Exam PCNSE All QuestionsBrowse all questions from this exam
Question 191

An engineer must configure a new SSL decryption deployment.

Which profile or certificate is required before any traffic that matches an SSL decryption rule is decrypted?

    Correct Answer: B

    In SSL decryption deployment, it is required to have a certificate with both the Forward Trust option and Forward Untrust option selected. This ensures that the decryption mechanism can handle trusted and untrusted certificates properly. Configuring a certificate with only the Forward Trust option is not sufficient as it leaves untrusted traffic unaddressed, and just having the Forward Untrust option alone isn't enough to handle trusted sites. Therefore, having a certificate configured with both options is mandatory for a comprehensive SSL decryption setup.

Discussion
vansardoOption: A

I think it is A. For example, in SSL Inbound Inspection you do SSL decryption and don't need Forward Trust or Untrust Certificate. You only need a decrypt policy with a decrypt profile.

DavidBackham2020

D is not false, but you still need a decryption profile for SSL Forward Proxy. A forward trust certificate alone is insufficient. I agree with vansardo. The absolute minimum is the SSL Inbound Inspection profile (once the certificate an key are known to the firewall). Thus, A seems to be the most correct answer. https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/configure-ssl-inbound-inspection.html

Mp84047

A is the correct answer https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/configure-ssl-inbound-inspection.html

secdaddy

"(Optional) Select a Decryption Profile to perform additional checks on traffic that matches the policy rule." https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/define-traffic-to-decrypt/create-a-decryption-policy-rule

MicutzuOption: D

I believe that in this case the correct answer is D. I tested in my lab and Isn't a must to have a Forward Untrust Certificate. It's a must to have the Forward Trust Certificate defined. Once you create a Decryption Policy Rule, you cannot commit without having a Forward Trust Certificate defined.

Knowledge33Option: D

I just did it on my PAN. The decryption profile is not mandatory. It's optional, but the certificate with "forward trust" is mandatory.

beikenesOption: A

A seems to be the most correct one

TAKUM1yOption: D

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/configure-ssl-forward-proxy

BTSeeYaOption: D

Yeah, this is just another terribly worded, "best answer" type question that makes people facepalm at cert tests. If they just stated Forward Proxy in the question, then it would have to be D, but there is no Forward Trust cert used with inbound decryption. Since decryption profiles are optional in either case, I'm going to have to assume they meant Forward Proxy and select D for my answer.

Eluis007Option: A

I believe Option A is the most suitable answer. Here's why: The question explicitly mentions "any traffic" to be decrypted, indicating both inbound and outbound scenarios. Therefore, it's crucial to have a solution capable of decrypting both inbound traffic and outbound traffic, whether it's directed towards trusted or untrusted destinations. In this context, a decryption profile stands out as the most comprehensive solution. By attaching a decryption profile to the decryption policy rule, it ensures that all traffic matching the rule undergoes decryption, regardless of whether it's inbound or outbound, and regardless of the trust status of the destination server's certificate. Hence, considering the broad scope of traffic mentioned in the question, Option A, which emphasizes the importance of a decryption profile, appears to be the most appropriate choice.

cerifyme85Option: A

answer is A

MarshpillowzOption: D

D appears to be correct

WhizdhumOption: D

Answer is D. At a minimum, you need a Forward Trust certificate to present to clients when a trusted CA has signed the server certificate. Although Decryption Policies are optional, it's a best practice to include them to prevent allowing questionable traffic on the network.

ConfuzedOneOption: D

I think this question / answer set must be entered incorrectly - the question/answer pairing itself is not complete - we need to know whether we're talking inbound SSL decryption or outbound SSL forward Proxy.... If it's inbound SSL decryption then then options B and D are completly bunk. and as pointed out in some other comments, Palo's official documentation states decryption profiles are optional, but the question is about what is required. NO RIGHT ANSWER HERE If this is for outbound SSL Forward Proxy, again, Palo's documentation says the profile is optional, so answers A and C are completely bunk. Answer B completely defeats the purpose of the use of trusted and untrusted certificates - you need 2 certs, 1 trusted and 1 not trusted, so you would not have the same cert be both trusted and not trusted. That leaves option D - There must be a certificate with only the Forward Trust option selected... so if there's anything close to right, it seems Option D is it.

spitfire698Option: D

D is correct. you can create a decryption policy (ssl forward proxy) and leave the profile field in the policy on none. it will allow it, and traffic will still be decrypted. (though I doubt it's a good idea to do it like that since at best in that case it will use the default profile which allows way too much, at worst is just doesn't apply any limitations at all)

GohanF2Option: D

A and D can be both true. However, I will go this time for D. A is for additional granular control and it's not necessary for a regular SSL decryption rule . However, for deploying a regular SSL decryption rule, we need a trusted CA certificate to forward. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-overview

John105Option: A

I think A is correct, because D in the certificate option is not only 1 option possible to select as in point D. In addition to Forward Trust Certificate it possible options is Trusted Root CA. Therefore, A is correct Answer.

mohr22Option: A

A : After you create a decryption profile, attach it to a decryption policy rule; the firewall then enforces the decryption profile settings on traffic that matches the decryption policy rule.

news088Option: D

I think D is correct. The question come with must. To decrypt a decryption profile is not a requisite. But a certificate can only have one option trust or untrust not both. This is why D is the correct one.

djedeenOption: A

A: Configuring SSL Inbound Inspection includes: Installing the targeted server certificate on the firewall. Creating an SSL Inbound Inspection Decryption policy rule. Applying a Decryption profile to the policy rule.