Which mechanism is used to trigger a High Availability (HA) failover if a firewall interface goes down?
A. Link Monitoring
B. Heartbeat Polling
C. Preemption
D. SNMP Polling
Answer: A
How is the Forward Untrust Certificate used?
A. It issues certificates encountered on the Untrust security zone.
B. It is used for Captive Portal to identify unknown users.
C. It is used when web servers request a client certificate.
D. It is the issuer for an external certificate which is not trusted by the firewall.
Answer: D
Sunday, 9 February 2020
Monday, 30 September 2019
Palo Alto Networks PCNSE6 Questions Answers
After pushing a security policy from Panorama to a PA-3020 firewall, the firewall administrator notices that traffic logs from the PA-3020 are not appearing in Panorama's traffic logs. What could be the problem?
A. The firewall is not licensed for logging to this Panorama device.
B. Panorama is not licensed to receive logs from this particular firewall.
C. None of the firewall's policies have been assigned a Log Forwarding profile.
D. A Server Profile has not been configured for logging to this Panorama device.
Answer: C
Palo Alto Networks maintains a dynamic database of malicious domains. Which two Security Platform components use this database to prevent threats? Choose 2 answers
A. Brute-force signatures
B. DNS-based command-and-control signatures
C. PAN-DB URL Filtering
D. BrightCloud URL Filtering
Answer: BC
A. The firewall is not licensed for logging to this Panorama device.
B. Panorama is not licensed to receive logs from this particular firewall.
C. None of the firewall's policies have been assigned a Log Forwarding profile.
D. A Server Profile has not been configured for logging to this Panorama device.
Answer: C
Palo Alto Networks maintains a dynamic database of malicious domains. Which two Security Platform components use this database to prevent threats? Choose 2 answers
A. Brute-force signatures
B. DNS-based command-and-control signatures
C. PAN-DB URL Filtering
D. BrightCloud URL Filtering
Answer: BC
Friday, 28 December 2018
Palo Alto Networks PCNSE6 Questions Answers
A firewall is being attacked with a port scan. Which component can prevent this attack?
A. DoS Protection
B. Anti-Spyware
C. Vulnerability Protection
D. Zone Protection
Answer: D
Which two interface types can be used when configuring GlobalProtect Portal? Choose 2 answers
A. Virtual Wire
B. Loopback
C. Tunnel
D. Layer3
Answer: BD
A. DoS Protection
B. Anti-Spyware
C. Vulnerability Protection
D. Zone Protection
Answer: D
Which two interface types can be used when configuring GlobalProtect Portal? Choose 2 answers
A. Virtual Wire
B. Loopback
C. Tunnel
D. Layer3
Answer: BD
Sunday, 25 February 2018
What to Expect From Palo Alto Networks’ Q2 Earnings
The cybersecurity market will be enlarged this year, according to Gartner estimates. The research and advisory firm forecasts that spending on global corporate cybersecurity will increase by 8% this year to $ 96.3 billion as organizations improve their defenses against ever-evolving threats.
This sets the stage for Palo Alto Networks (NYSE: PANW) to maintain its impressive momentum in 2018 and beyond. The cybersecurity specialist executed a remarkable change after a difficult start last year, registering a large growth of customers thanks to a new sales strategy. Investors will wait for the company to extend its term with the help of a strong demonstration in its next fiscal report for the second quarter, on February 26. But can Palo Alto deliver again? We'll see.
The numbers of holders
Wall Street analysts expect Palo Alto to report adjusted earnings of $ 0.79 per share for the quarter in revenue of $ 524.75 million. This is in line with the guide issued by the company in November of last year.
However, Palo Alto could exceed expectations due to recent product updates and partnerships. For example, it updated its endpoint protection service Traps towards the end of the first quarter, adding ransomware protection to take advantage of one of the hottest cybersecurity trends.
It is estimated that ransomware attacks cost organizations more than $ 5 billion last year, according to Palo Alto, 15 times the losses caused by these attacks in 2015. So Palo Alto made a smart move by equipping his platform security with ransomware protection based on behavior that can prevent known and unknown attacks.
In addition, Palo Alto expanded its cloud security service by including application protection for several Amazon Web Services (AWS) solutions. As a result, users can implement Palo Alto's cloud security offerings in different AWS solutions after this update. And the cybersecurity specialist is now supporting the protection of cloud-based email on the cloud platforms of Microsoft and Alphabet. According to MarketsandMarkets, the company pursues the lucrative cloud security market, which expects to record an annual growth rate of 25.5% in the next five years.
In general, Palo Alto seeks to go after the right niches within the cybersecurity space, which should help it maintain its long-term momentum.
The cost profile should improve
Palo Alto has been receiving more and more of its revenue from the subscription business. Subscriptions and support provided 63% of its top line in the last reported quarter, up from 58.9% in the prior year period. This reduced the company's sales and marketing expenses to 51% of revenues, a drop of 420 basis points year-on-year.
This allowed the company to increase its non-GAAP net income by 36% year-over-year to $ 69.8 million. Palo Alto's subscription revenues should continue to improve. Last quarter, its deferred revenue soared 37% to $ 1.9 billion, surpassing the 27% jump in the top line.
This means that more customers are signing subscription contracts with Palo Alto Networks since the deferred revenue refers to the amount of money that a company collects in advance for the services that will be provided at a later date. Therefore, Palo Alto's margin profile should improve, since a subscription client guarantees a constant flow of recurring revenues and reduces customer acquisition costs.
In general, investors can expect a strong performance in the second quarter of Palo Alto, and a strong guide should be the icing on the cake.
This sets the stage for Palo Alto Networks (NYSE: PANW) to maintain its impressive momentum in 2018 and beyond. The cybersecurity specialist executed a remarkable change after a difficult start last year, registering a large growth of customers thanks to a new sales strategy. Investors will wait for the company to extend its term with the help of a strong demonstration in its next fiscal report for the second quarter, on February 26. But can Palo Alto deliver again? We'll see.

The numbers of holders
Wall Street analysts expect Palo Alto to report adjusted earnings of $ 0.79 per share for the quarter in revenue of $ 524.75 million. This is in line with the guide issued by the company in November of last year.
However, Palo Alto could exceed expectations due to recent product updates and partnerships. For example, it updated its endpoint protection service Traps towards the end of the first quarter, adding ransomware protection to take advantage of one of the hottest cybersecurity trends.
It is estimated that ransomware attacks cost organizations more than $ 5 billion last year, according to Palo Alto, 15 times the losses caused by these attacks in 2015. So Palo Alto made a smart move by equipping his platform security with ransomware protection based on behavior that can prevent known and unknown attacks.
In addition, Palo Alto expanded its cloud security service by including application protection for several Amazon Web Services (AWS) solutions. As a result, users can implement Palo Alto's cloud security offerings in different AWS solutions after this update. And the cybersecurity specialist is now supporting the protection of cloud-based email on the cloud platforms of Microsoft and Alphabet. According to MarketsandMarkets, the company pursues the lucrative cloud security market, which expects to record an annual growth rate of 25.5% in the next five years.
In general, Palo Alto seeks to go after the right niches within the cybersecurity space, which should help it maintain its long-term momentum.
The cost profile should improve
Palo Alto has been receiving more and more of its revenue from the subscription business. Subscriptions and support provided 63% of its top line in the last reported quarter, up from 58.9% in the prior year period. This reduced the company's sales and marketing expenses to 51% of revenues, a drop of 420 basis points year-on-year.
This allowed the company to increase its non-GAAP net income by 36% year-over-year to $ 69.8 million. Palo Alto's subscription revenues should continue to improve. Last quarter, its deferred revenue soared 37% to $ 1.9 billion, surpassing the 27% jump in the top line.
This means that more customers are signing subscription contracts with Palo Alto Networks since the deferred revenue refers to the amount of money that a company collects in advance for the services that will be provided at a later date. Therefore, Palo Alto's margin profile should improve, since a subscription client guarantees a constant flow of recurring revenues and reduces customer acquisition costs.
In general, investors can expect a strong performance in the second quarter of Palo Alto, and a strong guide should be the icing on the cake.
Tuesday, 26 December 2017
Palo Alto Networks PCNSE6 Question Answer
Which Security Policy rule configuration option disables antivirus and anti-spyware scanning of server-to-client flows only?
A. Apply an Application Override Policy
B. Disable Server Response Inspection
C. Add server IP to Security Policy exception
D. Disable HIP Profile
Answer: B
Which two interface types provide support for network address translation (NAT)? Choose 2 answers
A. HA
B. Tap
C. Layer3
D. Virtual Wire
E. Layer2
Answer: CD
A. Apply an Application Override Policy
B. Disable Server Response Inspection
C. Add server IP to Security Policy exception
D. Disable HIP Profile
Answer: B
Which two interface types provide support for network address translation (NAT)? Choose 2 answers
A. HA
B. Tap
C. Layer3
D. Virtual Wire
E. Layer2
Answer: CD
Thursday, 9 November 2017
Palo Alto Networks PCNSE6 Question Answer
What is the maximum usable storage capacity of an M-100 appliance?
A. 2TB
B. 4TB
C. 6TB
D. STB
Answer: B
A user is reporting that they cannot download a PDF file from the internet.
Which action will show whether the downloaded file has been blocked by a Security Profile?
A. Filter the Session Browser for all sessions from the user with the application "adobe".
B. Filter the System log for "Download Failed" messages.
C. Filter the Traffic logs for all traffic from the user that resulted in a Deny action.
D. Filter the Data Filtering logs for the user's traffic and the name of the PDF file.
Answer: D
A. 2TB
B. 4TB
C. 6TB
D. STB
Answer: B
A user is reporting that they cannot download a PDF file from the internet.
Which action will show whether the downloaded file has been blocked by a Security Profile?
A. Filter the Session Browser for all sessions from the user with the application "adobe".
B. Filter the System log for "Download Failed" messages.
C. Filter the Traffic logs for all traffic from the user that resulted in a Deny action.
D. Filter the Data Filtering logs for the user's traffic and the name of the PDF file.
Answer: D
Wednesday, 13 September 2017
Palo Alto Networks PCNSE6 Question Answer
What can cause missing SSL packets when performing a packet capture on data plane interfaces?
A. There is a hardware problem with the offloading FPGA on the management plane.
B. The missing packets are offloaded to the management plane CPU.
C. The packets are hardware offloaded to the offload processor on the data plane.
D. The packets are not captured because they are encrypted.
Answer: C
A company has a policy that denies all applications they classify as bad and permits only applications they classify as good. The firewall administrator created the
following security policy on the company s firewall:
Which two benefits are gained from having both rule 2 and rule 3 present? Choose 2 answers
A. Different security profiles can be applied to traffic matching rules 2 and 3.
B. Separate Log Forwarding profiles can be applied to rules 2 and 3.
C. Rule 2 denies traffic flowing across different TCP and UDP ports than rule 3.
D. A report can be created that identifies unclassified traffic on the network.
Answer: AD
A. There is a hardware problem with the offloading FPGA on the management plane.
B. The missing packets are offloaded to the management plane CPU.
C. The packets are hardware offloaded to the offload processor on the data plane.
D. The packets are not captured because they are encrypted.
Answer: C
A company has a policy that denies all applications they classify as bad and permits only applications they classify as good. The firewall administrator created the
following security policy on the company s firewall:

Which two benefits are gained from having both rule 2 and rule 3 present? Choose 2 answers
A. Different security profiles can be applied to traffic matching rules 2 and 3.
B. Separate Log Forwarding profiles can be applied to rules 2 and 3.
C. Rule 2 denies traffic flowing across different TCP and UDP ports than rule 3.
D. A report can be created that identifies unclassified traffic on the network.
Answer: AD
Subscribe to:
Posts (Atom)