exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 198 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 198
Topic #: 1
[All PCNSE Questions]

What are two common reasons to use a "No Decrypt" action to exclude traffic from SSL decryption? (Choose two.)

  • A. the web server requires mutual authentication
  • B. the website matches a category that is not allowed for most users
  • C. the website matches a high-risk category
  • D. the website matches a sensitive category
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Plato22
Highly Voted 2 years, 10 months ago
A and D: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion
upvoted 11 times
...
Marcyy
Highly Voted 2 years, 10 months ago
Should be A and D
upvoted 8 times
...
samassier
Most Recent 8 months, 2 weeks ago
D : Traffic that you should never decrypt because it contains personally identifiable information (PII) or other sensitive information, such as the URL Filtering categories financial-services, health-and-medicine, and government.
upvoted 1 times
...
Marshpillowz
9 months, 1 week ago
Selected Answer: AD
A and D correct
upvoted 1 times
...
evilCorpBot7494
9 months, 2 weeks ago
Selected Answer: AD
qwerqwer a d
upvoted 1 times
...
TAKUM1y
2 years ago
Selected Answer: AD
A:https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/decryption-exclusions/exclude-a-server-from-decryption B:https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion
upvoted 2 times
...
TAKUM1y
2 years ago
Selected Answer: AD
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion
upvoted 1 times
...
juan_L
2 years, 2 months ago
A and D, no doubt. A - Because decryption requires to proxy TLS and client certificate will not be used. B- Compliance issues avoid to open tunnels to certain entities (...)
upvoted 2 times
...
UFanat
2 years, 4 months ago
Selected Answer: AD
Web server which requires mutual authentication does not support ssl decryption. And you should exclude sensitive sites from decryption.
upvoted 1 times
...
AbuHussain
2 years, 7 months ago
Selected Answer: AD
Should be A and D
upvoted 3 times
...
Micutzu
2 years, 10 months ago
For mutual authentication we must configure SSL Decryption Exclusion and once we include a destination into SSL Decryption Exclusion all the decryption policy rules are bypassed, therefor there is not action of "NO DECRYPT". "No decrypt" it's only inside decryption policy rule. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion.html "Traffic that originates or is destined for executives or other users whose traffic shouldn’t be decrypted." = restricted/limited group of users In my opinion the correct answers are B&D.
upvoted 5 times
Micutzu
2 years, 10 months ago
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-exclusions/palo-alto-networks-predefined-decryption-exclusions.html The firewall provides a predefined SSL Decryption Exclusion list to exclude from decryption commonly used sites that break decryption because of technical reasons such as pinned certificates and mutual authentication.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago