PSE-Strata: Palo Alto Networks System Engineer - Strata


Related questions
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping
Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)
A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.
The customer uses a firewall with User-ID enabled
Which feature must also be enabled to prevent these attacks?
Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?
https://live.paloaltonetworks.com/t5/minemeld-articles/connecting-pan-os-to-minemeld-using-external-dynamic-lists/ta-p/190414
Which are the three mandatory components needed to run Cortex XDR? (Choose three.)
https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/cortex-xdr-prevent-overview/cortex-xdr-prevent-architecture
Which three considerations should be made prior to installing a decryption policy on the NGFW?
(Choose three.)
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?
A)
B)
C)
D)
Which two network events are highlighted through correlation objects as potential security risks?
(Choose two.)
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A)
B)
C)
D)
https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html
What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)
https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus
Question