exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 568 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 568
Topic #: 1
[All PCNSE Questions]

An organization wants to begin decrypting guest and BYOD traffic.

Which NGFW feature can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted?

  • A. Authentication Portal
  • B. SSL Decryption profile
  • C. SSL decryption policy
  • D. comfort pages
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
betko
Highly Voted 7 months ago
This question was on exam in June 24.
upvoted 5 times
...
corpguy
Most Recent 1 week, 2 days ago
Selected Answer: D
See hifire’s explanation, it’s could be A or D both use half of the correct name.
upvoted 1 times
...
hifire
3 months, 1 week ago
Selected Answer: D
It is D because you can modify the authentication portal page in the response page section: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/device/device-response-pages Authentication Portal Comfort Page The firewall displays this page so that users can enter login credentials to access services that are subject to Authentication policy rules (see Policies > Authentication). Enter a message that tells users how to respond to this authentication challenge. The firewall authenticates users based on the Authentication Profile specified in the authentication enforcement object assigned to an Authentication rule (see Objects > Authentication). You can display unique authentication instructions for each Authentication rule by entering a Message in the associated authentication enforcement object. The message defined in the object overrides the message defined in the Authentication Portal Comfort Page.
upvoted 1 times
...
ATRRHMN
6 months ago
Selected Answer: A
https://docs.paloaltonetworks.com/content/techdocs/en_US/best-practices/10-2/decryption-best-practices/decryption-best-practices/plan-ssl-decryption-best-practice-deployment.html Note: "Enterprises don’t control BYOD devices. If you allow BYOD devices on your network, decrypt their traffic and subject it to the same Security policy that you apply to other network traffic. To do this, redirect BYOD users through an Authentication Portal, instruct them how to download and install the CA certificate, and clearly notify users that their traffic will be decrypted. Educate BYOD users about the process and include it in your company’s privacy and computer usage policy."
upvoted 2 times
...
betko
7 months ago
Selected Answer: A
A portal
upvoted 2 times
...
nolox
7 months, 1 week ago
Selected Answer: A
Look at 90fa8d0's link.
upvoted 2 times
...
MostafaNawar
9 months ago
Selected Answer: A
A, An authentication portal is a feature that can be used to identify guests and BYOD users, instruct them how to download and install the CA certificate, and clearly notify them that their traffic will be decrypted. An authentication portal is a web page that the firewall displays to users who need to authenticate before accessing the network or the internet.
upvoted 2 times
...
findkeywordcommand
9 months, 2 weeks ago
https://docs.paloaltonetworks.com/best-practices/10-2/decryption-best-practices/decryption-best-practices/plan-ssl-decryption-best-practice-deployment "Enterprises don’t control BYOD devices. If you allow BYOD devices on your network, decrypt their traffic and subject it to the same Security policy that you apply to other network traffic. To do this, redirect BYOD users through an Authentication Portal..."
upvoted 2 times
...
babujiju
10 months, 1 week ago
Selected Answer: A
A. Authentication profile
upvoted 2 times
...
evilCorpBot7494
10 months, 3 weeks ago
Selected Answer: A
As TeachTrooper says, Comfort Pages will do the instruct and notify part, but not the identification. Authentication Portals can do all of those things.
upvoted 3 times
...
TeachTrooper
11 months, 3 weeks ago
Selected Answer: A
Voting for A, the question is not only about instructions on how to trust the CA, but also which features enables to identify BYOD users/devices. Comfort pages to not identify users, authentication portals do.
upvoted 2 times
scanossa
11 months ago
About comfort pages: "The firewall displays this page so that users can enter login credentials to access services that are subject to Authentication policy rules"
upvoted 2 times
...
...
omgt2k2
11 months, 3 weeks ago
Selected Answer: A
Enterprises don’t control BYOD devices. If you allow BYOD devices on your network, decrypt their traffic and subject it to the same Security policy that you apply to other network traffic. To do this, redirect BYOD users through an Authentication Portal, instruct them how to download and install the CA certificate, and clearly notify users that their traffic will be decrypted. Educate BYOD users about the process and include it in your company’s privacy and computer usage policy.
upvoted 2 times
...
90fa8d0
1 year ago
Selected Answer: A
A. Authentication profile https://docs.paloaltonetworks.com/best-practices/10-2/decryption-best-practices/decryption-best-practices/plan-ssl-decryption-best-practice-deployment
upvoted 2 times
...
Sammy3637
1 year ago
Enterprises don’t control BYOD devices. If you allow BYOD devices on your network, decrypt their traffic and subject it to the same Security policy that you apply to other network traffic. To do this, redirect BYOD users through a captive portal, instruct them how to download and install the CA certificate, and clearly notify users that their traffic will be decrypted. Educate BYOD users about the process and include it in your company’s privacy and computer usage policy.
upvoted 1 times
Sammy3637
1 year ago
now it's called captive portal
upvoted 1 times
...
...
skullomania
1 year, 1 month ago
Selected Answer: A
This question is a bit tricky because in order to prompt the comfort page (D) you need to configure the authentication portal (A). I would say answer is A because question ask to identify users moreover instruct them and notify them about their traffic being decrypted. You need to configure the authentication portal in order to identify users and prompt the comfort page.
upvoted 3 times
Sammy3637
1 year ago
You cannot notify a user with Authentication portal ! Answer should be D)Comfort pages
upvoted 1 times
nebulanerd
6 months, 3 weeks ago
You can modify the information of the authentication page my friend!
upvoted 1 times
...
...
...
piipo
1 year, 2 months ago
Selected Answer: D
Comfort Page
upvoted 2 times
nebulanerd
6 months, 3 weeks ago
No! That's not D!
upvoted 1 times
...
...
Micutzu
1 year, 2 months ago
Selected Answer: D
Captive Portal Comfort Page
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago