exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 238 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 238
Topic #: 1
[All PCNSE Questions]

A remote administrator needs firewall access on an untrusted interface. Which two components are required on the firewall to configure certificate-based administrator authentication to the web Ul? (Choose two.)

  • A. certificate authority (CA) certificate
  • B. server certificate
  • C. client certificate
  • D. certificate profile
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Marcyy
Highly Voted 2 years, 7 months ago
Should be AD. Generate a certificate authority (CA) certificate on the firewall. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-administrative-accounts-and-authentication/configure-certificate-based-administrator-authentication-to-the-web-interface.html
upvoted 13 times
homersimpson
2 years, 6 months ago
I agree, you create a cert profile, which specifies the CA cert to use. The client certs are all signed by the CA, so this makes the fw trust them.
upvoted 3 times
duckduckgooo
1 year, 3 months ago
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-administrative-accounts-and-authentication/configure-certificate-based-administrator-authentication-to-the-web-interface
upvoted 1 times
...
...
...
443Annny
Most Recent 3 weeks, 2 days ago
Selected Answer: AD
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-administrative-accounts-and-authentication/configure-certificate-based-administrator-authentication-to-the-web-interface.html
upvoted 1 times
...
123XYZT
1 month, 2 weeks ago
A and D Steps Generate a certificate authority (CA) certificate on the firewall. Configure a certificate profile for securing access to the web interface. Configure the firewall to use the certificate profile for authenticating administrators. Configure the administrator accounts to use client certificate authentication. Generate a client certificate for each administrator. Export the client certificate. Import the client certificate into the client system of each administrator who will access the web interface.
upvoted 1 times
...
Whizdhum
7 months ago
Answers are A, D. As a more secure alternative to password-based authentication to the firewall web interface, you can configure certificate-based authentication for administrator accounts that are local to the firewall. Generate a certificate authority (CA) certificate on the firewall. You will use this CA certificate to sign the client certificate of each administrator. Configure a certificate profile for securing access to the web interface. Configure the firewall to use the certificate profile for authenticating administrators.
upvoted 1 times
...
Andromeda1800
7 months, 1 week ago
Selected Answer: AD
Question asks "required on the firewall" so it's A and D. Client certificate is required to be on the client device, not on the firewall. Firewall needs to trust client certificate which needs to be assigned by a CA that firewall trusts, therefore CA root certificate needs to be imported to firewall.
upvoted 1 times
Andromeda1800
7 months, 1 week ago
signed by a CA that firewall trusts... not assigned.
upvoted 1 times
...
...
Kalipso21
1 year, 5 months ago
In the documentation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/certificate-management/configure-an-ssltls-service-profile It says: Use only signed certificates, not CA certificates, in SSL/TLS service profiles. So I think it is C and D.
upvoted 2 times
DenskyDen
1 year, 5 months ago
you don't need client certificate on the firewall, the question includes "two components are required on the firewall" should be A and D.
upvoted 1 times
...
...
DenskyDen
1 year, 6 months ago
AD. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-administrative-accounts-and-authentication/configure-certificate-based-administrator-authentication-to-the-web-interface#id3ec24be4-3aea-4ebd-8e2c-8928ae55fe53
upvoted 1 times
...
AbuHussain
2 years, 3 months ago
Selected Answer: AD
Should be AD.
upvoted 4 times
...
RamanJoshi
2 years, 5 months ago
A and D, these two options are required on the firewall. Client certificate only needed on the client system and can be enterprise CA generated.
upvoted 1 times
...
GivemeMoney
2 years, 6 months ago
Selected Answer: AD
A. certificate authority (CA) certificate D. certificate profile
upvoted 3 times
...
drrealest
2 years, 7 months ago
this is super confusion, C is kinda valid because you generate client certs for each user and is a step in the process.
upvoted 1 times
Jared28
2 years, 3 months ago
The client cert doesn't go *on the firewall*. I think that's the key phrasing that makes AD most valid.
upvoted 2 times
Pretorian
1 year, 11 months ago
Great point, you are right...
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago