Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > PSE-Strata Professional > PSE-Strata

PSE-Strata Palo Alto Networks System Engineer Professional - Strata Question and Answers

Question # 4

Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

A.

Connector

B.

Database

C.

Recipient

D.

Operator

E.

Attribute

F.

Schedule

Full Access
Question # 5

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

A.

grayware

B.

command and control (C2)

C.

benign

D.

government

E.

malware

Full Access
Question # 6

Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?

A.

Once a day

B.

Once a week

C.

Once every minute

D.

Once an hour

Full Access
Question # 7

Which two features can be enabled to support asymmetric routing with redundancy on a Palo

Alto networks next-generation firewall (NGFW)? (Choose two.)

A.

Active / active high availability (HA)

B.

Multiple virtual systems

C.

non-SYN first packet

D.

Asymmetric routing profile

Full Access
Question # 8

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

A.

define an SSL decryption rulebase

B.

enable User-ID

C.

validate credential submission detection

D.

enable App-ID

E.

define URL Filtering Profile

Full Access
Question # 9

A company has deployed the following

• VM-300 firewalls in AWS

• endpoint protection with the Traps Management Service

• a Panorama M-200 for managing its VM-Series firewalls

• PA-5220s for its internet perimeter,

• Prisma SaaS for SaaS security.

Which two products can send logs to the Cortex Data Lake? (Choose two).

A.

Prisma SaaS

B.

Traps Management Service

C.

VM-300 firewalls

D.

Panorama M-200 appliance

Full Access
Question # 10

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Full Access
Question # 11

What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)

A.

operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)

B.

improved revenue due to more efficient network traffic throughput

C.

Increased security due to scalable cloud delivered security Services (CDSS)

D.

Cost savings due to reduction in IT management effort and device

Full Access
Question # 12

In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?

A.

HA3

B.

HA1

C.

HA2

D.

HA4

Full Access
Question # 13

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)

A.

Quarantine

B.

Allow

C.

Reset

D.

Redirect

E.

Drop

F.

Alert

Full Access
Question # 14

Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?

A.

WildFire hybrid deployment

B.

5 minute WildFire updates to threat signatures

C.

Access to the WildFire API

D.

PE file upload to WildFire

Full Access
Question # 15

Decryption port mirroring is now supported on which platform?

A.

all hardware-based and VM-Series firewalls with the exception of VMware NSX. Citrix SDX, or public cloud hypervisors

B.

in hardware only

C.

only one the PA-5000 Series and higher

D.

all hardware-based and VM-Series firewalls regardless of where installed

Full Access
Question # 16

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

A.

Create a footnote within the SLR generation tool

B.

Edit the Key-Findings text to list the other types of categories that may be of interest

C.

Remove unwanted categories listed under 'High Risk' and use relevant information

D.

Produce the report and edit the PDF manually

Full Access
Question # 17

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}

A.

prevention of cyber attacks

B.

safe enablement of all applications

C.

threat remediation

D.

defense against threats with static security solution

Full Access
Question # 18

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

A.

VM-200

B.

VM-100

C.

VM-50

D.

VM-300

Full Access
Question # 19

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 20

Match the functions to the appropriate processing engine within the dataplane.

Full Access