ExamGecko
Home / Palo Alto Networks / PSE-Strata / List of questions
Ask Question

Palo Alto Networks PSE-Strata Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)

Next-generation firewalls deployed with WildFire Analysis Security Profiles
Next-generation firewalls deployed with WildFire Analysis Security Profiles
WF-500 configured as private clouds for privacy concerns
WF-500 configured as private clouds for privacy concerns
Correlation Objects generated by AutoFocus
Correlation Objects generated by AutoFocus
Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance
Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance
Palo Alto Networks non-firewall products such as Traps and Prisma SaaS
Palo Alto Networks non-firewall products such as Traps and Prisma SaaS
Suggested answer: C, D, E
Explanation:

https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus

asked 23/09/2024
Rajesh Gurav
28 questions

Question 2

Report Export Collapse

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}

prevention of cyber attacks
prevention of cyber attacks
safe enablement of all applications
safe enablement of all applications
threat remediation
threat remediation
defense against threats with static security solution
defense against threats with static security solution
Suggested answer: A, C
asked 23/09/2024
Miguel Pinar Guruceta
43 questions

Question 3

Report Export Collapse

What are two advantages of the DNS Sinkholing feature? (Choose two.)

It forges DNS replies to known malicious domains.
It forges DNS replies to known malicious domains.
It monitors DNS requests passively for malware domains.
It monitors DNS requests passively for malware domains.
It can be deployed independently of an Anti-Spyware Profile.
It can be deployed independently of an Anti-Spyware Profile.
It can work upstream from the internal DNS server.
It can work upstream from the internal DNS server.
Suggested answer: A, D
Explanation:

https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing

asked 23/09/2024
nagalingam mk
40 questions

Question 4

Report Export Collapse

Which two products can send logs to the Cortex Data Lake? (Choose two.)

AutoFocus
AutoFocus
PA-3260 firewall
PA-3260 firewall
Prisma Access
Prisma Access
Prisma Public Cloud
Prisma Public Cloud
Suggested answer: B, C
Explanation:

https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake

asked 23/09/2024
Diogo Vitor
38 questions

Question 5

Report Export Collapse

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)

User Mapping
User Mapping
Proxy Authentication
Proxy Authentication
Group Mapping
Group Mapping
802.1X Authentication
802.1X Authentication
Suggested answer: A, C
Explanation:

https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id

asked 23/09/2024
Stephanie Scheffers
42 questions

Question 6

Report Export Collapse

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

breach the perimeter
breach the perimeter
weaponize vulnerabilities
weaponize vulnerabilities
lateral movement
lateral movement
exfiltrate data
exfiltrate data
recon the target
recon the target
deliver the malware
deliver the malware
Suggested answer: A, C, D, F
asked 23/09/2024
Jesse Moisio
43 questions

Question 7

Report Export Collapse

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

define an SSL decryption rulebase
define an SSL decryption rulebase
enable User-ID
enable User-ID
validate credential submission detection
validate credential submission detection
enable App-ID
enable App-ID
define URL Filtering Profile
define URL Filtering Profile
Suggested answer: B, C, E
Explanation:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html

asked 23/09/2024
Alper Atar
32 questions

Question 8

Report Export Collapse

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

Create a footnote within the SLR generation tool
Create a footnote within the SLR generation tool
Edit the Key-Findings text to list the other types of categories that may be of interest
Edit the Key-Findings text to list the other types of categories that may be of interest
Remove unwanted categories listed under 'High Risk' and use relevant information
Remove unwanted categories listed under 'High Risk' and use relevant information
Produce the report and edit the PDF manually
Produce the report and edit the PDF manually
Suggested answer: C
asked 23/09/2024
Henny Smit
36 questions

Question 9

Report Export Collapse

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

eDirectory monitoring
eDirectory monitoring
Client Probing
Client Probing
SNMP server
SNMP server
TACACS
TACACS
Active Directory monitoring
Active Directory monitoring
Lotus Domino
Lotus Domino
RADIUS
RADIUS
Suggested answer: B, D, G
Explanation:

https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping

asked 23/09/2024
Ayyaz Rehan Ikram
24 questions

Question 10

Report Export Collapse

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

retention requirements
retention requirements
Traps agent forensic data
Traps agent forensic data
the number of Traps agents
the number of Traps agents
agent size and OS
agent size and OS
Suggested answer: B, D
asked 23/09/2024
marco giovinazzo
29 questions
Total 139 questions
Go to page: of 14