exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 79 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 79
Topic #: 1
[All PCNSE Questions]

An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port.
Which log entry can the administrator use to verify that sessions are being decrypted?

  • A. In the details of the Traffic log entries
  • B. Decryption log
  • C. Data Filtering log
  • D. In the details of the Threat log entries
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bmarks
Highly Voted 3 years, 11 months ago
PCNSE 9 is current exam content [02/2021] *** ANSWER = A *** https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClboCAC The Question is simply asking how to verify if traffic was being decrypted. There are (2) ways to see this in the traffic logs: 1. To confirm that the traffic is decrypted inside the WebGUI > Monitor > Logs > Traffic. Click the magnifying glass icon in the traffic log entries to confirm that the connections were decrypted. 2. Another way to validate the decrypted session is by enabling the column "Decrypted" as below Traffic logs . This can be done by clicking on the arrow down next to any column title and selecting the Columns > Decrypted. This shows decrypted status in regular traffic log view.
upvoted 11 times
Barry_Allen
3 years, 10 months ago
how about PCNSE 10 is it in march of 2021 or still PCNSE 9 in march... ?
upvoted 1 times
lucaboban
3 years, 10 months ago
As of, August 17th 2020, the Palo Alto Networks Certified Network Security Engineer (PCNSE) and the Palo Alto Networks Certified Network Security Administrator (PCNSA) certification exams reflect changes based on PAN-OS 10.0.
upvoted 1 times
...
...
Biz90
3 years, 3 months ago
Excellent answer :)
upvoted 1 times
...
scanossa
1 year, 2 months ago
And on the Traffic logs, you can also add the "Decrypted" column, which would show Yes or No in case the connection was decrypted or not
upvoted 2 times
...
...
PA
Highly Voted 5 years, 2 months ago
I think its A.
upvoted 7 times
...
CarlosDV06
Most Recent 1 week, 5 days ago
Selected Answer: A
Well certainly you want to check if your SSL traffic is being decrypted, so you would look onto traffic logs and apply the "Is decrypted" column. You usually check on Decryption logs when you know that decryption could be causing an issue (so besides the flag is Decrypted marks yes or no, you would see a session end reason: "decrypt-error" in the same traffic log). Based on daily workload I'd go with A.
upvoted 1 times
...
Oswaldo_CCSM
2 weeks, 5 days ago
Selected Answer: B
When SSL decryption is configured and SSL sessions are being decrypted, the Decryption log is where the administrator can verify the details of the decrypted sessions. This log provides information about the SSL decryption process, including whether the decryption was successful, if there were any issues, and the details of the decrypted traffic.
upvoted 1 times
...
corpguy
3 weeks, 4 days ago
Selected Answer: B
PAN-OS 11 the decryption log can be filtered using a source address to see all decrypted sessions. “A” is also true but B is a better answer. This is a bad question.
upvoted 1 times
...
CarlosDV06
2 months, 1 week ago
Selected Answer: A
Hello guys, here I am willing to help. I chose A because you can see if the traffic was decrypten with the column: is decrypted. You would use normally the decryption log to tshoot purposes, but its not this question (although you do can see if certain traffic is being decrypted by a decryptiuon rule in the decryption log).
upvoted 1 times
...
3a97627
4 months, 1 week ago
Selected Answer: A
To "verify" going into the traffic log is the quickest option
upvoted 1 times
...
3a97627
4 months, 1 week ago
"Verify" is the key here. Traffic logs "decrypted" column is the best way to determine. Hence I vote for A
upvoted 1 times
...
kambata
6 months, 2 weeks ago
Selected Answer: A
By default decryption logs only unsuccessful events .... A is correct.
upvoted 1 times
...
[Removed]
8 months ago
Another stupid question with 2 answers. Both A and B are correct. https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/verify-decryption After you configure a best practice decryption profile and apply it to traffic, you can check both the Decryption logs (introduced in PAN-OS 10.0) and the Traffic logs to verify that the firewall is decrypting the traffic.
upvoted 1 times
...
jens23
10 months, 1 week ago
Selected Answer: A
By default, Decryption policies only log unsuccessful TLS handshakes.
upvoted 2 times
kambata
6 months, 2 weeks ago
True !
upvoted 1 times
...
...
JRKhan
1 year ago
Selected Answer: A
I would lean towards option A as the question asks about how one can go about verifying if sessions are being decrypted. In the details of traffic log entry, you can check if the decrypt flag is marked or not. The decrypted log file introduced in PAN OS 10 on the other hand provides comprehensive information about individual session that are decrypted, the sessions that are marked for "no decrypt" in the decryption policy or any global protect sessions when you enable decryption logging in the global protect portal or gateway configuration.
upvoted 2 times
...
dorf05
1 year, 1 month ago
Selected Answer: B
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs#:~:text=The%20Decryption%20Log%20(MonitorLogsDecryption)%20provides%20comprehensive%20information%20about%20sessions%20that%20match%20a%20Decryption%20policy%20to%20help%20you%20gain%20context%20about%20that%20traffic%20so%20you%20can%20accurately%20and%20easily%20diagnose%20and%20resolve%20decryption%20issues
upvoted 1 times
...
ms997
1 year, 1 month ago
Answer:A is say clear when to find Decrypted. in traffic logs
upvoted 1 times
...
techplus
1 year, 1 month ago
Selected Answer: B
Decryption Log
upvoted 1 times
...
Xuzi
1 year, 2 months ago
Very clear answer on PA website After you configure a best practice decryption profile and apply it to traffic, you can check both the Decryption logs https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/verify-decryption
upvoted 1 times
...
Micutzu
1 year, 3 months ago
Selected Answer: A
The question t's about log ENTRY and not log TYPE.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago