Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sixtybuddy

PSE-Strata Palo Alto Networks System Engineer Professional - Strata Questions and Answers

Questions 4

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

Options:

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Questions 5

Which three script types can be analyzed in WildFire? (Choose three)

Options:

A.

PythonScript

B.

MonoSenpt

C.

JScript

D.

PowerShell Script

E.

VBScript

Buy Now
Questions 6

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

Options:

A.

Validate user identities through authentication

B.

Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall

C.

Categorize data and applications by levels of sensitivity

D.

Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls

Buy Now
Questions 7

Which task would be identified in Best Practice Assessment tool?

Options:

A.

identify the visibility and presence of command-and-control sessions

B.

identify sanctioned and unsanctioned SaaS applications

C.

identify the threats associated with each application

D.

identify and provide recommendations for device management access

Buy Now
Questions 8

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

Options:

A.

WildFire

B.

DNS Security

C.

Threat Prevention

D.

loT Security

Buy Now
Questions 9

When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?

Options:

A.

1500 to 2500 bytes

B.

10MB to 30 MB

C.

1MB to 5 MB

D.

100MB to 200 MB

Buy Now
Questions 10

Which are the three mandatory components needed to run Cortex XDR? (Choose three.)

Options:

A.

Panorama

B.

NGFW with PANOS 8 0.5 or later

C.

Cortex Data Lake

D.

Traps

E.

Pathfinder

F.

Directory Syn Service

Buy Now
Questions 11

When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?

Options:

A.

8MB

B.

depends on the Cortex Data Lake tier purchased

C.

18 bytes

D.

1500 bytes

Questions 12

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?

Options:

A.

It eliminates of the necessity for dynamic analysis in the cloud

B.

It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity

C.

It is always able to give more accurate verdicts than the cloud ML analysis reducing false positives and false negatives

D.

It improves the CPU performance of content inspection

Buy Now
Questions 13

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

Options:

A.

define an SSL decryption rulebase

B.

enable User-ID

C.

validate credential submission detection

D.

enable App-ID

E.

define URL Filtering Profile

Questions 14

Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?

Options:

A.

Security policy rule

B.

Tag

C.

Login ID

D.

IP address

Buy Now
Questions 15

Match the WildFire Inline Machine Learning Model to the correct description for that model.

Options:

Buy Now
Questions 16

A customer is designing a private data center to host their new web application along with a separate headquarters for users.

Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?

Options:

A.

Threat Prevention

B.

DNS Security

C.

WildFire

D.

Advanced URL Filtering (AURLF)

Buy Now
Questions 17

In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)

Options:

A.

TXT

B.

API

C.

CSV

D.

EDL

Buy Now
Questions 18

Which two features are key in preventing unknown targeted attacks? (Choose two)

Options:

A.

nighty botnet report

B.

App-ID with the Zero Trust model

C.

WildFire Cloud threat analysis

D.

Single Pass Parallel Processing (SP3)

Buy Now
Questions 19

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

Options:

A.

M-200

B.

M-600

C.

M-100

D.

Panorama VM-Series

Buy Now
Questions 20

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

Options:

A.

WildFire analysis

B.

Dynamic user groups (DUGs)

C.

Multi-factor authentication (MFA)

D.

URL Filtering Profiles

Buy Now
Exam Code: PSE-Strata
Exam Name: Palo Alto Networks System Engineer Professional - Strata
Last Update: Apr 20, 2024
Questions: 139

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80