ExamGecko
Home Home / Palo Alto Networks / PSE-Strata

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











DRAG DROP

Match the functions to the appropriate processing engine within the dataplane.


Question 81
Correct answer: Question 81

What are three considerations when deploying User-ID? (Choose three.)

A.
Specify included and excluded networks when configuring User-ID
A.
Specify included and excluded networks when configuring User-ID
Answers
B.
Only enable User-ID on trusted zones
B.
Only enable User-ID on trusted zones
Answers
C.
Use a dedicated service account for User-ID services with the minimal permissions necessary
C.
Use a dedicated service account for User-ID services with the minimal permissions necessary
Answers
D.
User-ID can support a maximum of 15 hops
D.
User-ID can support a maximum of 15 hops
Answers
E.
Enable WMI probing in high security networks
E.
Enable WMI probing in high security networks
Answers
Suggested answer: A, B, C

Which three considerations should be made prior to installing a decryption policy on the NGFW?

(Choose three.)

A.
Include all traffic types in decryption policy
A.
Include all traffic types in decryption policy
Answers
B.
Inability to access websites
B.
Inability to access websites
Answers
C.
Exclude certain types of traffic in decryption policy
C.
Exclude certain types of traffic in decryption policy
Answers
D.
Deploy decryption setting all at one time
D.
Deploy decryption setting all at one time
Answers
E.
Ensure throughput is not an issue
E.
Ensure throughput is not an issue
Answers
Suggested answer: A, B, C

Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

A.
Connector
A.
Connector
Answers
B.
Database
B.
Database
Answers
C.
Recipient
C.
Recipient
Answers
D.
Operator
D.
Operator
Answers
E.
Attribute
E.
Attribute
Answers
F.
Schedule
F.
Schedule
Answers
Suggested answer: A, D, E

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/view-andmanage-reports/generate-custom-reports

Which three platform components can identify and protect against malicious email links? (Choose three.)

A.
WildFire hybrid cloud solution
A.
WildFire hybrid cloud solution
Answers
B.
WildFire public cloud
B.
WildFire public cloud
Answers
C.
WF-500
C.
WF-500
Answers
D.
M-200
D.
M-200
Answers
E.
M-600
E.
M-600
Answers
Suggested answer: B, C, D

When having a customer pre-sales call, which aspects of the NGFW should be covered?

A.
The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks
A.
The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks
Answers
B.
The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Control (C2) communications to protect your network from cyberthreats. URL categories that identify confirmed malicious content — malware, phishing, and C2 are updated every five minutes — to ensure that you can manage access to these sites within minutes of categorization
B.
The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Control (C2) communications to protect your network from cyberthreats. URL categories that identify confirmed malicious content — malware, phishing, and C2 are updated every five minutes — to ensure that you can manage access to these sites within minutes of categorization
Answers
C.
The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor
C.
The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor
Answers
D.
Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing
D.
Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing
Answers
Suggested answer: D

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering

What action would address the sub-optimal traffic path shown in the figure?

Key:

RN - Remote Network

SC - Service Connection

MU GW - Mobile User Gateway

A.
Onboard a Service Connection in the Americas region
A.
Onboard a Service Connection in the Americas region
Answers
B.
Remove the Service Connection in the EMEA region
B.
Remove the Service Connection in the EMEA region
Answers
C.
Onboard a Service Connection in the APAC region
C.
Onboard a Service Connection in the APAC region
Answers
D.
Onboard a Remote Network location in the EMEA region
D.
Onboard a Remote Network location in the EMEA region
Answers
Suggested answer: C

What are the three possible verdicts in WildFire Submissions log entries for a submitted sample?

(Choose four.)

A.
Benign
A.
Benign
Answers
B.
Spyware
B.
Spyware
Answers
C.
Malicious
C.
Malicious
Answers
D.
Phishing
D.
Phishing
Answers
E.
Grayware
E.
Grayware
Answers
Suggested answer: A, C, D, E

Explanation:

Reference: https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/monitor-wildfire-activity/use-the-firewall-to-monitor-malware/monitor-wildfire-submissions-and-analysisreports.html

What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)

A.
Errors
A.
Errors
Answers
B.
Environments
B.
Environments
Answers
C.
Interfaces
C.
Interfaces
Answers
D.
Mounts
D.
Mounts
Answers
E.
Throughput
E.
Throughput
Answers
F.
Sessions
F.
Sessions
Answers
G.
Status
G.
Status
Answers
Suggested answer: B, C, F

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/detailed-device-health-in-panorama.html

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

A.
M-200
A.
M-200
Answers
B.
M-600
B.
M-600
Answers
C.
M-100
C.
M-100
Answers
D.
Panorama VM-Series
D.
Panorama VM-Series
Answers
Suggested answer: D

Explanation:

Reference:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boF1CAI

Total 139 questions
Go to page: of 14