ExamGecko
Home / Palo Alto Networks / PSE-Strata
Ask Question

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 11

Question list
Search

List of questions

Search

Question 101

Report
Export
Collapse

Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?

Security policy rule
Security policy rule
Tag
Tag
Login ID
Login ID
IP address
IP address
Suggested answer: B
asked 23/09/2024
ahmed bin shehab
45 questions

Question 102

Report
Export
Collapse

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

Validate user identities through authentication
Validate user identities through authentication
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
Categorize data and applications by levels of sensitivity
Categorize data and applications by levels of sensitivity
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
Suggested answer: A, C
asked 23/09/2024
Raphael Oliveir
42 questions

Question 103

Report
Export
Collapse

Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?

User ID and Device-ID
User ID and Device-ID
Source-D and Network.ID
Source-D and Network.ID
Source ID and Device-ID
Source ID and Device-ID
User-ID and Source-ID
User-ID and Source-ID
Suggested answer: A
asked 23/09/2024
Ali Diaz
31 questions

Question 104

Report
Export
Collapse

When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can belogged?

Become a Premium Member for full access
  Unlock Premium Member

Question 105

Report
Export
Collapse

Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?

Become a Premium Member for full access
  Unlock Premium Member

Question 106

Report
Export
Collapse

WildFire can discover zero-day malware in which three types of traffic? (Choose three)

Become a Premium Member for full access
  Unlock Premium Member

Question 107

Report
Export
Collapse

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 108

Report
Export
Collapse

What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?

Become a Premium Member for full access
  Unlock Premium Member

Question 109

Report
Export
Collapse

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

Become a Premium Member for full access
  Unlock Premium Member

Question 110

Report
Export
Collapse

A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).

Which Security profile is used to configure Domain Name Security (DNS) to Identity and block previously unknown DGA-based threats in real time?

Become a Premium Member for full access
  Unlock Premium Member
Total 139 questions
Go to page: of 14