exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 56 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 56
Topic #: 1
[All PCNSE Questions]

An administrator creates an SSL decryption rule decrypting traffic on all ports. The administrator also creates a Security policy rule allowing only the applications
DNS, SSL, and web-browsing.
The administrator generates three encrypted BitTorrent connections and checks the Traffic logs. There are three entries. The first entry shows traffic dropped as application Unknown. The next two entries show traffic allowed as application SSL.
Which action will stop the second and subsequent encrypted BitTorrent connections from being allowed as SSL?

  • A. Create a decryption rule matching the encrypted BitTorrent traffic with action ג€No-Decrypt,ג€ and place the rule at the top of the Decryption policy.
  • B. Create a Security policy rule that matches application ג€encrypted BitTorrentג€ and place the rule at the top of the Security policy.
  • C. Disable the exclude cache option for the firewall.
  • D. Create a Decryption Profile to block traffic using unsupported cyphers, and attach the profile to the decryption rule.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ChiaPet75
Highly Voted 4 years, 8 months ago
D is Correct There is no application called "encrypted BitTorrent" so "B" is not the correct answer. If the application was just "BitTorrent" then "B" would be correct. "A" would not work either since you would still need to create a Decryption Profile which is not mentioned. "D" is the most complete answer which is to create the Decryption Profile and attach it to the Decryption rule. I found a PaloAlto KB article about blocking Tor traffic using a Decryption Profile that is blocking Unsupported cipher's, expired certificates, etc. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRtCAK
upvoted 21 times
...
lol1000
Highly Voted 4 years, 3 months ago
D is the least wrong
upvoted 10 times
davedrangus
6 months ago
I love this response lol. Most of the answers can be defined this way.
upvoted 2 times
...
...
62c930f
Most Recent 1 week, 2 days ago
Selected Answer: D
Answer is D. I believe what happened here is the firewall attempted to decrypt the traffic, but this resulted in a decryption error, causing the session to be dropped, and the URL was placed in the SSL Devryption Exlcusion cache automagically to prevent the issue from happening again. The next time, the packet was not decrypted due to being in the exclusion cache, and was then marked as SSL. Blocking connections with unsupported ciphers would prevent this traffic from making it out
upvoted 1 times
...
hcir
8 months, 1 week ago
for some reason, the first bittorrent connection was not recognised by app-id as neither dns, ssl nor http. Hence, it was dropped. The other 2 were ssl, and they were not decrypted, so they went through. Because decryption was supposed to decrypt everything, the only reason it was not decrypted can only be related to decryption cypher suite incompatibility. Hence, the answer is D.
upvoted 6 times
...
Marshpillowz
1 year, 1 month ago
Selected Answer: D
D appears to be correct
upvoted 1 times
...
JRKhan
1 year, 1 month ago
Selected Answer: D
Most suitable answer is D. The firewall couldnt decrypt the traffic probably because of the use of unsupported ciphers hence the reason in subsequent packets the application is identified as SSL. If the firewall was able to decrypt the traffic, even if it couldnt identify the application it would mark the traffic as web-browsing and not SSL.
upvoted 2 times
...
ThelioNN
1 year, 9 months ago
Guys, why not A. Seems correct, the FW will leave the bittorrent as bittorrent and block it. Instead of decrypting it. Are we sure the Bittorrent crypto is going to use unsupported ciphers (as that can easily be fixed from the developers)?
upvoted 2 times
FaheemParakkot
1 year, 5 months ago
As per the question, the first packet is identified as UnKnown Application. Which means, even if you created a rule for BitTorrent, it wont match.
upvoted 1 times
...
...
Kjohnsting
2 years ago
Don't love this kind of question. Seems incomplete.
upvoted 4 times
...
UFanat
2 years, 8 months ago
Selected Answer: D
D - correct. You need to fix decryption options, not security policy rule.
upvoted 2 times
...
AbuHussain
2 years, 11 months ago
Selected Answer: D
answer is D
upvoted 2 times
...
Gabuu
3 years ago
D is correct
upvoted 2 times
...
Kane002
3 years, 3 months ago
The administrator has created a decryption policy, but bittorrent is slipping past it, only being detected as "ssl", so the admin needs to create a decryption profile to block the evasive behavior, probably bittorrent is using an unsupported cipher, hence the decryption policy failure. D.
upvoted 4 times
...
Zabol
3 years, 8 months ago
I think it is D, App-ID doesn't have Encrypted-Bittorent
upvoted 1 times
...
trashboat
3 years, 9 months ago
D is correct: B is not correct because the reason the two other sessions are showing allowed as SSL is because they are not being decrypted, otherwise they would be recognized as tor/unknown application and not allowed on the security policy rule. The likely reason for this is they are using unsupported ciphers/etc. - so the answer is D. C is not relevant. A is also not correct because the goal is to decrypt the traffic to identify it, so this is the opposite of what is trying to be accomplished.
upvoted 2 times
...
frodo1791
3 years, 10 months ago
B is not correct... as "encrypted bittorrent" doesn't exist in app-id. So I should go D...
upvoted 2 times
...
hpbdcb
4 years, 3 months ago
check https://applipedia.paloaltonetworks.com/ there is no app encrypted bittorrent. other then that the rest is clear so D.
upvoted 1 times
...
Pb1805
4 years, 8 months ago
Correct answer is D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago