exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 312 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 312
Topic #: 1
[All PCNSE Questions]

A network security engineer wants to prevent resource-consumption issues on the firewall.
Which strategy is consistent with decryption best practices to ensure consistent performance?

  • A. Use Decryption profiles to downgrade processor-intensive ciphers to ciphers that are less processor-intensive
  • B. Use Decryption profiles to drop traffic that uses processor-intensive ciphers
  • C. Use PFS in a Decryption profile for higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic
  • D. Use RSA in a Decryption profile for higher-priority and higher-risk traffic, and use less processor-intensive decryption methods for lower-risk traffic
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kambata
Highly Voted 2 years, 2 months ago
Selected Answer: C
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/prepare-to-deploy-decryption/size-the-decryption-firewall-deployment
upvoted 8 times
...
Whizdhum
Most Recent 10 months, 3 weeks ago
Selected Answer: C
Answer is C. If firewall resources are an issue, use stronger decryption for higher-priority traffic and use less processor-intensive decryption to decrypt and inspect lower-priority traffic until you can increase the available resources.
upvoted 1 times
...
Nawda
1 year, 1 month ago
Selected Answer: C
PFS is more secure but more resource intensive RSA less secure but saves resources.. so C
upvoted 3 times
...
electro165
1 year, 2 months ago
Selected Answer: A
Option A involves optimizing the decryption process by using less processor-intensive ciphers for traffic that doesn't require the highest level of security. This allows you to strike a balance between security and performance, ensuring that your firewall can handle the decryption workload efficiently without compromising security.
upvoted 1 times
...
Rowdy_47
1 year, 8 months ago
Definitely C A and B are not relevant As per the link and the text below Use RSA for traffic that isnt sensitive ( so D is wrong because you would use RSA for low risk /non sensitive traffic and not higher-priority and higher-risk traffic as in option D ) Which leaves C as the most correct The performance cost of PFS trades off against the higher security that PFS achieves, but PFS may not be needed for all types of traffic. You can save firewall CPU cycles by using RSA for traffic that you want to decrypt and inspect for threats but that isn’t sensitive. If firewall resources are an issue, use stronger decryption (such as PFS) for higher-priority traffic and use less processor-intensive decryption to decrypt and inspect lower-priority traffic until you can increase the available resources. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/prepare-to-deploy-decryption/size-the-decryption-firewall-deployment
upvoted 1 times
...
PaloGuy
1 year, 10 months ago
Selected Answer: D
Perfect Forward Secrecy (PFS) ephemeral key exchange algorithms such as Diffie-Hellman Ephemeral (DHE) Elliptic-Curve Diffie-Hellman Exchange (ECDHE) consume more processing resources than Rivest-Shamir-Adleman (RSA) algorithms https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/prepare-to-deploy-decryption/size-the-decryption-firewall-deployment
upvoted 2 times
...
Sarbi
1 year, 10 months ago
The correct answer is D. he combination of these factors determines how decryption consumes firewall processing resources. To best utilize the firewall’s resources, understand the risks of the data you’re protecting. If firewall resources are an issue, use stronger decryption for higher-priority traffic and use less processor-intensive decryption to decrypt and inspect lower-priority traffic until you can increase the available resources. For example, you could use RSA instead of ECDHE and ECDSA for traffic that isn’t sensitive or high-priority to preserve firewall resources for using PFS-based decryption for higher priority, sensitive traffic. (You’re still decrypting and inspecting the lower-priority traffic, but trading off consuming fewer computational resources with using algorithms that aren’t as secure as PFS.) The key is to understand the risks of different traffic types and treat them accordingly.
upvoted 4 times
...
awtsuritacuna
1 year, 11 months ago
Option C If firewall resources are an issue, use stronger decryption for higher-priority traffic and use less processor-intensive decryption to decrypt and inspect lower-priority traffic until you can increase the available resources https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/prepare-to-deploy-decryption/size-the-decryption-firewall-deployment
upvoted 2 times
...
confusion
2 years ago
Selected Answer: C
C "For example, you could use RSA instead of ECDHE and ECDSA for traffic that isn’t sensitive or high-priority to preserve firewall resources for using PFS-based decryption for higher priority, sensitive traffic. (You’re still decrypting and inspecting the lower-priority traffic, but trading off consuming fewer computational resources with using algorithms that aren’t as secure as PFS.) "
upvoted 1 times
...
TAKUM1y
2 years ago
Selected Answer: C
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/prepare-to-deploy-decryption/size-the-decryption-firewall-deployment
upvoted 2 times
...
Gabuu
2 years ago
Selected Answer: C
based on the link that KAMBATA provided i think it is C
upvoted 1 times
...
mizuno92
2 years, 1 month ago
Selected Answer: C
f firewall resources are an issue, use stronger decryption for higher-priority traffic and use less processor-intensive decryption to decrypt and inspect lower-priority traffic until you can increase the available resources. For example, you could use RSA instead of ECDHE and ECDSA for traffic that isn’t sensitive or high-priority to preserve firewall resources for using PFS-based decryption for higher priority, sensitive traffic.
upvoted 2 times
...
DrNick0
2 years, 1 month ago
I think C, PFS for high security traffic and RSA on low end stuff.
upvoted 2 times
...
millosz222
2 years, 1 month ago
Selected Answer: D
i thnik D You can save firewall CPU cycles by using RSA for traffic that you want to decrypt and inspect for threats but that isn’t sensitive.
upvoted 1 times
nose999
2 years, 1 month ago
Yes so the answer is C less processor-intensive decryption methods for lower-risk traffic = RSA
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago