Exam Details

  • Exam Code
    :PCNSE
  • Exam Name
    :Palo Alto Networks Certified Network Security Engineer - PAN-OS 11.x (PCNSE)
  • Certification
    :Palo Alto Networks Certifications
  • Vendor
    :Palo Alto Networks
  • Total Questions
    :860 Q&As
  • Last Updated
    :May 13, 2025

Palo Alto Networks Palo Alto Networks Certifications PCNSE Questions & Answers

  • Question 311:

    An administrator has two pairs of firewalls within the same subnet. Both pairs of firewalls have been configured to use High Availability mode with Active/Passive. The ARP tables for upstream routes display the same MAC address being shared for some of these firewalls.

    What can be configured on one pair of firewalls to modify the MAC addresses so they are no longer in conflict?

    A. Configure a floating IP between the firewall pairs.

    B. Change the Group IDs in the High Availability settings to be different from the other firewall pair on the same subnet.

    C. Change the interface type on the interfaces that have conflicting MAC addresses from L3 to VLAN.

    D. On one pair of firewalls, run the CLI command: set network interface vlan arp.

  • Question 312:

    An engineer creates a set of rules in a Device Group (Panorama) to permit traffic to various services for a specific LDAP user group.

    What needs to be configured to ensure Panorama can retrieve user and group information for use in these rules?

    A. A service route to the LDAP server

    B. A Master Device

    C. Authentication Portal

    D. A User-ID agent on the LDAP server

  • Question 313:

    A security engineer received multiple reports of an IPSec VPN tunnel going down the night before. The engineer couldn't find any events related to VPN under system togs. What is the likely cause?

    A. Dead Peer Detection is not enabled.

    B. Tunnel Inspection settings are misconfigured.

    C. The Tunnel Monitor is not configured.

    D. The log quota for GTP and Tunnel needs to be adjusted

  • Question 314:

    In an existing deployment, an administrator with numerous firewalls and Panorama does not see any WildFire logs in Panorama.

    Each firewall has an active WildFire subscription On each firewall. WildFire togs are available.

    This issue is occurring because forwarding of which type of logs from the firewalls to Panorama is missing?

    A. Threat logs

    B. Traffic togs

    C. System logs

    D. WildFire logs

  • Question 315:

    A network security administrator wants to configure SSL inbound inspection.

    Which three components are necessary for inspecting the HTTPS traffic as it enters the firewall? (Choose three.)

    A. An SSL/TLS Service profile

    B. The web server's security certificate with the private key

    C. A Decryption profile

    D. A Decryption policy

    E. The client's security certificate with the private key

  • Question 316:

    An organization is interested in migrating from their existing web proxy architecture to the Web Proxy feature of their PAN-OS 11.0 firewalls. Currently. HTTP and SSL requests contain the c IP address of the web server and the client browser is redirected to the proxy

    Which PAN-OS proxy method should be configured to maintain this type of traffic flow?

    A. DNS proxy

    B. Explicit proxy

    C. SSL forward proxy

    D. Transparent proxy

  • Question 317:

    A firewall administrator is investigating high packet buffer utilization in the company firewall. After looking at the threat logs and seeing many flood attacks coming from a single source that are dropped a by the firewall, the administrator decides to enable packet butter protection to protect against similar attacks.

    The administrator enables packet buffer protection globally in the firewall but still sees a high packet buffer utilization rate.

    What else should the administrator do to stop packet buffers from being overflowed?

    A. Add the default Vulnerability Protection profile to all security rules that allow traffic from outside.

    B. Enable packet buffer protection for the affected zones.

    C. Add a Zone Protection profile to the affected zones.

    D. Apply DOS profile to security rules allow traffic from outside.

  • Question 318:

    An administrator wants to configure the Palo Alto Networks Windows User-ID agent to map IP addresses to usernames. The company uses four Microsoft Active Directory servers and two Microsoft Exchange servers, which can provide logs for login events.

    All six servers have IP addresses assigned from the following subnet: 192.168 28.32/27. The Microsoft Active Directory servers reside in 192.168.28.32/28. and the Microsoft Exchange servers resideL in 192.168.28 48/28

    What information does the administrator need to provide in the User Identification > Discovery section?

    A. The IP-address and corresponding server type (Microsoft Active Directory or Microsoft Exchange) for each of the six servers

    B. Network 192 168.28.32/28 with server type Microsoft Active Directory and network 192.168.28.48/28 with server type Microsoft Exchange

    C. Network 192 168 28.32/27 with server type Microsoft

    D. One IP address of a Microsoft Active Directory server and "Auto Discover" enabled to automatically obtain all five of the other servers

  • Question 319:

    A firewall engineer creates a new App-ID report under Monitor > Reports > Application Reports > New Application to monitor new applications on the network and better assess any Security policy updates the engineer might want to make.

    How does the firewall identify the New App-ID characteristic?

    A. It matches to the New App-IDs downloaded in the last 30 days.

    B. It matches to the New App-IDs downloaded in the last 90 days

    C. It matches to the New App-IDs installed since the last time the firewall was rebooted

    D. It matches to the New App-IDs in the most recently installed content releases.

  • Question 320:

    A company is deploying User-ID in their network. The firewall learn needs to have the ability to see and choose from a list of usernames and user groups directly inside the Panorama policies when creating new security rules.

    How can this be achieved?

    A. By configuring Data Redistribution Client in Panorama > Data Redistribution

    B. By configuring User-ID source device in Panorama > Managed Devices

    C. By configuring User-ID group mapping in Panorama > User Identification

    D. By configuring Master Device in Panorama > Device Groups

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Palo Alto Networks exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PCNSE exam preparations and Palo Alto Networks certification application, do not hesitate to visit our Vcedump.com to find your solutions here.