Should be
B. server certificate
Use only signed certificates, not CA certificates, in SSL/TLS service profiles.
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configure-an-ssltls-service-profile.html
Palo Alto Networks firewalls and Panorama appliances use SSL/TLS to secure connections to the Authentication Portal, GlobalProtect portals and gateways, the management interface, HTTPS websites that require password access (URL admin override), and the User-ID™ syslog listening service. You can create an SSL/TLS service profile to define the <<server certificate>>, SSL/TLS protocol versions, and ciphers supported for connections to these services. Cipher suites are automatically selected based on the protocol versions chosen. However, you can disable individual ciphers as needed. If a service request involves a protocol version outside the specified range, the firewall or Panorama appliance downgrades or upgrades the connection to a supported version. To activate an SSL/TLS service profile, attach the profile to the settings for a specific service.
I think the grammar is the confusing bit. I see server certificates as what external servers send to the firewall to establish a session. In fact in the below link someone else provided, the PAN team referred to it as a SIGNED CERTIFICATE. As such if one were to go with the options presented from face value, you are almost forced to select option C, whereas the PAN team really should use better grammar and just say signed certificates which is option B. Good lord!!
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/configure-an-ssltls-service-profile
C In the client systems that request firewall services, the certificate trust list (CTL) must include the certificate authority (CA) certificate that issued the certificate specified in the SSL/TLS service profile. Otherwise, users will see a certificate error when requesting firewall services.
Sorry correct Ans is B server cert : https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/device/device-certificate-management-ssltls-service-profile
in client it should be C Ca cert.
sorry for confusion
I think it is C, as you need a CA cert (enterprise PKI or external CA), else you are going to get cert warnings on the clients when connecting.
>>>
You must set up the certificate and SSL/TLS Service Profile on the PAN-OS system before you can connect using Privileged Access Service.
Once the PAN-OS system is configured, the same certificate must also be trusted in all connector systems that are connected to the PAN-OS system. In most cases, PAN-OS systems should use a certificate obtained from an Enterprise Certificate Authority (CA), or a trusted external CA, like VeriSign. Since the certificate is trusted already, it simplifies the certificate setup on connector systems. You can also export the certificate from the PAN-OS system and import it into all systems running the connector. Self-signed certificates should not be used in production environments.
<<<
It should be B as SSL/TLS Service Profile usually assigns to an IP which acts like a server, not client.
it should not be a CA from official docs:
Use only signed certificates, not CA certificates, in SSL/TLS service profiles.
This section is not available anymore. Please use the main Exam Page.PCNSE Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Marcyy
Highly Voted 2 years, 10 months agoPlato22
Highly Voted 2 years, 10 months agoMILOP88
Most Recent 3 weeks, 3 days agoDatITGuyTho1337
10 months, 1 week agoSammy3637
10 months, 3 weeks agotomsui44
1 year, 5 months agogugacalderaro
1 year, 8 months agomohr22
1 year, 9 months agomohr22
1 year, 8 months agomohr22
1 year, 8 months agodjedeen
1 year, 9 months agoTAKUM1y
2 years agotenebrox
2 years, 4 months agoUFanat
2 years, 4 months agoManKing36
2 years, 5 months agoAbuHussain
2 years, 7 months agoshinichi_88
2 years, 9 months ago