Palo Alto Networks PSE-Strata-Pro-24 Practice Test - Questions Answers, Page 4
List of questions
Question 31

A prospective customer has provided specific requirements for an upcoming firewall purchase, including the need to process a minimum of 200,000 connections per second while maintaining at least 15 Gbps of throughput with App-ID and Threat Prevention enabled.
What should a systems engineer do to determine the most suitable firewall for the customer?
Question 32

According to a customer's CIO, who is upgrading PAN-OS versions, ''Finding issues and then engaging with your support people requires expertise that our operations team can better utilize elsewhere on more valuable tasks for the business.'' The upgrade project was initiated in a rush because the company did not have the appropriate tools to indicate that their current NGFWs were reaching capacity.
Which two actions by the Palo Alto Networks team offer a long-term solution for the customer? (Choose two.)
Question 33

A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.
Which subscription(s) should the systems engineer recommend?
Question 34

Which statement appropriately describes performance tuning Intrusion Prevention System (IPS) functions on a Palo Alto Networks NGFW running Advanced Threat Prevention?
Question 35

A systems engineer (SE) successfully demonstrates NGFW managed by Strata Cloud Manager (SCM) to a company. In the resulting planning phase of the proof of value (POV), the CISO requests a test that shows how the security policies are either meeting, or are progressing toward meeting, industry standards such as Critical Security Controls (CSC), and how the company can verify that it is effectively utilizing the functionality purchased.
During the POV testing timeline, how should the SE verify that the POV will meet the CISO's request?
Question 36

Which three use cases are specific to Policy Optimizer? (Choose three.)
Question 37

A systems engineer should create a profile that blocks which category to protect a customer from ransomware URLs by using Advanced URL Filtering?
Question 38

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?
Question 39

A security engineer has been tasked with protecting a company's on-premises web servers but is not authorized to purchase a web application firewall (WAF).
Which Palo Alto Networks solution will protect the company from SQL injection zero-day, command injection zero-day, Cross-Site Scripting (XSS) attacks, and IIS exploits?
Question 40

When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?
Question