP, ICMPv6, and other IP Flood attacks. They provide resourceprotection by limiting the number of sessions that can be used.

    C. They mitigate against volumetric attacks that leverage known vulnerabilities, brute force methods,amplification, spoofing, and other vulnerabilities.

    D. They mitigate against SYN, UDP, ICMP, ICMPv6, and other IP Flood attacks by utilizing "random earlydrop".

    Correct Answer: BD

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 3Where can the maximum concurrent SSL VPN Tunnels be set for Vsys2 when provisioning a Palo AltoNetworks firewall for multiple virtual systems?

    A. In the GUI under Network->Global Protect->Gateway->Vsys2

    B. In the GUI under Device->Setup->Session->Session Settings

    C. In the GUI under Device->Virtual Systems->Vsys2->ResourceD. In the GUI under Network->Global Protect->Portal->Vsys2

    Correct Answer: C

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    3/19

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 4

    A security engineer has been asked by management to optimize how Palo Alto Networks firewall syslogmessages are forwarded to a syslog receiver. There are currently 20 PA-5060 s, each of which isconfigured to forward syslogs individually.

    The security engineer would like to leverage their two M-100 appliances to send syslog messages from asingle source and has already deployed one in Panorama mode and the other as a Log Collector.

    What is the remaining step in implementing this solution?

    A. Configure Collector Log Forwarding

    B. Configure a Syslog Proxy Profile

    C. Configure a Panorama Log Forwarding Profile

    D. Enable Syslog Aggregation

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 5What can cause missing SSL packets when performing a packet capture on data plane interfaces?

     

     

    A. There is a hardware problem with the offloading FPGA on the management plane.

    B. The missing packets are offloaded to the management plane CPU.

    C. The packets are hardware offloaded to the offload processor on the data plane.

    D. The packets are not captured because they are encrypted.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 6A company has a policy that denies all applications they classify as bad and permits only applications theyclassify as good. The firewall administrator created the following security policy on the company s firewall:

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    4/19

    Which two benefits are gained from having both rule 2 and rule 3 present? Choose 2 answers

    A. Different security profiles can be applied to traffic matching rules 2 and 3.

    B. Separate Log Forwarding profiles can be applied to rules 2 and 3.

    C. Rule 2 denies traffic flowing across different TCP and UDP ports than rule 3.

    D. A report can be created that identifies unclassified traffic on the network.

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 7Company employees have been given access to the GlobalProtect Portal at https://portal.company.com:

    Assume the following:1. The firewall is configured to resolve DNS names using the internal DNS server.2. The URL portal.company.com resolves to the external interface of the firewall on the company's externalDNS server and to the internal interface of the firewall on the company s internal DNS server.3. The URL gatewayl.company.com resolves to the external interface of the firewall on the company'sexternal DNS server and to the internal interface of the firewall on the company s internal DNS server.

    This Gateway configuration will have which two outcomes? Choose 2 answers

    A. Clients outside the network will be able to connect to the external gateway Gateway1.

    B. Clients inside the network will be able to connect to the internal gateway Gateway1.

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    5/19

    C. Clients outside the network will NOT be able to connect to the external gateway Gateway1.

    D. Clients inside the network will NOT be able to connect to the internal gateway Gateway1.

    Correct Answer: ABSection: (none)Explanation

    Explanation/Reference:

    QUESTION 8What is the maximum usable storage capacity of an M-100 appliance?

    A. 2TB

    B. 4TB

    C. 6TB

    D. STB

    Correct Answer: B

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 9A user is reporting that they cannot download a PDF file from the internet.

    Which action will show whether the downloaded file has been blocked by a Security Profile?

    A. Filter the Session Browser for all sessions from the user with the application "adobe".

    B. Filter the System log for "Download Failed" messages.

    C. Filter the Traffic logs for all traffic from the user that resulted in a Deny action.

    D. Filter the Data Filtering logs for the user's traffic and the name of the PDF file.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 10What has happened when the traffic log shows an internal host attempting to open a session to a properly

    configured sinkhole address?

    A. The internal host is trying to resolve a DNS query by connecting to a rogue DNS server.

    B. The internal host attempted to use DNS to resolve a known malicious domain into an IP address.

    C. A rogue DNS server is now using the sinkhole address to direct traffic to a known malicious domain.

    D. A malicious domain is trying to contact an internal DNS server.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 11Which Security Policy rule configuration option disables antivirus and anti-spyware scanning of server- to-

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    6/19

    client flows only?

    A. Apply an Application Override Policy

    B. Disable Server Response Inspection

    C. Add server IP to Security Policy exception

    D. Disable HIP Profile

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 12Which two interface types provide support for network address translation (NAT)? Choose 2 answers

    A. HA

    B. Tap

    C. Layer3D. Virtual Wire

    E. Layer2

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:

     

     

    QUESTION 13A firewall is being attacked with a port scan. Which component can prevent this attack?

    A. DoS Protection

    B. Anti-Spyware

    C. Vulnerability Protection

    D. Zone Protection

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 14A Palo Alto Networks firewall has the following interface configuration;

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    7/19

    Hosts are directly connected on the following interfaces:Ethernet 1/6 - Host IP 192.168.62.2Ethernet 1/3 - Host IP 10.46.40.63

    The security administrator is investigating why ICMP traffic between the hosts is not working.

    She first ensures that ail traffic is allowed between zones based on the following security policy rule:

    The routing table of the firewall shows the following output:

    Which interface configuration change should be applied to ethernet1/6 to allow the two hosts tocommunicate based on this information?

    A. Change the Management Profile.

    B. Change the security policy to explicitly allow ICMP on this interface.

    C. Change the configured zone to DMZ.

    D. Change the Virtual Router setting to VR1.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 15After migrating from an ASA firewall, the VPN connection between a remote network and the Palo AltoNetworks firewall is not establishing correctly. The following entry is appearing in the logs:

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    8/19

    pfs group mismatched: my:0 peer:2

    Which setting should be changed on the Palo Alto Firewall to resolve this error message?

    A. Update the IPSEC Crypto profile for the Vendor IPSec Tunnel from group2 to no-pfs.

    B. Update the IKE Crypto profile for the Vendor IKE gateway from no-pfs to group2.

    C. Update the IPSEC Crypto profile for the Vendor IPSec Tunnel from no-pfs to group2.

    D. Update the IKE Crypto profile for the Vendor IKE gateway from group2 to no-pfs.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 16Which two interface types can be used when configuring GlobalProtect Portal? Choose 2 answers

    A. Virtual Wire

    B. Loopback

    C. Tunnel

    D. Layer3

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 17After pushing a security policy from Panorama to a PA-3020 firewall, the firewall administrator notices thattraffic logs from the PA-3020 are not appearing in Panorama's traffic logs.

    What could be the problem?

    A. The firewall is not licensed for logging to this Panorama device.

    B. Panorama is not licensed to receive logs from this particular firewall.

    C. None of the firewall's policies have been assigned a Log Forwarding profile.

     

     

    D. A Server Profile has not been configured for logging to this Panorama device.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 18Palo Alto Networks maintains a dynamic database of malicious domains. Which two Security Platform

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    9/19

    components use this database to prevent threats? Choose 2 answers

    A. Brute-force signatures

    B. DNS-based command-and-control signatures

    C. PAN-DB URL Filtering

    D. BrightCloud URL Filtering

    Correct Answer: BCSection: (none)Explanation

    Explanation/Reference:

    QUESTION 19Which three inspections can be performed with a next-generation firewall but NOT with a legacy firewall?Choose 3 answers

    A. Recognizing when SSH sessions are using SSH v1 instead of SSH v2

    B. Validating that UDP port 53 packets are not being used to tunnel data for another protocolC. Identifying unauthorized applications that attempt to connect over non-standard ports

    D. Allowing a packet through from an external DNS server only if an internal host recently queried thatDNS server

    E. Removing from the session table any TCP session without traffic for 3600 seconds

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 20Which mechanism is used to trigger a High Availability (HA) failover if a firewall interface goes down?

    A. Link Monitoring

    B. Heartbeat Polling

    C. Preemption

    D. SNMP Polling

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 21How is the Forward Untrust Certificate used?

    A. It issues certificates encountered on the Untrust security zone.

    B. It is used for Captive Portal to identify unknown users.

    C. It is used when web servers request a client certificate.

    D. It is the issuer for an external certificate which is not trusted by the firewall.

    Correct Answer: DSection: (none)Explanation

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    10/19

    Explanation/Reference:

    QUESTION 22By default, all PA-5060 syslog data is forwarded out the Management interface. What needs to beconfigured in order to send syslog data out of a different interface?

    A. Configure Service Route Only for Threats and URL Filtering, and the traffic will use the same route.B. Configure an Interface Management Profile and apply it to the interface that the syslogs will be sent

    through.

    C. Configure a Service Route for the Syslog service to use a dataplane interface.

    D. Create a Log-Forwarding Profile that points to the device that will receive the syslogs.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 23A network administrator uses Panorama to push security policies to managed firewalls at branch offices.

    Which policy type should be configured on Panorama if the administrator wishes to allow localadministrators at the branch office sites to override these policies?

    A. Implicit Rules

    B. Post Rules

    C. Default Rules

    D. Pre Rules

    Correct Answer: D

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 24A network engineer experienced network reachability problems through the firewall. The routing table onthe device is complex. To troubleshoot the problem the engineer ran a Command Line Interface (CLI)command to determine the egress interface for traffic destined to 98.139.183.24. The command resulted inthe following output:

    How should this output be interpreted?

    A. There is no route for the IP address 98.139.183.24, and there is a default route for outbound traffic.

    B. There is no interface in the firewall with the IP address 98.139.183.24.

    C. In virtual-router vrl, there is a route in the routing table for the network 98.139.0.0/16.

    D. There is no route for the IP address 98.139.183.24, and there is no default route.

    Correct Answer: DSection: (none)Explanation

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    11/19

    Explanation/Reference:

    QUESTION 25A website is presenting an RSA 2048-bit key. By default, what will the size of the key in the certificate sentby the firewall to the client be when doing SSL Decryption?

    A. 512 bits

    B. 1024 bits

    C. 2048 bits

    D. 4096 bits

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 26A hotel chain is using a system to centrally control a variety of items in guest rooms. The client devices ineach guest room communicate to the central controller using TCP and frequently disconnect due to apremature timeouts when going through a Palo Alto Networks firewall.

    Which action will address this issue without affecting all TCP traffic traversing the firewall?

    A. Create a security policy without security profiles, allowing the client-to-server traffic.

    B. Create an application override policy, assigning the client-to-server traffic to a custom application.

    C. Create an application with a specified TCP timeout and assign traffic to it with an application overridepolicy.

    D. Create an application override policy, assigning the server-to-client traffic to a custom application.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 27What are the three Security Policy rule Type classifications supported in PAN-OS 6.1?

    A. Security, NAT, Policy-Based Forwarding

    B. Intrazone, Interzone, Global

    C. Intrazone, Interzone, Universal

    D. Application, User, Content

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 28Which two steps are required to make Microsoft Active Directory users appear in the firewall's traffic log?

    Choose 2 answers

    A. Enable User-ID on the zone object for the source zone.

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    12/19

    B. Enable User-ID on the zone object for the destination zone.

    C. Configure a RADIUS server profile to point to a domain controller.

    D. Run the User-ID Agent using an Active Directory account that has "domain administrator" permissions.

    E. Run the User-ID Agent using an Active Directory account that has "event log viewer" permissions.

    Correct Answer: AE

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 29It is discovered that WebandNetTrends Unlimited's new web server software produces traffic that the PaloAlto Networks firewall sees as "unknown-tcp" traffic.

    Which two configurations would identify the application while preserving the ability of the firewall to performcontent and threat detection on the traffic? Choose 2 answers

    A. A custom application, with a name properly describing the new web server s purposeB. A custom application and an application override policy that assigns traffic going to and from the web

    server to the custom application

    C. An application override policy that assigns the new web server traffic to the built-in application "web-browsing"

    D. A custom application with content and threat detection enabled, which includes a signature, identifyingthe new web server s traffic

    Correct Answer: ABSection: (none)Explanation

    Explanation/Reference:

    QUESTION 30The IT department has received complaints about VoIP call jitter when the sales staff is making or receivingcalls. QoS is enabled on all firewall interfaces, but there is no QoS policy written in the rulebase. The ITmanager wants to find out what traffic is causing the jitter in real time when a user reports the jitter.

    Which feature can be used to identify, in real-time, the applications taking up the most bandwidth?

    A. Application Command Center (ACC)

    B. QoS Statistics

    C. QoS Log

    D. Applications Report

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 31A company has a web server behind their Palo Alto Networks firewall that they would like to makeaccessible to the public. They have decided to configure a destination NAT Policy rule.Given the following zone information:

    What should be configured as the destination zone on the Original Packet tab of the NAT Policy rule?

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    13/19

    A. DMZ-L3

    B. Any

    C. Untrust-L3

    D. Trust-L3

    Correct Answer: C

    Section: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 32Which URL Filtering Security Profile action logs the URL Filtering category to the URL Filtering log?

    A. Allow

    B. Alert

    C. Log

    D. Default

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 33The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks securityservices? Choose 2 answers

    A. Threat Prevention

    B. App-ID

    C. URL Filtering

    D. PAN-OS

    E. GlobalProtect Data File

    Correct Answer: AESection: (none)Explanation

    Explanation/Reference:

    QUESTION 34A Palo Alto Networks firewall is being targeted by an NTP Amplification attack and is being flooded withtens of thousands of bogus UDP connections per second to a single destination IP address and port.

    Which option, when enabled with the correct threshold, would mitigate this attack without droppinglegitimate traffic to other hosts inside the network?

    A. Zone Protection Policy with UDP Flood Protection

    B. Classified DoS Protection Policy using destination IP only with a Protect action

    C. QoS Policy to throttle traffic below maximum limit

    D. Security Policy rule to deny traffic to the IP address and port that is under attack

    Correct Answer: BSection: (none)Explanation

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    14/19

    Explanation/Reference:

     

     

    QUESTION 35How can a Palo Alto Networks firewall be configured to send syslog messages in a format compatible withnonstandard syslog servers?

    A. Enable support for non-standard syslog messages under device management.

    B. Select a non-standard syslog server profile.

    C. Create a custom log format under the syslog server profile.

    D. Check the custom-format checkbox in the syslog server profile.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 36Which Public Key Infrastructure component is used to authenticate users for GlobalProtect when theConnect Method is set to "pre-logon"?

    A. Certificate Revocation List

    B. Trusted root certificateC. Machine certificate

    D. Online Certificate Status Protocol

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 37

    A company is in the process of upgrading their existing Palo Alto Networks firewalls from version 6.1.0 to6.1.1.

    Which three methods can the firewall administrator use to install PAN-OS 6.1.1 across the enterprise?Choose 3 answers

    A. Push the PAN-OS 6.1.1 updates from the support site to install on each firewall.

    B. Download PAN-OS 6.1.1 files from the support site and install them on each firewall after manuallyuploading.

    C. Download PAN-OS 6.1.1 to a USB drive and the firewall will automatically update after the USB drive isinserted in the firewall.

    D. Push the PAN-OS 6.1.1 update from one firewall to all of the other remaining after updating one firewall.

    E. Download and push PAN-OS 6.1.1 from Panorama to each firewall.

    F. Download and install PAN-OS 6.1.1 directly on each firewall.

    Correct Answer: BEF

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    15/19

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 38

    Given the following routing table:

    Which configuration change on the firewall would cause it to use 10.66.24.88 as the nexthop for the

    192.168.93.0/30 network?

    A. Configuring the Administrative Distance for RIP to be higher than that of OSPF Ext

    B. Configuring the metric for RIP to be higher than that of OSPF Int

    C. Configuring the metric for RIP to be lower than that of OSPF Ext

    D. Configuring the Administrative Distance for RIP to be lower than that of OSPF Int

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 39A company hosts a publicly-accessible web server behind their Palo Alto Networks firewall, with thisconfiguration information:

    Which NAT Policy rule will allow users outside the company to access the web server?

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    16/19

    A. Option A

    B. Option B

    C. Option C

    D. Option D

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 40A company has purchased a WildFire subscription and would like to implement dynamic updates todownload the most recent content as often as possible.

    What is the shortest time interval the company can configure their firewall to check for WildFire updates?

    A. Every 24 hoursB. Every 30 minutes

    C. Every 15 minutes

    D. Every 1 hour

    E. Every 5 minutes

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 41Which method is the most efficient for determining which administrator made a specific change to the

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    17/19

    running config?

    A. In the Configuration log, set a filter for the edit command and look for the object that was changed.

    B. In the System log, set a filter for the name of the object that was changed.

    C. In Config Audit, compare the current running config to all of the saved configurations until the change isfound.

    D. In Config Audit, compare the current running config to previous committed versions until the change isfound.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 42You are configuring a File Blocking Profile to be applied to all outbound traffic uploading a specific file type,and there is a specific application that you want to match in the policy.

    What are three valid actions that can be set when the specified file is detected? Choose 3 answers

    A. Reset-both

    B. Block

    C. Continue

    D. Continue-and-forward

    E. Upload

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 43A firewall administrator is troubleshooting problems with traffic passing through the Palo Alto Networksfirewall.

    Which method will show the global counters associated with the traffic after configuring the appropriatepacket filters?

    A. From the CLI, issue the show counter interface command for the egress interface.

    B. From the GUI, select "Show global counters" under the Monitor tab.

    C. From the CLI, issue the show counter global filter packet-filter yes command.D. From the CLI, issue the show counter interface command for the ingress interface.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 44A security architect has been asked to implement User-ID in a MacOS environment with no enterpriseemail, using a Sun LDAP server for user authentication.

    In this environment, which two User-ID methods are effective for mapping users to IP addresses? Choose2 answers

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    18/19

    A. Terminal Server Agent

    B. Mac OS Agent

    C. Captive Portal

    D. GlobalProtect

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 45Which authentication method can provide role-based administrative access to firewalls running PAN- OS?

    A. LDAP

    B. Certificate-based authentication

    C. Kerberos

    D. RADIUS with Vendor Specific Attributes

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 46Which three engines are built into the Single-Pass Parallel Processing Architecture? Choose 3 answers

    A. Application Identification (App-ID)B. Group Identification (Group-ID)

    C. User Identification (User-ID)

    D. Threat Identification (Threat-ID)

    E. Content Identification (Content-ID)

    Correct Answer: ACESection: (none)Explanation

    Explanation/Reference:

    QUESTION 47What is a prerequisite for configuring a pair of Palo Alto Networks firewalls in an Active/Passive HighAvailability (HA) pair?

    A. The peer HA1 IP address must be the same on both firewalls.

    B. The management interfaces must be on the same network.

    C. The firewalls must have the same set of licenses.

    D. The HA interfaces must be directly connected to each other.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

  • 8/17/2019 Gratisexam.com Palo Alto Networks.passguide.pcnsE6.v2015!05!18.by.queen.48q

    19/19

    QUESTION 48Which source address translation type will allow multiple devices to share a single translated sourceaddress while using a single NAT Policy rule?

    A. Dynamic IP and Port

    B. Dynamic IP

    C. Bi-directional

    D. Static IP

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference: