PCNSE7 Exam Questions - Online Test


PCNSE7 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Proper study guides for PCNSE7 Palo Alto Networks Certified Network Security Engineer certified begins with preparation products which designed to deliver the by making you pass the PCNSE7 test at your first time. Try the free right now.

Online Paloalto Networks PCNSE7 free dumps demo Below:

NEW QUESTION 1
Which three log-forwarding destinations require a server profile to be configured? (Choose three)

  • A. SNMP Trap
  • B. Email
  • C. RADIUS
  • D. Kerberos
  • E. Panorama
  • F. Syslog

Answer: ABF

NEW QUESTION 2
What are three possible verdicts that WildFire can provide for an analyzed sample? (Choose three)

  • A. Clean
  • B. Bengin
  • C. Adware
  • D. Suspicious
  • E. Grayware
  • F. Malware

Answer: BEF

Explanation: https://www.paloaltonetworks.com/documentation/70/pan-os/newfeaturesguide/wildfire-features/wildfire-grayware-verdict

NEW QUESTION 3
Which two logs on the firewall will contain authentication-related information useful for troubleshooting purpose (Choose two)

  • A. ms.log
  • B. traffic.log
  • C. system.log
  • D. dp-monitor.log
  • E. authd.log

Answer: CE

NEW QUESTION 4
A company has a web server behind a Palo Alto Networks next-generation firewall that it wants to make accessible to the public at 1.1.1.1. The company has decided to configure a destination NAT Policy rule.
Given the following zone information:
•DMZ zone: DMZ-L3
•Public zone: Untrust-L3
•Guest zone: Guest-L3
•Web server zone: Trust-L3
•Public IP address (Untrust-L3): 1.1.1.1
•Private IP address (Trust-L3): 192.168.1.50
What should be configured as the destination zone on the Original Packet tab of NAT Policy rule?

  • A. Untrust-L3
  • B. DMZ-L3
  • C. Guest-L3
  • D. Trust-L3

Answer: A

NEW QUESTION 5
Which two methods can be used to mitigate resource exhaustion of an application server? (Choose two)

  • A. Vulnerability Object
  • B. DoS Protection Profile
  • C. Data Filtering Profile
  • D. Zone Protection Profile

Answer: BD

NEW QUESTION 6
Which CLI command displays the current management plan memory utilization?

  • A. > show system info
  • B. > show system resources
  • C. > debug management-server show
  • D. > show running resource-monitor

Answer: B

Explanation: https://live.paloaltonetworks.com/t5/Management-Articles/Show-System-Resource-Command-Displays-CPU-Utilization-of-9999/ta-p/58149

NEW QUESTION 7
A firewall administrator is troubleshooting problems with traffic passing through the Palo Alto Networks firewall. Which method shows the global counters associated with the traffic after configuring the appropriate packet filters?

  • A. From the CLI, issue the show counter global filter pcap yes command.
  • B. From the CLI, issue the show counter global filter packet-filter yes command.
  • C. From the GUI, select show global counters under the monitor tab.
  • D. From the CLI, issue the show counter interface command for the ingress interface.

Answer: B

NEW QUESTION 8
An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall.
Which priority is correct for the passive firewall?

  • A. 99
  • B. 1
  • C. 255

Answer:

NEW QUESTION 9
Which CLI command displays the current management plane memory utilization?

  • A. > debug management-server show
  • B. > show running resource-monitor
  • C. > show system info
  • D. > show system resources

Answer: D

Explanation: https://live.paloaltonetworks.com/t5/Learning-Articles/How-to-Interpret-show-system-resources/ta-p/59364
"The command show system resources gives a snapshot of Management Plane (MP) resource utilization including memory and CPU. This is similar to the ‘top’ command in Linux."https://live.paloaltonetworks.com/t5/Learning-Articles/How-to-Interpret-show-system-resources/ta-p/59364

NEW QUESTION 10
When a malware-infected host attempts to resolve a known command-and-control server, the traffic matches a security policy with DNS sinhole enabled, generating a traffic log.
What will be the destination IP Address in that log entry?

  • A. The IP Address of sinkhole.paloaltonetworks.com
  • B. The IP Address of the command-and-control server
  • C. The IP Address specified in the sinkhole configuration
  • D. The IP Address of one of the external DNS servers identified in the anti-spyware database

Answer: C

Explanation: https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Verify-DNS-Sinkhole-Function-is-Working/ta-p/65864

NEW QUESTION 11
Which Public Key infrastructure component is used to authenticate users for GlobalProtect when the Connect Method is set to pre-logon?

  • A. Certificate revocation list
  • B. Trusted root certificate
  • C. Machine certificate
  • D. Online Certificate Status Protocol

Answer: C

NEW QUESTION 12
Which method does an administrator use to integrate all non-native MFA platforms in PAN- OS® software?

  • A. Okta
  • B. DUO
  • C. RADIUS
  • D. PingID

Answer: C

NEW QUESTION 13
A firewall administrator has completed most of the steps required to provision a standalone Palo Alto Networks Next-Generation Firewall. As a final step, the administrator wants to test one of the security policies.
Which CLI command syntax will display the rule that matches the test?

  • A. test security -policy- match source <ip_address> destination <IP_address> destination port <port number> protocol <protocol number
  • B. show security rule source <ip_address> destination <IP_address> destination port <portnumber> protocol <protocol number>
  • C. test security rule source <ip_address> destination <IP_address> destination port <port number> protocol <protocol number>
  • D. show security-policy-match source <ip_address> destination <IP_address> destination port <port number> protocol <protocol number>test security-policy-match source

Answer: A

Explanation: test security-policy-match source <source IP> destination <destination IP> protocol <protocol number>
https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Test-Which-Security- Policy-Applies-to-a-Traffic-Flow/ta-p/53693

NEW QUESTION 14
Which three fields can be included in a pcap filter? (Choose three)

  • A. Egress interface
  • B. Source IP
  • C. Rule number
  • D. Destination IP
  • E. Ingress interface

Answer: BCD

Explanation: (https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta- p/72069)

NEW QUESTION 15
A network security engineer is asked to provide a report on bandwidth usage. Which tab in the ACC provides the information needed to create the report?

  • A. Blocked Activity
  • B. Bandwidth Activity
  • C. Threat Activity
  • D. Network Activity

Answer: D

NEW QUESTION 16
An administrator needs to upgrade a Palo Alto Networks NGFW to the most current version of PAN-OS® software. The firewall has internet connectivity through an Ethernet interface, but no internet connectivity from the management interface. The Security policy has the default security rules and a rule that allows all web-browsing traffic from any to any zone.
What must the administrator configure so that the PAN-OS® software can be upgraded?

  • A. Security policy rule
  • B. CRL
  • C. Service route
  • D. Scheduler

Answer: A

Recommend!! Get the Full PCNSE7 dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/PCNSE7-exam-dumps.html (New 176 Q&As Version)