exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 447 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 447
Topic #: 1
[All PCNSE Questions]

An engineer is configuring SSL Inbound Inspection for public access to a company’s application.

Which certificate(s) need to be installed on the firewall to ensure that inspection is performed successfully?

  • A. Intermediate CA(s) and End-entity certificate
  • B. Root CA and Intermediate CA(s)
  • C. Self-signed certificate with exportable private key
  • D. Self-signed CA and End-entity certificate
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MrR0bot
Highly Voted 1 year, 11 months ago
Selected Answer: A
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-inbound-inspection We recommend uploading a certificate chain (a single file) to the firewall if your end-entity (leaf) certificate is signed by one or more intermediate certificates and your web server supports TLS 1.2 and Rivest, Shamir, Adleman (RSA) or Perfect Forward Secrecy (PFS) key exchange algorithms. Uploading the chain avoids client-side server certificate authentication issues. You should arrange the certificates in the file as follows: End-entity (leaf) certificate Intermediate certificates (in issuing order) (Optional) Root certificate
upvoted 5 times
...
TeachTrooper
Most Recent 1 day, 1 hour ago
Selected Answer: A
End-Entity certificate: This should also be uploaded as it represents the server's certificate. Intermediate certificate(s): These must be uploaded to complete the chain. Root certificate: (Optional) Normally not uploaded to the Palo Alto firewall as it is already included in the trust store. (because it is public, if you ask how we can be sure whether it is public or not : since users from internet should also trust this root ca so it should be public)
upvoted 1 times
...
corpguy
1 month, 4 weeks ago
Selected Answer: B
For public inbound access you need the cert chain root and intermediates and the private key of the server certificate, poorly worded question, but B is the closest to correct.
upvoted 1 times
...
dorf05
1 year, 1 month ago
Selected Answer: A
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-inbound-inspection#:~:text=Uploading%20the%20chain,in%20more%20detail.
upvoted 1 times
...
kinho1985
1 year, 6 months ago
B. Root CA and Intermediate CA(s). When performing SSL Inbound Inspection, the firewall acts as a trusted intermediary between the client and the server. To establish trust with the client, the firewall must present a certificate chain that includes the Root CA and any intermediate CA(s) that issued the server's certificate. The Root CA certificate is the highest-level certificate in the certificate chain and is responsible for signing the intermediate CA certificates. The intermediate CA certificates, in turn, issue the server's end-entity certificate.
upvoted 2 times
...
DenskyDen
1 year, 11 months ago
A. On the firewall, you must install the certificate and private key for each server for which you want to perform SSL Inbound Inspection. If your web server supports TLS 1.2 and PFS key exchange algorithms and your end-entity (leaf) certificate is signed by intermediate certificates, we recommend uploading a certificate chain (a single file) to the firewall. Uploading the chain avoids client-side server certificate authentication issues. We recommend uploading a certificate chain (a single file) to the firewall if your end-entity (leaf) certificate is signed by one or more intermediate certificates and your web server supports TLS 1.2 and PFS key exchange algorithms. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClkoCAC
upvoted 3 times
...
djedeen
2 years ago
Selected Answer: A
I think it is A, but not entirely clear from the PAN docs: https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-inbound-inspection Uploading the chain avoids client-side server certificate authentication issues. You should arrange the certificates in the file as follows: End-entity (leaf) certificate Intermediate certificates (in issuing order) (Optional) Root certificate
upvoted 4 times
...
Danush
2 years ago
Selected Answer: C
"On the firewall, you must install the certificate and private key for each server for which you want to perform SSL Inbound Inspection"
upvoted 3 times
gully300
1 year, 12 months ago
The key doesn't need to be exportable though, and typically external access to a webservice is secured with a publicly issued Certificate from a public CA
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago