exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 347 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 347
Topic #: 1
[All PCNSE Questions]

A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?

  • A. agentless User-ID with redistribution
  • B. Syslog listener
  • C. captive portal
  • D. standalone User-ID agent
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
scally
Highly Voted 1 year, 10 months ago
Selected Answer: B
B is the correct answer here. "To obtain user mappings from existing network services that authenticate users—such as wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC) mechanisms—Configure User-ID to Monitor Syslog Senders for User Mapping." https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-ip-addresses-to-users
upvoted 10 times
...
MalonJay
Most Recent 5 days, 17 hours ago
Selected Answer: D
The Standalone User ID agent can also receive syslogs and it supports filtering as well. It seems to be a better choice than just syslog listener.
upvoted 2 times
...
JRKhan
6 months ago
Selected Answer: B
B is correct. A syslog listener is the best choice for deploying User-ID to ensure maximum coverage in an environment with multiple forms of authentication. A syslog listener is a feature that enables the firewall or Panorama to receive syslog messages from other systems and parse them for IP address-to-username mappings. A syslog listener can collect user mapping information from a variety of sources, such as network access control systems, domain controllers, MDM solutions, VPN gateways, wireless controllers, proxies, and more. A syslog listener can also support multiple platforms and operating systems, such as Windows, Linux, macOS, iOS, Android, etc. Therefore, a syslog listener can provide a comprehensive and flexible solution for User-ID deployment in a large-scale network. References: Configure a Syslog Listener for User Mapping, User-ID Agent Deployment Guide, PCNSE Study Guide (page 48)
upvoted 3 times
...
dorf05
8 months, 1 week ago
The key word is ......." an environment with multiple forms of authentication"
upvoted 2 times
...
dorf05
8 months, 1 week ago
Selected Answer: A
A large-scale network can also have numerous firewalls that use the mapping information to enforce policies. You can reduce the resources that the firewalls and information sources use in the querying process by configuring some firewalls to acquire mapping information through redistribution instead of direct querying. Redistribution also enables the firewalls to enforce user-based policies when users rely on local sources for authentication (such as regional directory services) but need access to remote services and applications (such as global data center applications).
upvoted 1 times
...
TheIronSheik
1 year, 4 months ago
I think this should be B and D.
upvoted 1 times
...
floonky
1 year, 5 months ago
Selected Answer: B
B. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-id-to-monitor-syslog-senders-for-user-mapping#iddb1a7744-17c6-4900-a2cb-5f3511fef60f
upvoted 1 times
...
confusion
1 year, 8 months ago
Selected Answer: B
B To obtain user mappings from existing network services that authenticate users—such as wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC) mechanisms—Configure User-ID to Monitor Syslog Senders for User Mapping.
upvoted 1 times
...
mizuno92
1 year, 9 months ago
Selected Answer: B
Agreed with B
upvoted 2 times
...
juan_L
1 year, 10 months ago
Based on my own experience working with Forescout and others , the NAC platforms has full capabilities to identify users connected at any host (admin credentials, agent, wmi inspection, 802.1x...), and infinity possibilities to send information via syslog, so... without place to doubts B is the correct.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago