exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 231 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 231
Topic #: 1
[All PCNSE Questions]

An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted information Security to look for more controls that can secure access to critical assets. For users that need to access these systems, Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MFA.
What should the enterprise do to use PAN-OS MFA?

  • A. Use a Credential Phishing agent to detect, prevent, and mitigate credential phishing campaigns.
  • B. Create an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy.
  • C. Configure a Captive Portal authentication policy that uses an authentication sequence.
  • D. Configure a Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
homersimpson
Highly Voted 3 years ago
FYI in 10.0 onward, "Captive Portal" is now called "Authentication Portal".
upvoted 9 times
...
JRKhan
Highly Voted 1 year ago
Selected Answer: B
B is correct. Given the authentication using AD is already in place, we can safely assume that LDAP server profile is already in use. The MFA will be used as an additional/second authentication factor. Also, the question refers to PAN-OS MFA so it is again safe to assume it will use PAN-OS directly integrated vendors instead of using one through RADIUS.
upvoted 8 times
jeremykebir
6 months, 3 weeks ago
Abolutely right!
upvoted 1 times
...
...
Nicoara
Most Recent 5 months, 1 week ago
I believe is C. because the authentication sequence can include multiple authentication methods, which is essential for implementing MFA.
upvoted 1 times
443Annny
3 weeks, 3 days ago
An authentication sequence is used for only one authentication. If the first profile matches the user's credentials, a second profile will not be checked
upvoted 1 times
...
...
Whizdhum
1 year, 1 month ago
Answer is D. To use MFA for protecting sensitive information, you must configure an Authentication Portal (Captive Portal) to display a web form. To enable additional factors, you can integrate with MFA vendors through RADIUS or vendor APIs. In most cases, and external service is recommended for the first authentication factor.
upvoted 1 times
...
Eiffelsturm
1 year, 1 month ago
Selected Answer: D
B and C are the same except that B offers more options for the authentication factors in the authentication profile. "Add a RADIUS server profile. This is required if the firewall integrates with an MFA vendor through RADIUS" since D is more granular, I go for D
upvoted 1 times
Gabranch
1 year, 1 month ago
I feel like RADIUS is the work-around for those MFA solutions that don't natively integrate with PAN-OS. And the question asks about PAN-OS MFA Integration. That's why I think C over B.
upvoted 2 times
...
...
gc999
1 year, 2 months ago
Selected Answer: D
Would the keyword here is "PAN-OS MFA"? I see the word from the following UR "For remote user authentication to GlobalProtect portals or gateways or for administrator authentication to the PAN-OS or Panorama web interface, you can only use MFA vendors supported through RADIUS or SAML" https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi-factor-authentication#:~:text=you%20can%20only%20use%20MFA%20vendors%20supported%20through%20RADIUS%20or%20SAML
upvoted 2 times
...
josephrahul
1 year, 6 months ago
Option D To use Multi-Factor Authentication (MFA) for protecting sensitive services and applications, you must configure Authentication Portal to display a web form for the first authentication factor and to record Authentication Timestamps. The firewall uses the timestamps to evaluate the timeouts for Authentication Policy rules. To enable additional authentication factors, you can integrate the firewall with MFA vendors through RADIUS or vendor APIs.
upvoted 1 times
...
dgonz
1 year, 6 months ago
Selected Answer: B
i think B is closer
upvoted 2 times
...
Techn
1 year, 6 months ago
Selected Answer: D
For end-user authentication via the Authentication policy, the firewall directly integrates with several MFA platforms (such as Duo v2, Okta Adaptive, PingID, and RSA SecurID) and integrates through RADIUS with other MFA platforms.
upvoted 1 times
...
ericli87
1 year, 9 months ago
did anyone see this in the exam?
upvoted 6 times
...
Pochex
1 year, 10 months ago
Answer B When we use PANOS MFA, the user will first authenticate with the authentication profile configured (Radius, SAML, Kerberos, TACACS+, LDAP), then an additional factor is configured in the same authentication profile, this factor is the MFA which is used by the Captive Portal.
upvoted 4 times
...
Frightened_Acrobat
1 year, 10 months ago
Selected Answer: B
B and D are both wrong -Authentication policies reference Authentication Enforcement policies directly, not Authentication profiles. However, if one of them has to be right, it's B. D is less right since RADIUS isn't the only MFA option.
upvoted 5 times
magicbr3
1 year ago
The Captive portal can reference the RADIUS profile and you configure MFA in the captive portal
upvoted 1 times
...
...
mohr22
1 year, 11 months ago
D To use Multi-Factor Authentication (MFA) for protecting sensitive services and applications, you must configure Authentication Portal to display a web form for the first authentication factor and to record Authentication Timestamps. The firewall uses the timestamps to evaluate the timeouts for Authentication Policy rules. To enable additional authentication factors, you can integrate the firewall with MFA vendors through RADIUS or vendor APIs.
upvoted 1 times
...
TAKUM1y
2 years, 1 month ago
Selected Answer: D
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi-factor-authentication
upvoted 6 times
...
scally
2 years, 4 months ago
To use Multi-Factor Authentication (MFA) for protecting sensitive services and applications, you must configure Captive Portal to display a web form for the first authentication factor and to record Authentication Timestamps. The firewall uses the timestamps to evaluate the timeouts for Authentication Policy rules. To enable additional authentication factors, you can integrate the firewall with MFA vendors through RADIUS or vendor APIs. After evaluating Authentication policy, the firewall evaluates Security policy, so you must configure rules for both policy types.
upvoted 3 times
...
UFanat
2 years, 7 months ago
Selected Answer: B
You should create an auth profile and use it in captive protal auth policy.
upvoted 4 times
...
Marcyy
3 years, 1 month ago
D sounds the most correct from this line in the link. To use Multi-Factor Authentication (MFA) for protecting sensitive services and applications, you must configure Captive Portal to display a web form for the first authentication factor and to record Authentication Timestamps. The firewall uses the timestamps to evaluate the timeouts for Authentication Policy rules. To enable additional authentication factors, you can integrate the firewall with MFA vendors through RADIUS or vendor APIs. After evaluating Authentication policy, the firewall evaluates Security policy, so you must configure rules for both policy types.
upvoted 3 times
homersimpson
3 years ago
I think it's B, because with D you are referencing Radius, which doesn't necessarily imply you're using another factor. With B, you might not have had an auth profile already (since you don't need one with user/pwd auth) so you would be creating one, and you would assign another factor in it. FWIW, this question is poorly worded.
upvoted 11 times
Shenanigans123
2 years, 9 months ago
I agree with this. Also, D says the Authentication Profile should reference a RADIUS server profile - this would make the primary auth method RADIUS, whereas the question states they want to use AD groups as the primary method, so the profile should use LDAP as the first factor, then add MFA as a second factor. D also does not mention any additional factor. B covers all requirements.
upvoted 3 times
Gngogh
2 years, 3 months ago
I just want to highlight that you don't have to use LDAP as first authentication method to be able to retrieve the user groups. In fact, in many deployments RADIUS server queries the AD server for user authentication. Then the firewall if properly configured will do the group mappings. Regardless I also believe the correct answer is B, because has already mentioned it covers all use cases.
upvoted 1 times
...
...
GivemeMoney
2 years, 12 months ago
Radius is one option, not "Thee" option, It's B.
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago