Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > PSE-Strata Professional > PSE-Strata

PSE-Strata Palo Alto Networks System Engineer Professional - Strata Question and Answers

Question # 4

For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same Prisma Access location servicing a single

Datacenter? (Choose two.)

A.

Network segments in the Datacenter need to be advertised to only one Service Connection

B.

The customer edge device needs to support policy-based routing with symmetric return functionality

C.

The resources in the Datacenter will only be able to reach remote network resources that share the same region

D.

A maximum of four service connections per Datacenter are supported with this topology

Full Access
Question # 5

A customer is designing a private data center to host their new web application along with a separate headquarters for users.

Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?

A.

Threat Prevention

B.

DNS Security

C.

WildFire

D.

Advanced URL Filtering (AURLF)

Full Access
Question # 6

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

A.

M-200

B.

M-600

C.

M-100

D.

Panorama VM-Series

Full Access
Question # 7

When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?

A.

X-Forwarded-For

B.

HTTP method

C.

HTTP response status code

D.

Content type

Full Access
Question # 8

Which three features are used to prevent abuse of stolen credentials? (Choose three.)

A.

multi-factor authentication

B.

URL Filtering Profiles

C.

WildFire Profiles

D.

Prisma Access

E.

SSL decryption rules

Full Access
Question # 9

How frequently do WildFire signatures move into the antivirus database?

A.

every 24 hours

B.

every 12 hours

C.

once a week

D.

every 1 hour

Full Access
Question # 10

Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)

A.

dedicated pair of decryption forwarding interfaces required per security chain

B.

a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule

C.

a unique Decryption policy rule is required per security chain

D.

a single pair of decryption forwarding interfaces

Full Access
Question # 11

Which three script types can be analyzed in WildFire? (Choose three)

A.

PythonScript

B.

MonoSenpt

C.

JScript

D.

PowerShell Script

E.

VBScript

Full Access
Question # 12

Which are the three mandatory components needed to run Cortex XDR? (Choose three.)

A.

Panorama

B.

NGFW with PANOS 8 0.5 or later

C.

Cortex Data Lake

D.

Traps

E.

Pathfinder

F.

Directory Syn Service

Full Access
Question # 13

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Full Access
Question # 14

A customer requires an analytics tool with the following attributes:

- Uses the logs on the firewall to detect actionable events on the network

- Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network

- Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources

Which feature of PAN-OS will address these requirements?

A.

WildFire with application program interface (API) calls for automation

B.

Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs

C.

Automated correlation engine (ACE)

D.

Cortex XDR and Cortex Data Lake

Full Access
Question # 15

Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?

 

A.

Prototype

B.

Inputs

C.

Class

D.

Feed Base URL

Full Access
Question # 16

Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.

A.

5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YR

B.

5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-SVC-BAS-PRA-25. 1x PAN-PRA-25

C.

5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YRr 1x PAN-LGS-1TB-1YR, 1x PAN-PRA-25, 1x PAN-SVC-BAS-PRA-25

D.

1x PAN-GPCS-USER-C-BAS-1YR, 1x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YR

Full Access
Question # 17

A WildFire subscription is required for which two of the following activities? (Choose two)

A.

Filter uniform resource locator (URL) sites by category.

B.

Forward advanced file types from the firewall for analysis.

C.

Use the WildFire Application Programming Interface (API) to submit website links for analysis

D.

Enforce policy based on Host Information Profile (HIP)

E.

Decrypt Secure Sockets Layer (SSL)

Full Access
Question # 18

A company has deployed the following

• VM-300 firewalls in AWS

• endpoint protection with the Traps Management Service

• a Panorama M-200 for managing its VM-Series firewalls

• PA-5220s for its internet perimeter,

• Prisma SaaS for SaaS security.

Which two products can send logs to the Cortex Data Lake? (Choose two).

A.

Prisma SaaS

B.

Traps Management Service

C.

VM-300 firewalls

D.

Panorama M-200 appliance

Full Access
Question # 19

Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?

A.

It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server.

B.

When it is in place, it removes the need for an onsite firewall

C.

When the service is purchased, Palo Alto Networks sends an engineer to physically deploy the firewall to the customer environment

D.

It allows a firewall to be automatically connected to the local network wirelessly

Full Access
Question # 20

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

A.

define an SSL decryption rulebase

B.

enable User-ID

C.

validate credential submission detection

D.

enable App-ID

E.

define URL Filtering Profile

Full Access
Question # 21

In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?

A.

HA3

B.

HA1

C.

HA2

D.

HA4

Full Access
Question # 22

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

A.

VM-200

B.

VM-100

C.

VM-50

D.

VM-300

Full Access
Question # 23

WildFire can discover zero-day malware in which three types of traffic? (Choose three)

A.

SMTP

B.

HTTPS

C.

FTP

D.

DNS

E.

TFTP

Full Access
Question # 24

An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.

The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)

A.

Control of post rules

B.

Control local firewall rules

C.

Ensure management continuity

D.

Improve log collection redundancy

Full Access
Question # 25

Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)

A.

Vulnerability protection

B.

Anti-Spyware

C.

Anti-Virus

D.

Botnet detection

E.

App-ID protection

Full Access
Question # 26

A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.

Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)

A.

Informs WildFire and sends up a signature to the Cloud

B.

Collects forensic information about the event

C.

Communicates the status of the endpoint to the ESM

D.

Notifies the user about the event

E.

Remediates the event by deleting the malicious file

Full Access
Question # 27

Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)

A.

ELF

B.

7-Zip

C.

Zip

D.

RAR

Full Access
Question # 28

A potential customer requires an NGFW solution which enables high-throughput, low-latency network security, all while incorporating unprecedented features and technology. They need a solution that solves the performance problems that plague today's security infrastructure.

Which aspect of the Palo Alto Networks NGFW capabilities can you highlight to help them address the requirements?

A.

SP3 (Single Pass Parallel Processing)

B.

GlobalProtect

C.

Threat Prevention

D.

Elastic Load Balancers

Full Access
Question # 29

What are two presales selling advantages of using Expedition? (Choose two.)

A.

map migration gaps to professional services statement of Works (SOWs)

B.

streamline & migrate to Layer7 policies using Policy Optimizer

C.

reduce effort to implement policies based on App-ID and User-ID

D.

easy migration process to move to Palo Alto Networks NGFWs

Full Access
Question # 30

What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)

A.

when you're delivering a security strategy

B.

when client's want to see the power of the platform

C.

provide users visibility into the applications currently allowed on the network

D.

help streamline the deployment and migration of NGFWs

E.

assess the state of NGFW feature adoption

Full Access
Question # 31

What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)

A.

Next-generation firewalls deployed with WildFire Analysis Security Profiles

B.

WF-500 configured as private clouds for privacy concerns

C.

Correlation Objects generated by AutoFocus

D.

Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance

E.

Palo Alto Networks non-firewall products such as Traps and Prisma SaaS

Full Access
Question # 32

Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?

A.

Prisma SaaS API

B.

Threat intelligence Cloud

C.

GlobalProtect

D.

Cortex XDR

Full Access
Question # 33

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}

A.

prevention of cyber attacks

B.

safe enablement of all applications

C.

threat remediation

D.

defense against threats with static security solution

Full Access
Question # 34

Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?

A.

BPA

B.

PPA

C.

Expedition

D.

SLR

Full Access
Question # 35

Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)

A.

FTP

B.

HTTPS

C.

RTP

D.

HTTP

Full Access
Question # 36

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?

A.

M-600 appliance

B.

Panorama Interconnect plugin

C.

Panorama Large Scale VPN (LSVPN) plugin

D.

Palo Alto Networks Cluster license

Full Access
Question # 37

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

A.

Validate user identities through authentication

B.

Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall

C.

Categorize data and applications by levels of sensitivity

D.

Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls

Full Access
Question # 38

Which statement is true about Deviating Devices and metrics?

A.

A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation

B.

Deviating Device Tab is only available with a SD-WAN Subscription

C.

An Administrator can set the metric health baseline along with a valid standard deviation

D.

Deviating Device Tab is only available for hardware-based firewalls

Full Access
Question # 39

What is the basis for purchasing Cortex XDR licensing?

A.

volume of logs being processed based on Datalake purchased

B.

number of nodes and endpoints providing logs

C.

unlimited licenses

D.

number of NGFWs

Full Access
Question # 40

Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?

A.

WildFire on the firewall, and AutoFocus on Panorama

B.

Threat Prevention on the firewall, and Support on Panorama

C.

GlobalProtect on the firewall, and Threat Prevention on Panorama

D.

URL Filtering on the firewall, and MineMeld on Panorama

Full Access