Download Palo Alto Networks.PSE-Strata.VCEplus.2022-12-21.30q.vcex

Download Exam

File Info

Exam Palo Alto Networks System Engineer -Strata
Number PSE-Strata
File Name Palo Alto Networks.PSE-Strata.VCEplus.2022-12-21.30q.vcex
Size 73 KB
Posted Dec 21, 2022
Download Palo Alto Networks.PSE-Strata.VCEplus.2022-12-21.30q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)


  1. Next-generation firewalls deployed with WildFire Analysis Security Profiles
  2. WF-500 configured as private clouds for privacy concerns
  3. Correlation Objects generated by AutoFocus
  4. Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance
  5. Palo Alto Networks non-firewall products such as Traps and Prisma SaaS
Correct answer: CDE
Explanation:
Reference:https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus
Reference:
https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus



Question 2

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}


  1. prevention of cyber attacks
  2. safe enablement of all applications
  3. threat remediation
  4. defense against threats with static security solution
Correct answer: AC



Question 3

What are two advantages of the DNS Sinkholing feature? (Choose two.)


  1. It forges DNS replies to known malicious domains.
  2. It monitors DNS requests passively for malware domains.
  3. It can be deployed independently of an Anti-Spyware Profile.
  4. It can work upstream from the internal DNS server.
Correct answer: AD
Explanation:
Reference:https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing
Reference:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing



Question 4

Which two products can send logs to the Cortex Data Lake? (Choose two.)


  1. AutoFocus
  2. PA-3260 firewall
  3. Prisma Access
  4. Prisma Public Cloud
Correct answer: BC
Explanation:
Reference:https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake
Reference:
https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake



Question 5

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)


  1. User Mapping
  2. Proxy Authentication
  3. Group Mapping
  4. 802.1X Authentication
Correct answer: AC
Explanation:
Reference:https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id
Reference:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id



Question 6

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)


  1. breach the perimeter
  2. weaponize vulnerabilities
  3. lateral movement 
  4. exfiltrate data
  5. recon the target
  6. deliver the malware
Correct answer: ACDF



Question 7

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)


  1. define an SSL decryption rulebase
  2. enable User-ID
  3. validate credential submission detection
  4. enable App-ID
  5. define URL Filtering Profile
Correct answer: BCE
Explanation:
Reference:https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html



Question 8

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. 
How should the SE show the customer the firewall can detect that these websites are being accessed?


  1. Create a footnote within the SLR generation tool
  2. Edit the Key-Findings text to list the other types of categories that may be of interest
  3. Remove unwanted categories listed under 'High Risk' and use relevant information
  4. Produce the report and edit the PDF manually
Correct answer: C



Question 9

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)


  1. eDirectory monitoring
  2. Client Probing
  3. SNMP server
  4. TACACS
  5. Active Directory monitoring
  6. Lotus Domino
  7. RADIUS
Correct answer: BDG
Explanation:
Reference:https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping



Question 10

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)


  1. retention requirements
  2. Traps agent forensic data
  3. the number of Traps agents
  4. agent size and OS
Correct answer: BD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files