ExamGecko
Home Home / Palo Alto Networks / PSE-Strata

Palo Alto Networks PSE-Strata Practice Test - Questions Answers

Question list
Search
Search

Related questions











What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)

A.
Next-generation firewalls deployed with WildFire Analysis Security Profiles
A.
Next-generation firewalls deployed with WildFire Analysis Security Profiles
Answers
B.
WF-500 configured as private clouds for privacy concerns
B.
WF-500 configured as private clouds for privacy concerns
Answers
C.
Correlation Objects generated by AutoFocus
C.
Correlation Objects generated by AutoFocus
Answers
D.
Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance
D.
Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance
Answers
E.
Palo Alto Networks non-firewall products such as Traps and Prisma SaaS
E.
Palo Alto Networks non-firewall products such as Traps and Prisma SaaS
Answers
Suggested answer: C, D, E

Explanation:

https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}

A.
prevention of cyber attacks
A.
prevention of cyber attacks
Answers
B.
safe enablement of all applications
B.
safe enablement of all applications
Answers
C.
threat remediation
C.
threat remediation
Answers
D.
defense against threats with static security solution
D.
defense against threats with static security solution
Answers
Suggested answer: A, C

What are two advantages of the DNS Sinkholing feature? (Choose two.)

A.
It forges DNS replies to known malicious domains.
A.
It forges DNS replies to known malicious domains.
Answers
B.
It monitors DNS requests passively for malware domains.
B.
It monitors DNS requests passively for malware domains.
Answers
C.
It can be deployed independently of an Anti-Spyware Profile.
C.
It can be deployed independently of an Anti-Spyware Profile.
Answers
D.
It can work upstream from the internal DNS server.
D.
It can work upstream from the internal DNS server.
Answers
Suggested answer: A, D

Explanation:

https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing

Which two products can send logs to the Cortex Data Lake? (Choose two.)

A.
AutoFocus
A.
AutoFocus
Answers
B.
PA-3260 firewall
B.
PA-3260 firewall
Answers
C.
Prisma Access
C.
Prisma Access
Answers
D.
Prisma Public Cloud
D.
Prisma Public Cloud
Answers
Suggested answer: B, C

Explanation:

https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)

A.
User Mapping
A.
User Mapping
Answers
B.
Proxy Authentication
B.
Proxy Authentication
Answers
C.
Group Mapping
C.
Group Mapping
Answers
D.
802.1X Authentication
D.
802.1X Authentication
Answers
Suggested answer: A, C

Explanation:

https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

A.
breach the perimeter
A.
breach the perimeter
Answers
B.
weaponize vulnerabilities
B.
weaponize vulnerabilities
Answers
C.
lateral movement
C.
lateral movement
Answers
D.
exfiltrate data
D.
exfiltrate data
Answers
E.
recon the target
E.
recon the target
Answers
F.
deliver the malware
F.
deliver the malware
Answers
Suggested answer: A, C, D, F

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

A.
define an SSL decryption rulebase
A.
define an SSL decryption rulebase
Answers
B.
enable User-ID
B.
enable User-ID
Answers
C.
validate credential submission detection
C.
validate credential submission detection
Answers
D.
enable App-ID
D.
enable App-ID
Answers
E.
define URL Filtering Profile
E.
define URL Filtering Profile
Answers
Suggested answer: B, C, E

Explanation:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

A.
Create a footnote within the SLR generation tool
A.
Create a footnote within the SLR generation tool
Answers
B.
Edit the Key-Findings text to list the other types of categories that may be of interest
B.
Edit the Key-Findings text to list the other types of categories that may be of interest
Answers
C.
Remove unwanted categories listed under 'High Risk' and use relevant information
C.
Remove unwanted categories listed under 'High Risk' and use relevant information
Answers
D.
Produce the report and edit the PDF manually
D.
Produce the report and edit the PDF manually
Answers
Suggested answer: C

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

A.
eDirectory monitoring
A.
eDirectory monitoring
Answers
B.
Client Probing
B.
Client Probing
Answers
C.
SNMP server
C.
SNMP server
Answers
D.
TACACS
D.
TACACS
Answers
E.
Active Directory monitoring
E.
Active Directory monitoring
Answers
F.
Lotus Domino
F.
Lotus Domino
Answers
G.
RADIUS
G.
RADIUS
Answers
Suggested answer: B, D, G

Explanation:

https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

A.
retention requirements
A.
retention requirements
Answers
B.
Traps agent forensic data
B.
Traps agent forensic data
Answers
C.
the number of Traps agents
C.
the number of Traps agents
Answers
D.
agent size and OS
D.
agent size and OS
Answers
Suggested answer: B, D
Total 139 questions
Go to page: of 14