exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 217 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 217
Topic #: 1
[All PCNSE Questions]

A network administrator wants to use a certificate for the SSL/TLS Service Profile. Which type of certificate should the administrator use?

  • A. machine certificate
  • B. server certificate
  • C. certificate authority (CA) certificate
  • D. client certificate
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Marcyy
Highly Voted 2 years, 10 months ago
Should be B. server certificate Use only signed certificates, not CA certificates, in SSL/TLS service profiles. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configure-an-ssltls-service-profile.html
upvoted 12 times
...
Plato22
Highly Voted 2 years, 10 months ago
Another wrong answer. Should be B, common sense.
upvoted 6 times
...
MILOP88
Most Recent 3 weeks, 3 days ago
Selected Answer: B
Palo Alto Networks firewalls and Panorama appliances use SSL/TLS to secure connections to the Authentication Portal, GlobalProtect portals and gateways, the management interface, HTTPS websites that require password access (URL admin override), and the User-ID™ syslog listening service. You can create an SSL/TLS service profile to define the <<server certificate>>, SSL/TLS protocol versions, and ciphers supported for connections to these services. Cipher suites are automatically selected based on the protocol versions chosen. However, you can disable individual ciphers as needed. If a service request involves a protocol version outside the specified range, the firewall or Panorama appliance downgrades or upgrades the connection to a supported version. To activate an SSL/TLS service profile, attach the profile to the settings for a specific service.
upvoted 1 times
...
DatITGuyTho1337
10 months, 1 week ago
I think the grammar is the confusing bit. I see server certificates as what external servers send to the firewall to establish a session. In fact in the below link someone else provided, the PAN team referred to it as a SIGNED CERTIFICATE. As such if one were to go with the options presented from face value, you are almost forced to select option C, whereas the PAN team really should use better grammar and just say signed certificates which is option B. Good lord!! https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/configure-an-ssltls-service-profile
upvoted 1 times
...
Sammy3637
10 months, 3 weeks ago
Selected Answer: B
Server Certificate as it's a signed cert
upvoted 1 times
...
tomsui44
1 year, 5 months ago
Selected Answer: B
B - server cert. Ask your PKI admin to provide one in order to have a properly signed/valid cert. :)
upvoted 1 times
...
gugacalderaro
1 year, 8 months ago
Use only signed certificates, not CA certificates, in SSL/TLS service profiles.
upvoted 2 times
...
mohr22
1 year, 9 months ago
C In the client systems that request firewall services, the certificate trust list (CTL) must include the certificate authority (CA) certificate that issued the certificate specified in the SSL/TLS service profile. Otherwise, users will see a certificate error when requesting firewall services.
upvoted 1 times
mohr22
1 year, 8 months ago
C certificate authority (CA) certificate https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/configure-an-ssltls-service-profile
upvoted 1 times
mohr22
1 year, 8 months ago
Sorry correct Ans is B server cert : https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/device/device-certificate-management-ssltls-service-profile in client it should be C Ca cert. sorry for confusion
upvoted 1 times
...
...
...
djedeen
1 year, 9 months ago
Selected Answer: C
I think it is C, as you need a CA cert (enterprise PKI or external CA), else you are going to get cert warnings on the clients when connecting. >>> You must set up the certificate and SSL/TLS Service Profile on the PAN-OS system before you can connect using Privileged Access Service. Once the PAN-OS system is configured, the same certificate must also be trusted in all connector systems that are connected to the PAN-OS system. In most cases, PAN-OS systems should use a certificate obtained from an Enterprise Certificate Authority (CA), or a trusted external CA, like VeriSign. Since the certificate is trusted already, it simplifies the certificate setup on connector systems. You can also export the certificate from the PAN-OS system and import it into all systems running the connector. Self-signed certificates should not be used in production environments. <<<
upvoted 2 times
...
TAKUM1y
2 years ago
Selected Answer: B
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/configure-an-ssltls-service-profile
upvoted 2 times
...
tenebrox
2 years, 4 months ago
Selected Answer: B
It should be B
upvoted 3 times
...
UFanat
2 years, 4 months ago
Selected Answer: B
It should be B as SSL/TLS Service Profile usually assigns to an IP which acts like a server, not client. it should not be a CA from official docs: Use only signed certificates, not CA certificates, in SSL/TLS service profiles.
upvoted 2 times
...
ManKing36
2 years, 5 months ago
Selected Answer: B
answer is B
upvoted 3 times
...
AbuHussain
2 years, 7 months ago
Selected Answer: B
Should be B
upvoted 2 times
...
shinichi_88
2 years, 9 months ago
Selected Answer: B
fomr it is B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago