nerdexam
Palo_Alto_NetworksPalo_Alto_Networks

PCNSE · Question #355

PCNSE Question #355: Real Exam Question with Answer & Explanation

Sign in or unlock PCNSE to reveal the answer and full explanation for question #355. The question stem and answer options stay visible for context.

Submitted by ashley.k· Apr 18, 2026Deploy and Configure

Question

Users within an enterprise have been given laptops that are joined to the corporate domain. In some cases, IT has also deployed Linux-based OS systems with a graphical desktop. Information Security needs IP-to-user mapping, which it will use in group-based policies that will limit internet access for the Linux desktop users. Which method can capture IP-to-user mapping information for users on the Linux machines?

Options

  • AYou can configure Captive Portal with an authentication policy.
  • BIP-to-user mapping for Linux users can only be learned if the machine is joined to the domain.
  • CYou can set up a group-based security policy to restrict internet access based on group
  • DYou can deploy the User-ID agent on the Linux desktop machines

Unlock PCNSE to see the answer

You've previewed enough free PCNSE questions. Unlock PCNSE for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#User-ID#IP-to-User Mapping#Endpoint Agent#Linux Systems
Full PCNSE PracticeBrowse All PCNSE Questions