Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Paloalto Networks PSE-Strata Dumps

Page: 1 / 14
Total 139 questions

Palo Alto Networks System Engineer Professional - Strata Questions and Answers

Question 1

Which solution informs a customer concerned about zero-day targeted attacks whether an attack is specifically targeted at its property?

Options:

A.

AutoFocus

B.

Panorama Correlation Report

C.

Cortex XSOAR Community edition

D.

Cortex XDR Prevent

Question 2

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

Options:

A.

Enable User Credential Detection

B.

Enable User-ID

C.

Define a Secure Sockets Layer (SSL) decryption rule base

D.

Enable App-ID

E.

Define a uniform resource locator (URL) Filtering profile

Question 3

Which two types of security chains are supported by the Decryption Broker? (Choose two.)

Options:

A.

virtual wire

B.

transparent bridge

C.

Layer 3

D.

Layer 2

Question 4

An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.

The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)

Options:

A.

Control of post rules

B.

Control local firewall rules

C.

Ensure management continuity

D.

Improve log collection redundancy

Question 5

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

Options:

A.

Include all traffic types in decryption policy

B.

Inability to access websites

C.

Exclude certain types of traffic in decryption policy

D.

Deploy decryption setting all at one time

E.

Ensure throughput is not an issue

Question 6

Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)

Options:

A.

FTP

B.

HTTPS

C.

RTP

D.

HTTP

Question 7

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?

Options:

A.

M-600 appliance

B.

Panorama Interconnect plugin

C.

Panorama Large Scale VPN (LSVPN) plugin

D.

Palo Alto Networks Cluster license

Question 8

A customer is concerned about zero-day targeted attacks against its intellectual property.

Which solution informs a customer whether an attack is specifically targeted at them?

Options:

A.

Traps TMS

B.

AutoFocus

C.

Panorama Correlation Report

D.

Firewall Botnet Report

Question 9

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

Options:

A.

WildFire

B.

DNS Security

C.

Threat Prevention

D.

loT Security

Question 10

A company has deployed the following

• VM-300 firewalls in AWS

• endpoint protection with the Traps Management Service

• a Panorama M-200 for managing its VM-Series firewalls

• PA-5220s for its internet perimeter,

• Prisma SaaS for SaaS security.

Which two products can send logs to the Cortex Data Lake? (Choose two).

Options:

A.

Prisma SaaS

B.

Traps Management Service

C.

VM-300 firewalls

D.

Panorama M-200 appliance

Question 11

Which security profile on the NGFW includes signatures to protect you from brute force attacks?

Options:

A.

Zone Protection Profile

B.

URL Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Question 12

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

Options:

A.

breach the perimeter

B.

weaponize vulnerabilities

C.

lateral movement

D.

exfiltrate data

E.

recon the target

F.

deliver the malware

Question 13

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 14

A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.

The customer uses a firewall with User-ID enabled

Which feature must also be enabled to prevent these attacks?

Options:

A.

Content Filtering

B.

WildFire

C.

Custom App-ID rules

D.

App-ID

Question 15

An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address

Which mechanism prevents this connection from succeeding?

Options:

A.

DNS Sinkholing

B.

DNS Proxy

C.

Anti-Spyware Signatures

D.

Wildfire Analysis

Question 16

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy.

Which two features must be enabled to meet the customer’s requirements? (Choose two.)

Options:

A.

Virtual systems

B.

HA active/active

C.

HA active/passive

D.

Policy-based forwarding

Question 17

Which two steps are required to configure the Decryption Broker? (Choose two.)

Options:

A.

reboot the firewall to activate the license

B.

activate the Decryption Broker license

C.

enable SSL Forward Proxy decryption

D.

enable a pair of virtual wire interfaces to forward decrypted traffic

Question 18

A customer is designing a private data center to host their new web application along with a separate headquarters for users.

Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?

Options:

A.

Threat Prevention

B.

DNS Security

C.

WildFire

D.

Advanced URL Filtering (AURLF)

Question 19

Which profile or policy should be applied to protect against port scans from the internet?

Options:

A.

Interface management profile on the zone of the ingress interface

B.

Zone protection profile on the zone of the ingress interface

C.

An App-ID security policy rule to block traffic sourcing from the untrust zone

D.

Security profiles to security policy rules for traffic sourcing from the untrust zone

Page: 1 / 14
Total 139 questions