Palo Alto Networks PSE-DataCenter Practice Test - Questions Answers
List of questions
Question 1
By increasing the number of vCPUs in a VM - Series firewall from 4 to 8, by what factor is performance expected to increase?
By a pproximately a factor of 2
By a pp roximately a factor of 1.8
By a pproximately a factor of 2.2
Performance will not increase
Question 2
What is required to support the second generation NPCs on a PA - 7050?
The PA - 7050 cannot support the second generation NPCs; a PA - 7080 is required.
PAN - OS 6.1 or higher
PAN - OS 7.0 or higher
The second generation NPCs must be installed in matched pairs.
Question 3
A company needs to preconfigure firewalls to be sent to remote sites with the least amount of reconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers.
Which VPN configuration would adapt to changes when deployed to the future site?
Preconfigured GlobalProtect satellite
Preconfigured GlobalProtect client
Preconfigured IPsec tunnels
Preconfigured PPTP Tunnels
Question 4
A client has a sensitive application server in their data center and is particularly concerned about resource exhaustion because of distributed denial-of-service attacks.
How can the Palo Alto Networks NGFW be configured to specifically protect this server against resource exhaustion originating from multiple IP addresses (DDoS attack)?
Define a custom App-ID to ensure that only legitimate application traffic reaches the server.
Add a Vulnerability Protection Profile to block the attack.
Add QoS Profiles to throttle incoming requests.
Add a DoS Protection Profile with defined session count.
Question 5
A client has a sensitive application server in their data center and is particularly concerned about session flooding because of denial of-service attacks.
How can the Palo Alto Networks NGFW be configured to specifically protect this server against session floods originating from a single IP address?
Define a custom App-ID to ensure that only legitimate application traffic reaches the server
Add QoS Profiles to throttle incoming requests
Add a tuned DoS Protection Profile
Add an Anti-Spyware Profile to block attacking IP address
Question 6
A Company needs to preconfigured firewalls to be sent to remote sites with the least amount of preconfiguration. Once deployed, each firewall must establish secure tunnels back to multiple regional data centers to include the future regional data centers.
Which VPN configuration would adapt to changes when deployed to Hie future site?
preconfigured GlobalProtcet satellite
preconfigured GlobalProtcet client
preconfigured iPsec tunnels
preconfigured PPTP Tunnels
Question 7
A client has a sensitive application server in their data center and is particularly concerned about resource exhaustion because of distributed denial-of-service attacks.
How can the Palo Alto Networks NGFW be configured to specifically protect tins server against resource exhaustion originating from multiple IP address (DDoS attack)?
Define a custom App-ID to ensure that only legitimate application traffic reaches the server
Add a DoS Protection Profile with defined session count.
Add a Vulnerability Protection Profile to block the attack.
Add QoS Profiles to throttle incoming requests.
Question 8
What is the result of deploying virtualization in your data center?
reduced security threat
reduced operational costs
increased hardware capital costs
increased host provisioning
Question 9
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
stateless firewall
next-generation firewall
personal endpoint firewall
port-based firewall
Question 10
What are two benefits of using Panorama for a customer who is deploying virtual firewalls to secure data center traffic? (Choose two.)
It can monitor the virtual firewalls' physical hosts and Vmotion them as necessary.
It can bootstrap the virtual firewall for dynamic deployment scenarios
It can manage the virtual firewalls' resource use, allowing for VM resource over-subscription.
It can provide the Automated Correlation Engine functionality, which the virtual firewalls do not support
Question