ExamGecko
Home Home / Palo Alto Networks / PSE-Strata

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 13

Question list
Search
Search

Related questions











Which two features are key in preventing unknown targeted attacks? (Choose two)

A.
nighty botnet report
A.
nighty botnet report
Answers
B.
App-ID with the Zero Trust model
B.
App-ID with the Zero Trust model
Answers
C.
WildFire Cloud threat analysis
C.
WildFire Cloud threat analysis
Answers
D.
Single Pass Parallel Processing (SP3)
D.
Single Pass Parallel Processing (SP3)
Answers
Suggested answer: B, C

A customer is designing a private data center to host their new web application along with a separate headquarters for users.

Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?

A.
Threat Prevention
A.
Threat Prevention
Answers
B.
DNS Security
B.
DNS Security
Answers
C.
WildFire
C.
WildFire
Answers
D.
Advanced URL Filtering (AURLF)
D.
Advanced URL Filtering (AURLF)
Answers
Suggested answer: A

Which two methods are used to check for Corporate Credential Submissions? (Choose two.)

A.
doman credentialiter
A.
doman credentialiter
Answers
B.
User-ID credential check
B.
User-ID credential check
Answers
C.
LDAP query
C.
LDAP query
Answers
D.
IP user mapping
D.
IP user mapping
Answers
Suggested answer: A, B

Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?

A.
>show sdwan path-monitor stats vif
A.
>show sdwan path-monitor stats vif
Answers
B.
>show sdwan session distribution policy-name
B.
>show sdwan session distribution policy-name
Answers
C.
>show sdwan connection all
C.
>show sdwan connection all
Answers
D.
>show sdwan event
D.
>show sdwan event
Answers
Suggested answer: D

A customer requires an analytics tool with the following attributes:

- Uses the logs on the firewall to detect actionable events on the network

- Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network

- Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources Which feature of PAN-OS will address these requirements?

A.
WildFire with application program interface (API) calls for automation
A.
WildFire with application program interface (API) calls for automation
Answers
B.
Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs
B.
Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs
Answers
C.
Automated correlation engine (ACE)
C.
Automated correlation engine (ACE)
Answers
D.
Cortex XDR and Cortex Data Lake
D.
Cortex XDR and Cortex Data Lake
Answers
Suggested answer: C

What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)

A.
operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)
A.
operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)
Answers
B.
improved revenue due to more efficient network traffic throughput
B.
improved revenue due to more efficient network traffic throughput
Answers
C.
Increased security due to scalable cloud delivered security Services (CDSS)
C.
Increased security due to scalable cloud delivered security Services (CDSS)
Answers
D.
Cost savings due to reduction in IT management effort and device
D.
Cost savings due to reduction in IT management effort and device
Answers
Suggested answer: B, C, D

Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?

A.
Prisma SaaS API
A.
Prisma SaaS API
Answers
B.
Threat intelligence Cloud
B.
Threat intelligence Cloud
Answers
C.
GlobalProtect
C.
GlobalProtect
Answers
D.
Cortex XDR
D.
Cortex XDR
Answers
Suggested answer: C

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

A.
WildFire
A.
WildFire
Answers
B.
DNS Security
B.
DNS Security
Answers
C.
Threat Prevention
C.
Threat Prevention
Answers
D.
loT Security
D.
loT Security
Answers
Suggested answer: B
A.
Step 4. Create the Zero Trust policy.
A.
Step 4. Create the Zero Trust policy.
Answers
B.
Step 2: Map the transaction flows.
B.
Step 2: Map the transaction flows.
Answers
C.
Step 3. Architect a Zero Trust network.
C.
Step 3. Architect a Zero Trust network.
Answers
D.
Step 1: Define the protect surface
D.
Step 1: Define the protect surface
Answers
Suggested answer: D

Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?

A.
Dynamic user groups (DUGS)
A.
Dynamic user groups (DUGS)
Answers
B.
tagging groups
B.
tagging groups
Answers
C.
remote device User-ID groups
C.
remote device User-ID groups
Answers
D.
dynamic address groups (DAGs)
D.
dynamic address groups (DAGs)
Answers
Suggested answer: A
Total 139 questions
Go to page: of 14