ExamGecko
Home Home / Palo Alto Networks / PSE-Strata

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











Which task would be identified in Best Practice Assessment tool?

A.
identify the visibility and presence of command-and-control sessions
A.
identify the visibility and presence of command-and-control sessions
Answers
B.
identify sanctioned and unsanctioned SaaS applications
B.
identify sanctioned and unsanctioned SaaS applications
Answers
C.
identify the threats associated with each application
C.
identify the threats associated with each application
Answers
D.
identify and provide recommendations for device management access
D.
identify and provide recommendations for device management access
Answers
Suggested answer: B

A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.

How is this goal accomplished?

A.
Create a custom spyware signature matching the known signature with the time attribute
A.
Create a custom spyware signature matching the known signature with the time attribute
Answers
B.
Add a correlation object that tracks the occurrences and triggers above the desired threshold
B.
Add a correlation object that tracks the occurrences and triggers above the desired threshold
Answers
C.
Submit a request to Palo Alto Networks to change the behavior at the next update
C.
Submit a request to Palo Alto Networks to change the behavior at the next update
Answers
D.
Configure the Anti-Spyware profile with the number of rule counts to match the occurrence frequency
D.
Configure the Anti-Spyware profile with the number of rule counts to match the occurrence frequency
Answers
Suggested answer: A

For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same Prisma Access location servicing a single Datacenter? (Choose two.)

A.
Network segments in the Datacenter need to be advertised to only one Service Connection
A.
Network segments in the Datacenter need to be advertised to only one Service Connection
Answers
B.
The customer edge device needs to support policy-based routing with symmetric return functionality
B.
The customer edge device needs to support policy-based routing with symmetric return functionality
Answers
C.
The resources in the Datacenter will only be able to reach remote network resources that share the same region
C.
The resources in the Datacenter will only be able to reach remote network resources that share the same region
Answers
D.
A maximum of four service connections per Datacenter are supported with this topology
D.
A maximum of four service connections per Datacenter are supported with this topology
Answers
Suggested answer: A, D

WildFire subscription supports analysis of which three types? (Choose three.)

A.
GIF
A.
GIF
Answers
B.
7-Zip
B.
7-Zip
Answers
C.
Flash
C.
Flash
Answers
D.
RPM
D.
RPM
Answers
E.
ISO
E.
ISO
Answers
F.
DMG
F.
DMG
Answers
Suggested answer: B, C, E

Explanation:

Reference: https://www.niap-ccevs.org/MMO/Product/st_vid11032-agd1.pdf

In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?

A.
HA3
A.
HA3
Answers
B.
HA1
B.
HA1
Answers
C.
HA2
C.
HA2
Answers
D.
HA4
D.
HA4
Answers
Suggested answer: C

A potential customer requires an NGFW solution which enables high-throughput, low-latency network security, all while incorporating unprecedented features and technology. They need a solution that solves the performance problems that plague today's security infrastructure.

Which aspect of the Palo Alto Networks NGFW capabilities can you highlight to help them address the requirements?

A.
SP3 (Single Pass Parallel Processing)
A.
SP3 (Single Pass Parallel Processing)
Answers
B.
GlobalProtect
B.
GlobalProtect
Answers
C.
Threat Prevention
C.
Threat Prevention
Answers
D.
Elastic Load Balancers
D.
Elastic Load Balancers
Answers
Suggested answer: A

Explanation:

Reference: https://www.paloguard.com/SP3-Architecture.asp

Which three features are used to prevent abuse of stolen credentials? (Choose three.)

A.
multi-factor authentication
A.
multi-factor authentication
Answers
B.
URL Filtering Profiles
B.
URL Filtering Profiles
Answers
C.
WildFire Profiles
C.
WildFire Profiles
Answers
D.
Prisma Access
D.
Prisma Access
Answers
E.
SSL decryption rules
E.
SSL decryption rules
Answers
Suggested answer: A, C, E

Explanation:

Reference: https://www.paloaltonetworks.com/company/press/2017/palo-alto-networks-delivers-industry-first-capabilities-to-prevent-credential-theft-and-abuse

A customer has business-critical applications that rely on the general web-browsing application.

Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?

A.
File Blocking Profile
A.
File Blocking Profile
Answers
B.
DoS Protection Profile
B.
DoS Protection Profile
Answers
C.
URL Filtering Profile
C.
URL Filtering Profile
Answers
D.
Vulnerability Protection Profile
D.
Vulnerability Protection Profile
Answers
Suggested answer: A

Explanation:

Reference:

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjaw53CvdHyAhUPy4UKHXT5D-MQFnoECAMQAQ&url=https%3A%2F%2Fknowledgebase.paloaltonetworks.com%2Fservlet%2FfileField%3FentityId%3Dka10g000000U0roAAC%26field%3DAttachment_1__Body__s&usg=AOvVaw3DCBM7-FwWInkWYANLrzUt (32)

DRAG DROP

Match the WildFire Inline Machine Learning Model to the correct description for that model.


Question 79
Correct answer: Question 79

Explanation:

Reference: https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-inpanos-100/configure-wildfire-inline-ml.html

Which statement is true about Deviating Devices and metrics?

A.
A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation
A.
A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation
Answers
B.
Deviating Device Tab is only available with a SD-WAN Subscription
B.
Deviating Device Tab is only available with a SD-WAN Subscription
Answers
C.
An Administrator can set the metric health baseline along with a valid standard deviation
C.
An Administrator can set the metric health baseline along with a valid standard deviation
Answers
D.
Deviating Device Tab is only available for hardware-based firewalls
D.
Deviating Device Tab is only available for hardware-based firewalls
Answers
Suggested answer: A

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/panorama-managed-devices-health.html

Total 139 questions
Go to page: of 14