exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 27 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 27
Topic #: 1
[All PCNSE Questions]

In the image, what caused the commit warning?

  • A. The CA certificate for FWDtrust has not been imported into the firewall.
  • B. The FWDtrust certificate has not been flagged as Trusted Root CA.
  • C. SSL Forward Proxy requires a public certificate to be imported into the firewall.
  • D. The FWDtrust certificate does not have a certificate chain.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AdamLolzSmith
Highly Voted 3 years, 8 months ago
Option A. The FWDtrust is a CA certificate type capable of signing other certificates. That means either it's a Root Certificate or Intermediate certificate. If it was a Root Certificate, then you wouldn't get that warning. That means the certificate is an intermediate and you need to import its Root Certificate.
upvoted 18 times
Prutser2
3 years, 6 months ago
correct, in addition, the CA for FWDtrust is some LAB CA, says it under issuer, so definitely not root
upvoted 2 times
...
...
CarlosDV06
Most Recent 1 week, 1 day ago
Selected Answer: A
If you look at the subject, you will see that there's another certificate which signs the FWDtrust. In fact, it is not a self signed certificate because of that statement, so D is ambigous compared to A, because the FWDtrust does has a certificate chain, just that it's not -imported- into the fw.
upvoted 2 times
...
eca4765
1 week, 2 days ago
Selected Answer: A
Look at Usage Tab, we are missing Root CA, First cert is used as Forward Trust and 2nd one is used for Forward untrust
upvoted 1 times
...
evdw
2 weeks, 1 day ago
Selected Answer: D
Subject CN and issuer CN are different, therefore this certificate is signed by someone else and need to be present in order to complete the chain
upvoted 1 times
...
j4v13rh4ack
1 month, 3 weeks ago
Selected Answer: D
D is the answer because the image show us the CA and Key checkboxes, telling us that is a self signed Root CA without a certificate, in other words without a chain and according to warning show in screen.
upvoted 2 times
...
hcir
7 months, 1 week ago
D is the answer. It is a simple warning that states that there is no chain
upvoted 2 times
Forces12
3 months, 3 weeks ago
D here aslo, FWDtrust cert has been imported but the firewall could not verify it and asks for the Cert Chain (import either Root or Intermediate that validates FWDtrust)
upvoted 1 times
...
...
JRKhan
1 year ago
Selected Answer: A
Under issuer, it tells us which root CA signed the FWDTrust certificate. Correct answer is A. FWDTrust needs to be a CA (intermediate in this case) in order for it to be able to sign the server certs so that clients accessing an external server or website can tell if the firewall trusts those server certs or not.
upvoted 1 times
...
Micutzu
1 year, 3 months ago
Selected Answer: B
I think the correct answer is B.
upvoted 1 times
...
Micutzu
1 year, 3 months ago
I think the correct answer is B.
upvoted 1 times
...
455_qq
2 years, 5 months ago
Option A.
upvoted 1 times
...
Jared28
2 years, 9 months ago
Selected Answer: A
A - Tested in lab
upvoted 3 times
...
unknid
2 years, 11 months ago
Selected Answer: A
A. because FWDtrust has a chain but it's not present in the firewall.
upvoted 1 times
...
Kane002
3 years, 1 month ago
D. The problem, as it says itself, is that it does not have a complete chain of trust. The solution would be to add in any intermediate CAs that the NGFW doesn't have as root CAs to restore the chain, but the problem is the chain.
upvoted 2 times
myname_1
2 years, 1 month ago
D is ambiguous. D is saying that there is no certificate chain for that cert, but there is because the issuer for the FWDTrust is not the same CN as the subject of FWDTrust
upvoted 1 times
...
...
Biz90
3 years, 2 months ago
Hi Team to add It is A as other users have done I tested this as well. If you're using an External/Internal PK, you need to ensure to import the Root CA, in which once you create, generate your CSR, and reimport the Trust cert into the Firewall. The Turst cert should fall into the COC. If this was a self-signed cert (as I have also labbed) you can simple have that on the FW without a COC.
upvoted 2 times
...
FS68
3 years, 3 months ago
A. because FWDtrust has a chain but it's not present in the firewall.
upvoted 2 times
...
bluejl
3 years, 6 months ago
A. Tested in lab.
upvoted 3 times
...
Joey456
3 years, 8 months ago
A: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago