ExamGecko
Home / Palo Alto Networks / PSE-Strata
Ask Question

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 2

Question list
Search

List of questions

Search

Question 11

Report
Export
Collapse

What are two benefits of using Panorama for a customer who is deploying virtual firewalls to secure data center traffic? (Choose two.)

It can provide the Automated Correlation Engine functionality, which the virtual firewalls do not support.
It can provide the Automated Correlation Engine functionality, which the virtual firewalls do not support.
It can monitor the virtual firewalls' physical hosts and Vmotion them as necessary
It can monitor the virtual firewalls' physical hosts and Vmotion them as necessary
It can automatically create address groups for use with KVM.
It can automatically create address groups for use with KVM.
It can bootstrap the virtual firewalls for dynamic deployment scenarios.
It can bootstrap the virtual firewalls for dynamic deployment scenarios.
Suggested answer: A, D
asked 23/09/2024
Aimé Tameti
42 questions

Question 12

Report
Export
Collapse

Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)

Network Tab
Network Tab
Policies Tab
Policies Tab
Device Tab
Device Tab
Objects Tab
Objects Tab
Suggested answer: A, C

Explanation:

https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/panorama-webinterface/panorama-templates/template-stacks

asked 23/09/2024
ADAMA DAO
39 questions

Question 13

Report
Export
Collapse

An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address Which mechanism prevents this connection from succeeding?

DNS Sinkholing
DNS Sinkholing
DNS Proxy
DNS Proxy
Anti-Spyware Signatures
Anti-Spyware Signatures
Wildfire Analysis
Wildfire Analysis
Suggested answer: A
asked 23/09/2024
junjie wang
36 questions

Question 14

Report
Export
Collapse

How frequently do WildFire signatures move into the antivirus database?

every 24 hours
every 24 hours
every 12 hours
every 12 hours
once a week
once a week
every 1 hour
every 1 hour
Suggested answer: A

Explanation:

https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/wildfire-overview/wildfireconcepts/wildfire-signatures

asked 23/09/2024
Kurt Onal
43 questions

Question 15

Report
Export
Collapse

What are two presales selling advantages of using Expedition? (Choose two.)

map migration gaps to professional services statement of Works (SOWs)
map migration gaps to professional services statement of Works (SOWs)
streamline & migrate to Layer7 policies using Policy Optimizer
streamline & migrate to Layer7 policies using Policy Optimizer
reduce effort to implement policies based on App-ID and User-ID
reduce effort to implement policies based on App-ID and User-ID
easy migration process to move to Palo Alto Networks NGFWs
easy migration process to move to Palo Alto Networks NGFWs
Suggested answer: A, D
asked 23/09/2024
Beena Bamania
34 questions

Question 16

Report
Export
Collapse

Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)

Traffic is separated by zones
Traffic is separated by zones
Policy match is based on application
Policy match is based on application
Identification of application is possible on any port
Identification of application is possible on any port
Traffic control is based on IP port, and protocol
Traffic control is based on IP port, and protocol
Suggested answer: B, C
asked 23/09/2024
Alexander Voronetsky
42 questions

Question 17

Report
Export
Collapse

An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.

The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)

Control of post rules
Control of post rules
Control local firewall rules
Control local firewall rules
Ensure management continuity
Ensure management continuity
Improve log collection redundancy
Improve log collection redundancy
Suggested answer: C, D
asked 23/09/2024
Cornel Sasu
35 questions

Question 18

Report
Export
Collapse

Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?

A)

Palo Alto Networks PSE-Strata image Question 18 54903 09232024001256000000

B)

Palo Alto Networks PSE-Strata image Question 18 54903 09232024001256000000

C)

Palo Alto Networks PSE-Strata image Question 18 54903 09232024001256000000

D)

Palo Alto Networks PSE-Strata image Question 18 54903 09232024001256000000

Option
Option
Option
Option
Option
Option
Option
Option
Suggested answer: A

Explanation:

https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html

asked 23/09/2024
Muhammad Imran Khan
35 questions

Question 19

Report
Export
Collapse

Which two network events are highlighted through correlation objects as potential security risks?

(Choose two.)

Identified vulnerability exploits
Identified vulnerability exploits
Launch of an identified malware executable file
Launch of an identified malware executable file
Endpoints access files from a removable drive
Endpoints access files from a removable drive
Suspicious host behavior
Suspicious host behavior
Suggested answer: A, D
asked 23/09/2024
Michele Valvason
40 questions

Question 20

Report
Export
Collapse

Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)

use of decryption policies
use of decryption policies
measure the adoption of URL filters. App-ID. User-ID
measure the adoption of URL filters. App-ID. User-ID
use of device management access and settings
use of device management access and settings
expose the visibility and presence of command-and-control sessions
expose the visibility and presence of command-and-control sessions
identify sanctioned and unsanctioned SaaS applications
identify sanctioned and unsanctioned SaaS applications
Suggested answer: A, B, E
asked 23/09/2024
Nisanka Mandara
39 questions
Total 139 questions
Go to page: of 14