Vcehome > Palo Alto Networks > PSE-Strata Professional > PSE-STRATA > PSE-STRATA Online Practice Questions and Answers

PSE-STRATA Online Practice Questions and Answers

Questions 4

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

A. define an SSL decryption rulebase

B. enable User-ID

C. validate credential submission detection

D. enable App-ID

E. define URL Filtering Profile

Browse 139 Q&As
Questions 5

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer's requirements? (Choose two.)

A. Policy-based forwarding

B. HA active/active

C. Virtual systems

D. HA active/passive

Browse 139 Q&As
Questions 6

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

A. SaaS reports

B. data filtering logs

C. WildFire analysis reports

D. threat logs

E. botnet reports

Browse 139 Q&As
Questions 7

A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources.

Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?

A. The Automated Correlation Engine

B. Cortex XDR and Cortex Data Lake

C. WildFire with API calls for automation

D. 3rd Party SIEM which can ingest NGFW logs and perform event correlation

Browse 139 Q&As
Questions 8

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)

A. Add the user to an external dynamic list (EDL).

B. Tag the user using Panorama or the Web Ul of the firewall.

C. Tag the user through the firewalls XML API.

D. Tag the user through Active Directory

Browse 139 Q&As
Questions 9

Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

A. Connector

B. Database

C. Recipient

D. Operator

E. Attribute

F. Schedule

Browse 139 Q&As
Questions 10

Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?

A. >show sdwan path-monitor stats vif

B. >show sdwan session distribution policy-name

C. >show sdwan connection all

D. >show sdwan event

Browse 139 Q&As
Questions 11

Which two methods are used to check for Corporate Credential Submissions? (Choose two.)

A. doman credentialiter

B. User-ID credential check

C. LDAP query

D. IP user mapping

Browse 139 Q&As
Questions 12

When having a customer pre-sales call, which aspects of the NGFW should be covered?

A. The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks

B. The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Control (C2) communications to protect your network from cyberthreats. URL categories that identify confirmed malicious content --malware, phishing, and C2 are updated every five minutes --to ensure that you can manage access to these sites within minutes of categorization

C. The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor

D. Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing

Browse 139 Q&As
Questions 13

A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.

The customer uses a firewall with User-ID enabled

Which feature must also be enabled to prevent these attacks?

A. Content Filtering

B. WildFire

C. Custom App-ID rules

D. App-ID

Browse 139 Q&As
Exam Code: PSE-STRATA
Exam Name: Palo Alto Networks System Engineer Professional-Strata
Last Update: May 10, 2024
Questions: 139 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99