Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Palo Alto Networks System Engineer Professional - Strata Question and Answers

Palo Alto Networks System Engineer Professional - Strata

Last Update May 2, 2024
Total Questions : 139

We are offering FREE PSE-Strata Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare PSE-Strata free exam questions and then go for complete pool of Palo Alto Networks System Engineer Professional - Strata test questions that will help you more.

PSE-Strata pdf

PSE-Strata PDF

$35  $99.99
PSE-Strata Engine

PSE-Strata Testing Engine

$42  $119.99
PSE-Strata PDF + Engine

PSE-Strata PDF + Testing Engine

$56  $159.99
Questions 1

Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)

Options:

A.  

Network Tab

B.  

Policies Tab

C.  

Device Tab

D.  

Objects Tab

Discussion 0
Questions 2

Which two products can send logs to the Cortex Data Lake? (Choose two.)

Options:

A.  

AutoFocus

B.  

PA-3260 firewall

C.  

Prisma Access

D.  

Prisma Public Cloud

Discussion 0
Questions 3

What helps avoid split brain in active / passive high availability (HA) pair deployment?

Options:

A.  

Enable preemption on both firewalls in the HA pair.

B.  

Use a standard traffic interface as the HA3 link.

C.  

Use the management interface as the HA1 backup link

D.  

Use a standard traffic interface as the HA2 backup

Discussion 0
Questions 4

Which two of the following does decryption broker provide on a NGFW? (Choose two.)

Options:

A.  

Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once

B.  

Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcement

C.  

Provides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and enforcement

D.  

Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times

Discussion 0
Questions 5

Which two types of security chains are supported by the Decryption Broker? (Choose two.)

Options:

A.  

virtual wire

B.  

transparent bridge

C.  

Layer 3

D.  

Layer 2

Discussion 0
Questions 6

A packet that is already associated with a current session arrives at the firewall.

What is the flow of the packet after the firewall determines that it is matched with an existing session?

Options:

A.  

it is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through a single stream-based content inspection engine before egress.

B.  

It is sent through the slow path for further inspection. If subject to content inspection, it will pass through a single stream-based content inspection engines before egress

C.  

It is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through multiple content inspection engines before egress

D.  

It is sent through the slow path for further inspection. If subject to content inspection, it will pass through multiple content inspection engines before egress

Discussion 0
Questions 7

As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?

Options:

A.  

access key ID

B.  

secret access key

C.  

administrative Password

D.  

AWS account ID

Discussion 0
Questions 8

A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions.

Which Network Processing Card should be recommended in the Bill of Materials?

Options:

A.  

PA-7000-20GQ-NPC

B.  

PA-7000-40G-NPC

C.  

PA-7000-20GQXM-NPC

D.  

PA-7000-20G-NPC

Discussion 0
Questions 9

Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?

Options:

A.  

>show sdwan path-monitor stats vif

B.  

>show sdwan session distribution policy-name

C.  

>show sdwan connection all

D.  

>show sdwan event

Discussion 0
Questions 10

Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?

Options:

A.  

Once a day

B.  

Once a week

C.  

Once every minute

D.  

Once an hour

Discussion 0
Questions 11

Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)

Options:

A.  

dedicated pair of decryption forwarding interfaces required per security chain

B.  

a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule

C.  

a unique Decryption policy rule is required per security chain

D.  

a single pair of decryption forwarding interfaces

Discussion 0
Questions 12

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

Options:

A.  

retention requirements

B.  

Traps agent forensic data

C.  

the number of Traps agents

D.  

agent size and OS

Discussion 0
Questions 13

A customer worried about unknown attacks is hesitant to enable SSL decryption due to privacy

and regulatory issues. How does the platform address the customer’s concern?

Options:

A.  

It overcomes reservations about SSL decrypt by offloading to a higher-capacity firewall to help with the decrypt throughput

B.  

It shows how AutoFocus can provide visibility into targeted attacks at the industry sector

C.  

It allows a list of websites or URL categories to be defined for exclusion from decryption

D.  

It bypasses the need to decrypt SSL traffic by analyzing the file while still encrypted

Discussion 0
Questions 14

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

Options:

A.  

it requires the Vulnerability Protection profile to be enabled

B.  

DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates

C.  

infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs

D.  

It requires a Sinkhole license in order to activate

Discussion 0
Questions 15

How do you configure the rate of file submissions to WildFire in the NGFW?

Options:

A.  

based on the purchased license uploaded

B.  

QoS tagging

C.  

maximum number of files per minute

D.  

maximum number of files per day

Discussion 0
Questions 16

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

Options:

A.  

grayware

B.  

command and control (C2)

C.  

benign

D.  

government

E.  

malware

Discussion 0
Questions 17

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?

Options:

A.  

It eliminates of the necessity for dynamic analysis in the cloud

B.  

It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity

C.  

It is always able to give more accurate verdicts than the cloud ML analysis reducing false positives and false negatives

D.  

It improves the CPU performance of content inspection

Discussion 0
Questions 18

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

Options:

A.  

Validate user identities through authentication

B.  

Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall

C.  

Categorize data and applications by levels of sensitivity

D.  

Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls

Discussion 0
Questions 19

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

Options:

A.  

VM-200

B.  

VM-100

C.  

VM-50

D.  

VM-300

Discussion 0
Questions 20

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

Options:

A.  

SaaS reports

B.  

data filtering logs

C.  

WildFire analysis reports

D.  

threat logs

E.  

botnet reports

Discussion 0