Palo Alto Networks PCNSE Palo Alto Networks Certified Security Engineer PAN-OS 11.0 Exam Practice Test

Page: 1 / 14
Total 294 questions
Question 1

A company has a PA-3220 NGFW at the edge of its network and wants to use active directory groups in its Security policy rules. There are 1500 groups in its active directory. An engineer has been provided 800 active directory groups to be used in the Security policy rules.

What is the engineer's next step?



Answer : B


Question 2

A security engineer is informed that the vulnerability protection profile of their on-premises Palo Alto Networks firewall is triggering on a common Threat ID, and which has been determined to be a false positive. The engineer is asked to resolve the issue as soon as possible because it is causing an outage for a critical service The engineer opens the vulnerability protection profile to add the exception, but the Threat ID is missing.

Which action is the most operationally efficient for the security engineer to find and implement the exception?



Answer : D


Question 3

A network engineer troubleshoots a VPN Phase 2 mismatch and decides that PFS (Perfect Forward Secrecy) needs to be enabled. What action should the engineer take?



Answer : B


Question 4

Review the screenshots.

What is the most likely reason for this decryption error log?



Answer : D


Question 5

An administrator needs to validate that policies that will be deployed will match the appropriate rules in the device-group hierarchy. Which tool can the administrator use to review the policy creation logic and verify that unwanted traffic is not allowed?



Answer : C

The Test Policy Match tool in Palo Alto Networks' management systems (such as Panorama or the firewall interface) allows administrators to simulate traffic against configured security policies. This tool is critical for ensuring that the correct policies are applied to specific traffic patterns and that no unintended access is granted.

Key Points:

Test Policy Match enables you to input parameters like source IP, destination IP, application, user, and more, and the system will determine which policy would apply.

It is especially useful for verifying the device-group hierarchy in multi-tenant or Panorama-managed environments, ensuring that inherited or overridden rules are correctly applied.

The tool also helps to proactively check that traffic will be blocked or allowed as intended, reducing misconfigurations and preventing unwanted traffic.

Why not the other options?

A . Preview Changes: This feature is used to review configuration changes before committing them but does not simulate or validate policy matches.

B . Managed Devices Health: This option is related to checking the health and connectivity status of managed devices, not policies.

D . Policy Optimizer: This tool is used to refine existing security policies by identifying overly permissive rules or unused objects, not for testing specific traffic matches.

The Test Policy Match tool is the most appropriate choice for the scenario described.


Question 6

What action does a firewall take when a Decryption profile allows unsupported modes and unsupported traffic with TLS 1.2 protocol traverses the firewall?



Answer : C


Question 7

A standalone firewall with local objects and policies needs to be migrated into Panoram

a. What procedure should you use so Panorama is fully managing the firewall?



Answer : C


Page:    1 / 14   
Total 294 questions