Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

PSE-Strata Palo Alto Networks System Engineer Professional - Strata Questions and Answers

Questions 4

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

Options:

A.

retention requirements

B.

Traps agent forensic data

C.

the number of Traps agents

D.

agent size and OS

Buy Now
Questions 5

Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?

Options:

A.

Security policy rule

B.

Tag

C.

Login ID

D.

IP address

Buy Now
Questions 6

A client chooses to not block uncategorized websites.

Which two additions should be made to help provide some protection? (Choose two.)

Options:

A.

A URL filtering profile with the action set to continue for unknown URL categories to security policy rules that allow web access

B.

A data filtering profile with a custom data pattern to security policy rules that deny uncategorized websites

C.

A file blocking profile attached to security policy rules that allow uncategorized websites to help reduce the risk of drive by downloads

D.

A security policy rule using only known URL categories with the action set to allow

Buy Now
Questions 7

An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.

The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)

Options:

A.

Control of post rules

B.

Control local firewall rules

C.

Ensure management continuity

D.

Improve log collection redundancy

Buy Now
Questions 8

For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same Prisma Access location servicing a single

Datacenter? (Choose two.)

Options:

A.

Network segments in the Datacenter need to be advertised to only one Service Connection

B.

The customer edge device needs to support policy-based routing with symmetric return functionality

C.

The resources in the Datacenter will only be able to reach remote network resources that share the same region

D.

A maximum of four service connections per Datacenter are supported with this topology

Buy Now
Questions 9

A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.

Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)

Options:

A.

Informs WildFire and sends up a signature to the Cloud

B.

Collects forensic information about the event

C.

Communicates the status of the endpoint to the ESM

D.

Notifies the user about the event

E.

Remediates the event by deleting the malicious file

Buy Now
Questions 10

Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)

Options:

A.

ELF

B.

7-Zip

C.

Zip

D.

RAR

Buy Now
Questions 11

Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)

Options:

A.

Traffic is separated by zones

B.

Policy match is based on application

C.

Identification of application is possible on any port

D.

Traffic control is based on IP port, and protocol

Buy Now
Questions 12

Which three script types can be analyzed in WildFire? (Choose three)

Options:

A.

PythonScript

B.

MonoSenpt

C.

JScript

D.

PowerShell Script

E.

VBScript

Buy Now
Questions 13

When having a customer pre-sales call, which aspects of the NGFW should be covered?

Options:

A.

The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks

B.

The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Con

C.

The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor

D.

Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing

Buy Now
Questions 14

A customer requires an analytics tool with the following attributes:

- Uses the logs on the firewall to detect actionable events on the network

- Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network

- Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources

Which feature of PAN-OS will address these requirements?

Options:

A.

WildFire with application program interface (API) calls for automation

B.

Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs

C.

Automated correlation engine (ACE)

D.

Cortex XDR and Cortex Data Lake

Buy Now
Questions 15

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)

Options:

A.

Threat logs

B.

WildFire analysis reports

C.

Botnet reports

D.

Data filtering logs

E.

SaaS reports

Buy Now
Questions 16

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

Options:

A.

Enable User Credential Detection

B.

Enable User-ID

C.

Define a Secure Sockets Layer (SSL) decryption rule base

D.

Enable App-ID

E.

Define a uniform resource locator (URL) Filtering profile

Buy Now
Questions 17

How frequently do WildFire signatures move into the antivirus database?

Options:

A.

every 24 hours

B.

every 12 hours

C.

once a week

D.

every 1 hour

Buy Now
Questions 18

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

Options:

A.

eDirectory monitoring

B.

Client Probing

C.

SNMP server

D.

TACACS

E.

Active Directory monitoring

F.

Lotus Domino

G.

RADIUS

Buy Now
Questions 19

WildFire can discover zero-day malware in which three types of traffic? (Choose three)

Options:

A.

SMTP

B.

HTTPS

C.

FTP

D.

DNS

E.

TFTP

Buy Now
Questions 20

Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)

Options:

A.

Request that the customer make part 3978 available to allow the evaluation unit to communicate with Panorama

B.

Inform the customer that a SPAN port must be provided for the evaluation unit, assuming a TAP mode deployment.

C.

Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned.

D.

Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible

E.

Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed

Buy Now
Questions 21

Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)

Options:

A.

Network Tab

B.

Policies Tab

C.

Device Tab

D.

Objects Tab

Buy Now
Questions 22

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer's requirements? (Choose two.)

Options:

A.

Policy-based forwarding

B.

HA active/active

C.

Virtual systems

D.

HA active/passive

Buy Now
Questions 23

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)

Options:

A.

Quarantine

B.

Allow

C.

Reset

D.

Redirect

E.

Drop

F.

Alert

Buy Now
Questions 24

What is the basis for purchasing Cortex XDR licensing?

Options:

A.

volume of logs being processed based on Datalake purchased

B.

number of nodes and endpoints providing logs

C.

unlimited licenses

D.

number of NGFWs

Buy Now
Questions 25

What are two advantages of the DNS Sinkholing feature? (Choose two.)

Options:

A.

It forges DNS replies to known malicious domains.

B.

It monitors DNS requests passively for malware domains.

C.

It can be deployed independently of an Anti-Spyware Profile.

D.

It can work upstream from the internal DNS server.

Buy Now
Questions 26

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

Options:

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Buy Now
Questions 27

What helps avoid split brain in active / passive high availability (HA) pair deployment?

Options:

A.

Enable preemption on both firewalls in the HA pair.

B.

Use a standard traffic interface as the HA3 link.

C.

Use the management interface as the HA1 backup link

D.

Use a standard traffic interface as the HA2 backup

Buy Now
Questions 28

A customer worried about unknown attacks is hesitant to enable SSL decryption due to privacy

and regulatory issues. How does the platform address the customer’s concern?

Options:

A.

It overcomes reservations about SSL decrypt by offloading to a higher-capacity firewall to help with the decrypt throughput

B.

It shows how AutoFocus can provide visibility into targeted attacks at the industry sector

C.

It allows a list of websites or URL categories to be defined for exclusion from decryption

D.

It bypasses the need to decrypt SSL traffic by analyzing the file while still encrypted

Buy Now
Questions 29

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 30

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

Options:

A.

WildFire analysis

B.

Dynamic user groups (DUGs)

C.

Multi-factor authentication (MFA)

D.

URL Filtering Profiles

Buy Now
Questions 31

Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?

Options:

A.

BPA

B.

PPA

C.

Expedition

D.

SLR

Buy Now
Questions 32

A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).

Which Security profile is used to configure Domain Name Security (DNS) to Identity and block

previously unknown DGA-based threats in real time?

Options:

A.

URL Filtering profile

B.

WildFire Analysis profile

C.

Vulnerability Protection profile

D.

Anti-Spyware profile

Buy Now
Questions 33

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

Options:

A.

M-200

B.

M-600

C.

M-100

D.

Panorama VM-Series

Buy Now
Questions 34

Which two types of security chains are supported by the Decryption Broker? (Choose two.)

Options:

A.

virtual wire

B.

transparent bridge

C.

Layer 3

D.

Layer 2

Buy Now
Questions 35

Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?

Options:

A.

It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server.

B.

When it is in place, it removes the need for an onsite firewall

C.

When the service is purchased, Palo Alto Networks sends an engineer to physically deploy the firewall to the customer environment

D.

It allows a firewall to be automatically connected to the local network wirelessly

Buy Now
Questions 36

In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)

Options:

A.

TXT

B.

API

C.

CSV

D.

EDL

Buy Now
Questions 37

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

Options:

A.

WildFire

B.

DNS Security

C.

Threat Prevention

D.

loT Security

Buy Now
Questions 38

in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

Options:

A.

Step 4. Create the Zero Trust policy.

B.

Step 2: Map the transaction flows.

C.

Step 3. Architect a Zero Trust network.

D.

Step 1: Define the protect surface

Buy Now
Questions 39

Which two features can be enabled to support asymmetric routing with redundancy on a Palo

Alto networks next-generation firewall (NGFW)? (Choose two.)

Options:

A.

Active / active high availability (HA)

B.

Multiple virtual systems

C.

non-SYN first packet

D.

Asymmetric routing profile

Buy Now
Questions 40

Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?

Options:

A.

It processes each feature in a separate single pass with additional performance impact for each enabled feature.

B.

Its processing applies only to security features and does not include any networking features.

C.

It processes all traffic in a single pass with no additional performance impact for each enabled feature.

D.

It splits the traffic and processes all security features in a single pass and all network features in a separate pass

Buy Now
Questions 41

Which solution informs a customer concerned about zero-day targeted attacks whether an attack is specifically targeted at its property?

Options:

A.

AutoFocus

B.

Panorama Correlation Report

C.

Cortex XSOAR Community edition

D.

Cortex XDR Prevent

Buy Now
Exam Code: PSE-Strata
Exam Name: Palo Alto Networks System Engineer Professional - Strata
Last Update: Nov 21, 2024
Questions: 137
PSE-Strata pdf

PSE-Strata PDF

$28  $80
PSE-Strata Engine

PSE-Strata Testing Engine

$33.25  $95
PSE-Strata PDF + Engine

PSE-Strata PDF + Testing Engine

$45.5  $130