1 / 11

Free 2021 Palo Alto Networks PSE Strata Real Questions

PassQuestion has created Free 2021 Palo Alto Networks PSE Strata Real Questions that can be used for your best preparation and ensure your final success.

Download Presentation

Free 2021 Palo Alto Networks PSE Strata Real Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PSE Strata Free Questions PSE Strata Free Questions Palo Alto Networks System Engineer Palo Alto Networks System Engineer Professional - Strata Professional - Strata https://www.passquestion.com/ https://www.passquestion.com/PSE-Strata PSE-Strata.html .html

  2. Question 1 Question 1 Which two of the following does decryption broker provide on a NGFW? (Choose two.) Which two of the following does decryption broker provide on a NGFW? (Choose two.) A. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks A. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once next-generation firewall and decrypt traffic only once B. Eliminates the need for a third party SSL decryption option which allows you to reduce B. Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcement the total number of third party devices performing analysis and enforcement C. Provides a third party SSL decryption option which allows you to increase the total C. Provides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and enforcement number of third party devices performing analysis and enforcement D. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks D. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times next-generation firewall and decrypt traffic multiple times Answer: A,B Answer: A,B

  3. Question 2 Question 2 How frequently do WildFire signatures move into the antivirus database? How frequently do WildFire signatures move into the antivirus database? A. every 24 hours A. every 24 hours B. every 12 hours B. every 12 hours C. once a week C. once a week D. every 1 hour D. every 1 hour Answer: A Answer: A

  4. Question 3 Question 3 Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls? Next Generation firewalls? A. M-200 A. M-200 B. M-600 B. M-600 C. M-100 C. M-100 D. Panorama VM-Series D. Panorama VM-Series Answer: D Answer: D

  5. Question 4 Question 4 A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources. network, allows you to assess the risk and take action to prevent exploitation of network resources. Which feature of PAN-OS can you talk about to address their requirement to optimize their business Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes? outcomes? A. The Automated Correlation Engine A. The Automated Correlation Engine B. Cortex XDR and Cortex Data Lake B. Cortex XDR and Cortex Data Lake C. WildFire with API calls for automation C. WildFire with API calls for automation D. 3rd Party SIEM which can ingest NGFW logs and perform event correlation D. 3rd Party SIEM which can ingest NGFW logs and perform event correlation Answer: A Answer: A

  6. Question 5 Question 5 Which security profile on the NGFW includes signatures to protect you from brute force attacks? Which security profile on the NGFW includes signatures to protect you from brute force attacks? A. Zone Protection Profile A. Zone Protection Profile B. URL Filtering Profile B. URL Filtering Profile C. Vulnerability Protection Profile C. Vulnerability Protection Profile D. Anti-Spyware Profile D. Anti-Spyware Profile Answer: C Answer: C

  7. Question 6 Question 6 Which four actions can be configured in an Anti-Spyware profile to address command-and-control Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.) traffic from compromised hosts? (Choose four.) A. Quarantine A. Quarantine B. Allow B. Allow C. Reset C. Reset D. Redirect D. Redirect E. Drop E. Drop F. Alert F. Alert Answer: B,C,E,F Answer: B,C,E,F

  8. Question 7 Question 7 Which three methods used to map users to IP addresses are supported in Palo Alto Networks Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.) firewalls? (Choose three.) A. eDirectory monitoring A. eDirectory monitoring B. Client Probing B. Client Probing C. SNMP server C. SNMP server D. TACACS D. TACACS E. Active Directory monitoring E. Active Directory monitoring F. Lotus Domino F. Lotus Domino G. RADIUS G. RADIUS Answer: B,D,G Answer: B,D,G

  9. Question 8 Question 8 Which two tabs in Panorama can be used to identify templates to define a common base Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.) configuration? (Choose two.) A. Network Tab A. Network Tab B. Policies Tab B. Policies Tab C. Device Tab C. Device Tab D. Objects Tab D. Objects Tab Answer: A,C Answer: A,C

  10. Question 9 Question 9 When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user? you would use per day. per user? A. 1500 to 2500 bytes A. 1500 to 2500 bytes B. 10MB to 30 MB B. 10MB to 30 MB C. 1MB to 5 MB C. 1MB to 5 MB D. 100MB to 200 MB D. 100MB to 200 MB Answer: D Answer: D

  11. Question 10 Question 10 Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.) firewall product? (Choose two.) A. Traffic is separated by zones A. Traffic is separated by zones B. Policy match is based on application B. Policy match is based on application C. Identification of application is possible on any port C. Identification of application is possible on any port D. Traffic control is based on IP port, and protocol D. Traffic control is based on IP port, and protocol Answer: B,C Answer: B,C

More Related