exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 492 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 492
Topic #: 1
[All PCNSE Questions]

An administrator is configuring SSL decryption and needs to ensure that all certificates for both SSL Inbound inspection and SSL Forward Proxy are installed properly on the firewall.

When certificates are being imported to the firewall for these purposes, which three certificates require a private key? (Choose three.)

  • A. Forward Untrust certificate
  • B. Enterprise Root CA certificate
  • C. Forward Trust certificate
  • D. End-entity (leaf) certificate
  • E. Intermediate certificate(s)
Show Suggested Answer Hide Answer
Suggested Answer: ACD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
McDrudge
Highly Voted 2 years ago
Selected Answer: ACD
ACD. The question is asking "When certificates are being imported", not "which certificates are generally imported". All certificates listed with the exception of the End-entity cert could be generated on the firewall. Forward Trust (SSL Forward Proxy), Forward Untrust (SSL Forward Proxy), and End-entity (SSL Inbound Inspection) certificates require private keys for the firewall to act as the client (SSL Forward Proxy) or server (SSL Inbound Inspection) in the decyreption process. The Root CA and Intermediate certs only require a public key to verify the signature of subordinate certs. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/keys-and-certificates-for-decryption-policies
upvoted 25 times
...
krzyb
Most Recent 3 months, 2 weeks ago
Selected Answer: ACD
For SSL Forward proxy. If server certificate is trusted - firewall signs a copy of a server certificate with a forward trust certificate. If server certificate is untrusted - Firewall signs a copy of a server certificate with a forward untrust certificate. To sign a copy of a server certificate you need a private key. So A & C. For SSL Inbound inspection. You need to have a server certificate and key to inspect the traffic. So D.
upvoted 1 times
...
0d2fdfa
7 months, 3 weeks ago
Selected Answer: ACD
ACD A for untrust C for forward trust D for inbound.
upvoted 1 times
...
samassier
10 months, 2 weeks ago
answer is ACD : Enterprise Root CA certificate : The private key associated with the Enterprise Root CA certificate is not needed for SSL decryption on the firewall. The root CA's public key is used to verify the authenticity of the certificate chain, but the private key is not used in the decryption process. Intermediate certificate : Similar to the root CA certificate, the private keys for intermediate certificates are not needed for SSL decryption on the firewall. They are part of the certificate chain used for validation, but the firewall does not require their private keys for decryption purposes.
upvoted 2 times
...
90fa8d0
1 year ago
Selected Answer: BCE
if we go by elimination , the Fwrd Untrust and end-entery certificates dont have Private Key. so its BCE
upvoted 1 times
Pacheco
11 months, 1 week ago
Wrong about end entity certificates :/
upvoted 2 times
...
...
Metgatz
1 year, 1 month ago
Selected Answer: BCD
BCD are correct
upvoted 1 times
...
wallaka
1 year, 2 months ago
Selected Answer: CDE
100% not A. Forward Untrust section says nothing about private keys. Private keys are explicitly called out for Forward Trust, both intermediate and end-entity certs depend on the private key of the Enterprise Root CA, which may or may not be on the FW itself so I'm not sure, but definitely not A. "Click Generate at the bottom of the certificates page. Enter a Certificate Name, such as my-ssl-fwd-untrust. Set the Common Name, for example 192.168.2.1. Leave Signed By blank. Click the Certificate Authority check box to enable the firewall to issue the certificate. Click Generate to generate the certificate. Click OK to save. Click the new my-ssl-fwd-untrust certificate to modify it and enable the Forward Untrust Certificate option." https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-forward-proxy#idb39a2a9b-9c02-413b-ab1c-dc687b7bcb21
upvoted 2 times
wallaka
1 year, 1 month ago
EDIT: BDE seems more likely. Recommendation for SSL forward proxy is enterprise CA but can used self-signed Forward Trust, so BC fits best for me, covers both scenarios, can't be A, has to be D, I can't find intermediate certs anywhere so E must be the red herring
upvoted 1 times
wallaka
1 year, 1 month ago
EDIT #2: mistyped BCD. Can't edit.
upvoted 1 times
...
...
...
dgonz
1 year, 4 months ago
Selected Answer: BCE
I think it's BCE..
upvoted 2 times
...
PaloSteve
1 year, 5 months ago
How to Configure SSL Decryption- https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmyCAC This link has a video and might be helpful for understanding this topic, though the answer to this question isn't directly given, unfortunately. When talking about the Forward Untrust Certificate, it does mention, "uncheck Export private key, as it’s not required", so maybe not Answer A. It also says about Inbound SSL Decryption, "To configure this properly, the administrator imports a copy of the protected server’s certificate and key." So yes to Answer D.
upvoted 1 times
...
sov4
1 year, 6 months ago
Selected Answer: BCD
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/keys-and-certificates-for-decryption-policies https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/configure-ssl-inbound-inspection https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/configure-ssl-forward-proxy#idb39a2a9b-9c02-413b-ab1c-dc687b7bcb21 A - doesnt matter since it's untrusted E - if applicable is used to sign leaf (the server certs for inbound proxy) and forward untrust.
upvoted 3 times
sov4
1 year, 6 months ago
Correction to last line... *and forward trust cert
upvoted 1 times
...
...
kinho1985
1 year, 7 months ago
the correct choices are C. Forward Trust certificate, D. End-entity (leaf) certificate, and E. Intermediate certificate(s).
upvoted 1 times
...
lildevil
1 year, 7 months ago
Selected Answer: BCE
They are asking which certs require a private key...nothing about importing them or such, just which ones require it. Via McDrudge's link you definitely need a private key for a CA so it can sign the forward trust cert. The forward trust cert i think we all agree needs to have it. The intermediate also needs it.
upvoted 4 times
...
Frightened_Acrobat
1 year, 11 months ago
BCD are correct. Untrust is self-signed and is not imported. Question mentioned SSL Inbound Inspection which uses leaf certificates of servers with private key. Enterprise CA is needed for chain of trust for the Forward Trust Certificate. Both of which are imported with their associate private keys.
upvoted 3 times
...
DenskyDen
1 year, 11 months ago
ACD. See McDrudge link.
upvoted 2 times
DenskyDen
1 year, 10 months ago
I leaning towards ACE now.
upvoted 1 times
...
...
djedeen
2 years ago
Selected Answer: ACD
ACD, per McDrudge's text.
upvoted 2 times
...
cRzy
2 years ago
Selected Answer: BCE
I think it's BCE. Forward Untrust Certificate don't need to be imported. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/configure-ssl-forward-proxy
upvoted 4 times
...
Maryamk
2 years ago
ACE are correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago