exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 220 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 220
Topic #: 1
[All PCNSE Questions]

In a firewall, which three decryption methods are valid? (Choose three.)

  • A. SSL Outbound Proxyless Inspection
  • B. SSL Inbound Inspection
  • C. SSH Proxy
  • D. SSL Inbound Proxy
  • E. Decryption Mirror
Show Suggested Answer Hide Answer
Suggested Answer: BCE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Marcyy
Highly Voted 3 years, 1 month ago
BCE is correct.
upvoted 7 times
...
CarlosDV06
Most Recent 2 months, 3 weeks ago
Selected Answer: BCE
Tricky question. Memorize this: you have three types of decryption actions 1. SSL Forward Proxy (acts as a proxy between the client and the server, so the client's certificate and the fw cert mus be the same). 2. SSL Inbound Inspection (for your servers exposed to the internet, the fw acts as if it were the server, so you import the server's cert and its private key). 3. SSH Proxy for SSH and SSH Tunnel (this last should be blocked as a BP). Besides, you can also forward decrypted traffic to an external appliance through decryption mirror, so you would need to ask for a license in the csp and configure your fw to send the clear text traffic to your appliance. A says "ssl outbound PROXYLESS..." so it basically results in completely the opposite of that ssl forward proxy does lmao. Kind of the same with D since you act as the server, meaning you could be "proxying" the session but thats not how it's called by PANW.
upvoted 2 times
...
123XYZT
7 months, 3 weeks ago
BCE The firewall provides three types of Decryption policy rules: SSL Forward Proxy to control outbound SSL traffic, SSL Inbound Inspection to control inbound SSL traffic, and SSH Proxy to control tunneled SSH traffic. You can attach a Decryption profile to a policy rule to apply granular access settings to traffic, such as checks for server certificates, unsupported modes, and failures. You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.
upvoted 1 times
...
Chiquitabandita
11 months, 4 weeks ago
this answer conflicts with 189 on this list, decryption mirroring is counted as a rule profile or not? You can also use a Decryption policy rule to define Decryption Mirroring. On this question it is an answer and on 189 is not.
upvoted 1 times
...
Sammy3637
1 year, 1 month ago
Selected Answer: BCE
Nothing exist as A&B , leaves us with options BCE
upvoted 1 times
...
DenskyDen
2 years ago
BCE. The firewall provides three types of Decryption policy rules: SSL Forward Proxy to control outbound SSL traffic, SSL Inbound Inspection to control inbound SSL traffic, and SSH Proxy to control tunneled SSH traffic. You can attach a Decryption profile to a policy rule to apply granular access settings to traffic, such as checks for server certificates, unsupported modes, and failures. You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving.
upvoted 2 times
...
TAKUM1y
2 years, 3 months ago
Selected Answer: BCE
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/decryption-overview
upvoted 3 times
...
UFanat
2 years, 7 months ago
Selected Answer: BCE
BCE correct
upvoted 2 times
...
K5000ism
3 years ago
Selected Answer: BCE
SSL Forward Proxy SSL Inbound Inspection. SSH Proxy You can also use Decryption Mirroring to forward decrypted traffic as plaintext to a third party solution for additional analysis and archiving. Ref: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-overview.html#idd71f8b4d-cd40-4c6c-905f-2f8c7fca6537
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago