ExamGecko
Home Home / Palo Alto Networks / PSE-Strata

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)

A.
Quarantine
A.
Quarantine
Answers
B.
Allow
B.
Allow
Answers
C.
Reset
C.
Reset
Answers
D.
Redirect
D.
Redirect
Answers
E.
Drop
E.
Drop
Answers
F.
Alert
F.
Alert
Answers
Suggested answer: B, C, E, F

Explanation:

https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/anti-spyware-profiles.html

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center Which VM instance should be used to secure the network by this customer?

A.
VM-200
A.
VM-200
Answers
B.
VM-100
B.
VM-100
Answers
C.
VM-50
C.
VM-50
Answers
D.
VM-300
D.
VM-300
Answers
Suggested answer: C

Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?

A.
WildFire on the firewall, and AutoFocus on Panorama
A.
WildFire on the firewall, and AutoFocus on Panorama
Answers
B.
Threat Prevention on the firewall, and Support on Panorama
B.
Threat Prevention on the firewall, and Support on Panorama
Answers
C.
GlobalProtect on the firewall, and Threat Prevention on Panorama
C.
GlobalProtect on the firewall, and Threat Prevention on Panorama
Answers
D.
URL Filtering on the firewall, and MineMeld on Panorama
D.
URL Filtering on the firewall, and MineMeld on Panorama
Answers
Suggested answer: B

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)

A.
Threat logs
A.
Threat logs
Answers
B.
WildFire analysis reports
B.
WildFire analysis reports
Answers
C.
Botnet reports
C.
Botnet reports
Answers
D.
Data filtering logs
D.
Data filtering logs
Answers
E.
SaaS reports
E.
SaaS reports
Answers
Suggested answer: B, C, D

When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?

A.
1500 to 2500 bytes
A.
1500 to 2500 bytes
Answers
B.
10MB to 30 MB
B.
10MB to 30 MB
Answers
C.
1MB to 5 MB
C.
1MB to 5 MB
Answers
D.
100MB to 200 MB
D.
100MB to 200 MB
Answers
Suggested answer: D

A customer with a legacy firewall architecture is focused on port and protocol level security, and has heard that next generation firewalls open all ports by default. What is the appropriate rebuttal that positions the value of a NGFW over a legacy firewall?

A.
Palo Alto Networks keep ports closed by default, only opening ports after understanding the application request, and then opening only the application-specified ports.
A.
Palo Alto Networks keep ports closed by default, only opening ports after understanding the application request, and then opening only the application-specified ports.
Answers
B.
Palo Alto Networks does not consider port information, instead relying on App-ID signatures that do not reference ports.
B.
Palo Alto Networks does not consider port information, instead relying on App-ID signatures that do not reference ports.
Answers
C.
Default policies block all interzone traffic. Palo Alto Networks empowers you to control applications by default ports or a configurable list of approved ports on a per-policy basis.
C.
Default policies block all interzone traffic. Palo Alto Networks empowers you to control applications by default ports or a configurable list of approved ports on a per-policy basis.
Answers
D.
Palo Alto Networks NGFW protects all applications on all ports while leaving all ports opened by default.
D.
Palo Alto Networks NGFW protects all applications on all ports while leaving all ports opened by default.
Answers
Suggested answer: B

Which two steps are required to configure the Decryption Broker? (Choose two.)

A.
reboot the firewall to activate the license
A.
reboot the firewall to activate the license
Answers
B.
activate the Decryption Broker license
B.
activate the Decryption Broker license
Answers
C.
enable SSL Forward Proxy decryption
C.
enable SSL Forward Proxy decryption
Answers
D.
enable a pair of virtual wire interfaces to forward decrypted traffic
D.
enable a pair of virtual wire interfaces to forward decrypted traffic
Answers
Suggested answer: B, D

What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)

A.
when you're delivering a security strategy
A.
when you're delivering a security strategy
Answers
B.
when client's want to see the power of the platform
B.
when client's want to see the power of the platform
Answers
C.
provide users visibility into the applications currently allowed on the network
C.
provide users visibility into the applications currently allowed on the network
Answers
D.
help streamline the deployment and migration of NGFWs
D.
help streamline the deployment and migration of NGFWs
Answers
E.
assess the state of NGFW feature adoption
E.
assess the state of NGFW feature adoption
Answers
Suggested answer: B, C, E

An Administrator needs a PDF summary report that contains information compiled from existing reports based on data for the Top five(5) in each category Which two timeframe options are available to send this report? (Choose two.)

A.
Daily
A.
Daily
Answers
B.
Monthly
B.
Monthly
Answers
C.
Weekly
C.
Weekly
Answers
D.
Bi-weekly
D.
Bi-weekly
Answers
Suggested answer: A, C

Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)

A.
Vulnerability protection
A.
Vulnerability protection
Answers
B.
Anti-Spyware
B.
Anti-Spyware
Answers
C.
Anti-Virus
C.
Anti-Virus
Answers
D.
Botnet detection
D.
Botnet detection
Answers
E.
App-ID protection
E.
App-ID protection
Answers
Suggested answer: A, B, E
Total 139 questions
Go to page: of 14