ExamGecko
Home / Palo Alto Networks / PSE-Strata
Ask Question

Palo Alto Networks PSE-Strata Practice Test - Questions Answers, Page 9

Question list
Search

Question 81

Report
Export
Collapse

DRAG DROP

Match the functions to the appropriate processing engine within the dataplane.


Palo Alto Networks PSE-Strata image Question 81
Correct answer: Palo Alto Networks PSE-Strata image Question 81
asked 23/09/2024
adir tamam
32 questions

Question 82

Report
Export
Collapse

What are three considerations when deploying User-ID? (Choose three.)

Specify included and excluded networks when configuring User-ID
Specify included and excluded networks when configuring User-ID
Only enable User-ID on trusted zones
Only enable User-ID on trusted zones
Use a dedicated service account for User-ID services with the minimal permissions necessary
Use a dedicated service account for User-ID services with the minimal permissions necessary
User-ID can support a maximum of 15 hops
User-ID can support a maximum of 15 hops
Enable WMI probing in high security networks
Enable WMI probing in high security networks
Suggested answer: A, B, C
asked 23/09/2024
Robert Pila
39 questions

Question 83

Report
Export
Collapse

Which three considerations should be made prior to installing a decryption policy on the NGFW?

(Choose three.)

Include all traffic types in decryption policy
Include all traffic types in decryption policy
Inability to access websites
Inability to access websites
Exclude certain types of traffic in decryption policy
Exclude certain types of traffic in decryption policy
Deploy decryption setting all at one time
Deploy decryption setting all at one time
Ensure throughput is not an issue
Ensure throughput is not an issue
Suggested answer: A, B, C
asked 23/09/2024
Vasco Rodrigues
40 questions

Question 84

Report
Export
Collapse

Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

Connector
Connector
Database
Database
Recipient
Recipient
Operator
Operator
Attribute
Attribute
Schedule
Schedule
Suggested answer: A, D, E

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/view-andmanage-reports/generate-custom-reports

asked 23/09/2024
Alfredo Alfaro
47 questions

Question 85

Report
Export
Collapse

Which three platform components can identify and protect against malicious email links? (Choose three.)

WildFire hybrid cloud solution
WildFire hybrid cloud solution
WildFire public cloud
WildFire public cloud
WF-500
WF-500
M-200
M-200
M-600
M-600
Suggested answer: B, C, D
asked 23/09/2024
Jatuchot Siriwongsilp
41 questions

Question 86

Report
Export
Collapse

When having a customer pre-sales call, which aspects of the NGFW should be covered?

The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks
The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks
The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Control (C2) communications to protect your network from cyberthreats. URL categories that identify confirmed malicious content — malware, phishing, and C2 are updated every five minutes — to ensure that you can manage access to these sites within minutes of categorization
The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Control (C2) communications to protect your network from cyberthreats. URL categories that identify confirmed malicious content — malware, phishing, and C2 are updated every five minutes — to ensure that you can manage access to these sites within minutes of categorization
The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor
The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor
Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing
Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing
Suggested answer: D

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering

asked 23/09/2024
Madhankumar Rathinakumar
35 questions

Question 87

Report
Export
Collapse

Palo Alto Networks PSE-Strata image Question 87 54972 09232024001256000000

What action would address the sub-optimal traffic path shown in the figure?

Key:

RN - Remote Network

SC - Service Connection

MU GW - Mobile User Gateway

Onboard a Service Connection in the Americas region
Onboard a Service Connection in the Americas region
Remove the Service Connection in the EMEA region
Remove the Service Connection in the EMEA region
Onboard a Service Connection in the APAC region
Onboard a Service Connection in the APAC region
Onboard a Remote Network location in the EMEA region
Onboard a Remote Network location in the EMEA region
Suggested answer: C
asked 23/09/2024
Benvindo Almeida
41 questions

Question 88

Report
Export
Collapse

What are the three possible verdicts in WildFire Submissions log entries for a submitted sample?

(Choose four.)

Benign
Benign
Spyware
Spyware
Malicious
Malicious
Phishing
Phishing
Grayware
Grayware
Suggested answer: A, C, D, E

Explanation:

Reference: https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/monitor-wildfire-activity/use-the-firewall-to-monitor-malware/monitor-wildfire-submissions-and-analysisreports.html

asked 23/09/2024
Maksim Alpatov
43 questions

Question 89

Report
Export
Collapse

What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)

Errors
Errors
Environments
Environments
Interfaces
Interfaces
Mounts
Mounts
Throughput
Throughput
Sessions
Sessions
Status
Status
Suggested answer: B, C, F

Explanation:

Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/detailed-device-health-in-panorama.html

asked 23/09/2024
JIMMY GIOVANNY VARGAS TERAN
35 questions

Question 90

Report
Export
Collapse

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

M-200
M-200
M-600
M-600
M-100
M-100
Panorama VM-Series
Panorama VM-Series
Suggested answer: D

Explanation:

Reference:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boF1CAI

asked 23/09/2024
wendy brouwer
38 questions
Total 139 questions
Go to page: of 14