ExamGecko
Home Home / Palo Alto Networks / PSE-Strata

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security.

The firewall provides which three types of reports? (Choose three.)

A.
SNMP Reports
A.
SNMP Reports
Answers
B.
PDF Summary Reports
B.
PDF Summary Reports
Answers
C.
Netflow Reports
C.
Netflow Reports
Answers
D.
Botnet Reports
D.
Botnet Reports
Answers
E.
User or Group Activity Reports
E.
User or Group Activity Reports
Answers
Suggested answer: C, D, E

Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?

A.
BPA
A.
BPA
Answers
B.
PPA
B.
PPA
Answers
C.
Expedition
C.
Expedition
Answers
D.
SLR
D.
SLR
Answers
Suggested answer: A

What is the key benefit of Palo Alto Networks Single Pass Parallel Processing design?

A.
There are no benefits other than slight performance upgrades
A.
There are no benefits other than slight performance upgrades
Answers
B.
It allows Palo Alto Networks to add new functions to existing hardware
B.
It allows Palo Alto Networks to add new functions to existing hardware
Answers
C.
Only one processor is needed to complete all the functions within the box
C.
Only one processor is needed to complete all the functions within the box
Answers
D.
It allows Palo Alto Networks to add new devices to existing hardware
D.
It allows Palo Alto Networks to add new devices to existing hardware
Answers
Suggested answer: B

Which security profile on the NGFW includes signatures to protect you from brute force attacks?

A.
Zone Protection Profile
A.
Zone Protection Profile
Answers
B.
URL Filtering Profile
B.
URL Filtering Profile
Answers
C.
Vulnerability Protection Profile
C.
Vulnerability Protection Profile
Answers
D.
Anti-Spyware Profile
D.
Anti-Spyware Profile
Answers
Suggested answer: C

The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTPdecoder for URL filtering is handled by which component in the NGFW?

A.
First Packet Processor
A.
First Packet Processor
Answers
B.
Stream-based Signature Engine
B.
Stream-based Signature Engine
Answers
C.
SIA (Scan It All) Processing Engine
C.
SIA (Scan It All) Processing Engine
Answers
D.
Security Processing Engine
D.
Security Processing Engine
Answers
Suggested answer: B

Explanation:

Reference:

https://media.paloaltonetworks.com/documents/Single_Pass_Parallel_Processing_Architecture.pdfn (page 6)

A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources.

Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?

A.
The Automated Correlation Engine
A.
The Automated Correlation Engine
Answers
B.
Cortex XDR and Cortex Data Lake
B.
Cortex XDR and Cortex Data Lake
Answers
C.
WildFire with API calls for automation
C.
WildFire with API calls for automation
Answers
D.
3rd Party SIEM which can ingest NGFW logs and perform event correlation
D.
3rd Party SIEM which can ingest NGFW logs and perform event correlation
Answers
Suggested answer: A

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/use-the-automated-correlation-engine.html

Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)

A.
FTP
A.
FTP
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
RTP
C.
RTP
Answers
D.
HTTP
D.
HTTP
Answers
Suggested answer: B, D

What two types of certificates are used to configure SSL Forward Proxy? (?hoose two.)

A.
Enterprise CA-signed certificates
A.
Enterprise CA-signed certificates
Answers
B.
Self-Signed certificates
B.
Self-Signed certificates
Answers
C.
Intermediate certificates
C.
Intermediate certificates
Answers
D.
Private key certificates
D.
Private key certificates
Answers
Suggested answer: A, B

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/configure-sslforward-proxy#:~:text=You%20can%20use%20an%20enterprise,as%20the%20forward%20trust%20certificate.&text=Certificate%20Name-,.,unique%20name%20for%20each%20firewall

Which two of the following does decryption broker provide on a NGFW? (Choose two.)

A.
Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once
A.
Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once
Answers
B.
Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcement
B.
Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcement
Answers
C.
Provides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and enforcement
C.
Provides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and enforcement
Answers
D.
Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times
D.
Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times
Answers
Suggested answer: A, D

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryptionbroker.html

There are different Master Keys on Panorama and managed firewalls.

What is the result if a Panorama Administrator pushes configuration to managed firewalls?

A.
The push operation will fail regardless of an error or not within the configuration itself
A.
The push operation will fail regardless of an error or not within the configuration itself
Answers
B.
Provided there’s no error within the configuration to be pushed, the push will succeed
B.
Provided there’s no error within the configuration to be pushed, the push will succeed
Answers
C.
The Master Key from the managed firewalls will be overwritten with the Master Key from Panorama
C.
The Master Key from the managed firewalls will be overwritten with the Master Key from Panorama
Answers
D.
There will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls
D.
There will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls
Answers
Suggested answer: A

Explanation:

Reference:

https://www.reddit.com/r/paloaltonetworks/comments/onz15y/what_is_the_result_if_a_panorama_administrator/

Total 139 questions
Go to page: of 14