ExamGecko
Home / Palo Alto Networks / PSE-Strata
Ask Question

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 5

Question list
Search

List of questions

Search

Question 41

Report
Export
Collapse

A company has deployed the following

• VM-300 firewalls in AWS

• endpoint protection with the Traps Management Service

• a Panorama M-200 for managing its VM-Series firewalls

• PA-5220s for its internet perimeter,

• Prisma SaaS for SaaS security.

Which two products can send logs to the Cortex Data Lake? (Choose two).

Prisma SaaS
Prisma SaaS
Traps Management Service
Traps Management Service
VM-300 firewalls
VM-300 firewalls
Panorama M-200 appliance
Panorama M-200 appliance
Suggested answer: C, D
asked 23/09/2024
Raymond Chan
32 questions

Question 42

Report
Export
Collapse

Which profile or policy should be applied to protect against port scans from the internet?

Interface management profile on the zone of the ingress interface
Interface management profile on the zone of the ingress interface
Zone protection profile on the zone of the ingress interface
Zone protection profile on the zone of the ingress interface
An App-ID security policy rule to block traffic sourcing from the untrust zone
An App-ID security policy rule to block traffic sourcing from the untrust zone
Security profiles to security policy rules for traffic sourcing from the untrust zone
Security profiles to security policy rules for traffic sourcing from the untrust zone
Suggested answer: B
asked 23/09/2024
Sjoerd Kruit
32 questions

Question 43

Report
Export
Collapse

When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?

8MB
8MB
depends on the Cortex Data Lake tier purchased
depends on the Cortex Data Lake tier purchased
18 bytes
18 bytes
1500 bytes
1500 bytes
Suggested answer: D

Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVMCA0

asked 23/09/2024
Tyler Evans
36 questions

Question 44

Report
Export
Collapse

What can be applied to prevent users from unknowingly downloading malicious file types from the internet?

A vulnerability profile to security policy rules that deny general web access
A vulnerability profile to security policy rules that deny general web access
An antivirus profile to security policy rules that deny general web access
An antivirus profile to security policy rules that deny general web access
A zone protection profile to the untrust zone
A zone protection profile to the untrust zone
A file blocking profile to security policy rules that allow general web access
A file blocking profile to security policy rules that allow general web access
Suggested answer: D

Explanation:

https://docs.paloaltonetworks.com/best-practices/8-1/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles.html

asked 23/09/2024
Mina Shaker
45 questions

Question 45

Report
Export
Collapse

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

A)

Palo Alto Networks PSE-Strata image Question 45 54930 09232024001256000000

B)

Palo Alto Networks PSE-Strata image Question 45 54930 09232024001256000000

C)

Palo Alto Networks PSE-Strata image Question 45 54930 09232024001256000000

D)

Palo Alto Networks PSE-Strata image Question 45 54930 09232024001256000000

Option
Option
Option
Option
Option
Option
Option
Option
Suggested answer: A

Explanation:

https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html

asked 23/09/2024
Mohamed Khazem
25 questions

Question 46

Report
Export
Collapse

A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions.

Which Network Processing Card should be recommended in the Bill of Materials?

PA-7000-20GQ-NPC
PA-7000-20GQ-NPC
PA-7000-40G-NPC
PA-7000-40G-NPC
PA-7000-20GQXM-NPC
PA-7000-20GQXM-NPC
PA-7000-20G-NPC
PA-7000-20G-NPC
Suggested answer: C
asked 23/09/2024
Ramon Vieira da Rocha
37 questions

Question 47

Report
Export
Collapse

A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.

Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)

Informs WildFire and sends up a signature to the Cloud
Informs WildFire and sends up a signature to the Cloud
Collects forensic information about the event
Collects forensic information about the event
Communicates the status of the endpoint to the ESM
Communicates the status of the endpoint to the ESM
Notifies the user about the event
Notifies the user about the event
Remediates the event by deleting the malicious file
Remediates the event by deleting the malicious file
Suggested answer: B, C, D

Explanation:

https://investors.paloaltonetworks.com/node/11156/html

asked 23/09/2024
Arpita Pattnayak
50 questions

Question 48

Report
Export
Collapse

Which two types of security chains are supported by the Decryption Broker? (Choose two.)

virtual wire
virtual wire
transparent bridge
transparent bridge
Layer 3
Layer 3
Layer 2
Layer 2
Suggested answer: B, C

Explanation:

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-broker/decryption-broker-concepts/decryption-broker-security-chains-multiple.html

asked 23/09/2024
Farah Fauzi
41 questions

Question 49

Report
Export
Collapse

Which three new script types can be analyzed in WildFire? (Choose three.)

VBScript
VBScript
JScript
JScript
MonoScript
MonoScript
PythonScript
PythonScript
PowerShell Script
PowerShell Script
Suggested answer: A, B, E

Explanation:

The WildFire cloud is capable of analyzing the following script types:

JScript (.js)

VBScript (.vbs)

PowerShell Script (.ps1)

https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/latest-wildfire-cloud-features/script-sample-support

asked 23/09/2024
Amin Dashti
51 questions

Question 50

Report
Export
Collapse

Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)

dedicated pair of decryption forwarding interfaces required per security chain
dedicated pair of decryption forwarding interfaces required per security chain
a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule
a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule
a unique Decryption policy rule is required per security chain
a unique Decryption policy rule is required per security chain
a single pair of decryption forwarding interfaces
a single pair of decryption forwarding interfaces
Suggested answer: B, C
asked 23/09/2024
Cristian Bello Henriquez
34 questions
Total 139 questions
Go to page: of 14