Palo Alto Networks PSE-Strata Practice Test - Questions Answers
List of questions
Question 1

What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)
https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus
Question 2

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}
Question 3

What are two advantages of the DNS Sinkholing feature? (Choose two.)
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing
Question 4

Which two products can send logs to the Cortex Data Lake? (Choose two.)
https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake
Question 5

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id
Question 6

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)
Question 7

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html
Question 8

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?
Question 9

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping
Question 10

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)
Question