Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Palo Alto Networks System Engineer Professional - Strata Question and Answers

Palo Alto Networks System Engineer Professional - Strata

Last Update Sep 21, 2025
Total Questions : 137

We are offering FREE PSE-Strata Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare PSE-Strata free exam questions and then go for complete pool of Palo Alto Networks System Engineer Professional - Strata test questions that will help you more.

PSE-Strata pdf

PSE-Strata PDF

$36.75  $104.99
PSE-Strata Engine

PSE-Strata Testing Engine

$43.75  $124.99
PSE-Strata PDF + Engine

PSE-Strata PDF + Testing Engine

$57.75  $164.99
Questions 1

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}

Options:

A.  

prevention of cyber attacks

B.  

safe enablement of all applications

C.  

threat remediation

D.  

defense against threats with static security solution

Discussion 0
Questions 2

in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

Options:

A.  

Step 4. Create the Zero Trust policy.

B.  

Step 2: Map the transaction flows.

C.  

Step 3. Architect a Zero Trust network.

D.  

Step 1: Define the protect surface

Discussion 0
Questions 3

Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)

Options:

A.  

Vulnerability protection

B.  

Anti-Spyware

C.  

Anti-Virus

D.  

Botnet detection

E.  

App-ID protection

Discussion 0
Questions 4

Which two features can be enabled to support asymmetric routing with redundancy on a Palo

Alto networks next-generation firewall (NGFW)? (Choose two.)

Options:

A.  

Active / active high availability (HA)

B.  

Multiple virtual systems

C.  

non-SYN first packet

D.  

Asymmetric routing profile

Discussion 0
Questions 5

How do you configure the rate of file submissions to WildFire in the NGFW?

Options:

A.  

based on the purchased license uploaded

B.  

QoS tagging

C.  

maximum number of files per minute

D.  

maximum number of files per day

Discussion 0
Questions 6

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy.

Which two features must be enabled to meet the customer’s requirements? (Choose two.)

Options:

A.  

Virtual systems

B.  

HA active/active

C.  

HA active/passive

D.  

Policy-based forwarding

Discussion 0
Questions 7

WildFire can discover zero-day malware in which three types of traffic? (Choose three)

Options:

A.  

SMTP

B.  

HTTPS

C.  

FTP

D.  

DNS

E.  

TFTP

Discussion 0
Questions 8

Which two network events are highlighted through correlation objects as potential security risks? (Choose two.)

Options:

A.  

Identified vulnerability exploits

B.  

Launch of an identified malware executable file

C.  

Endpoints access files from a removable drive

D.  

Suspicious host behavior

Discussion 0
Questions 9

What helps avoid split brain in active / passive high availability (HA) pair deployment?

Options:

A.  

Enable preemption on both firewalls in the HA pair.

B.  

Use a standard traffic interface as the HA3 link.

C.  

Use the management interface as the HA1 backup link

D.  

Use a standard traffic interface as the HA2 backup

Discussion 0
Questions 10

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?

Options:

A.  

M-600 appliance

B.  

Panorama Interconnect plugin

C.  

Panorama Large Scale VPN (LSVPN) plugin

D.  

Palo Alto Networks Cluster license

Discussion 0
Questions 11

There are different Master Keys on Panorama and managed firewalls.

What is the result if a Panorama Administrator pushes configuration to managed firewalls?

Options:

A.  

The push operation will fail regardless of an error or not within the configuration itself

B.  

Provided there’s no error within the configuration to be pushed, the push will succeed

C.  

The Master Key from the managed firewalls will be overwritten with the Master Key from Panorama

D.  

There will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls

Discussion 0
Questions 12

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

Options:

A.  

retention requirements

B.  

Traps agent forensic data

C.  

the number of Traps agents

D.  

agent size and OS

Discussion 0
Questions 13

When having a customer pre-sales call, which aspects of the NGFW should be covered?

Options:

A.  

The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks

B.  

The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Con

C.  

The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor

D.  

Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing

Discussion 0
Questions 14

In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?

Options:

A.  

HA3

B.  

HA1

C.  

HA2

D.  

HA4

Discussion 0
Questions 15

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

Options:

A.  

grayware

B.  

command and control (C2)

C.  

benign

D.  

government

E.  

malware

Discussion 0
Questions 16

Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)

Options:

A.  

FTP

B.  

HTTPS

C.  

RTP

D.  

HTTP

Discussion 0
Questions 17

What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?

Options:

A.  

allow the request and all subsequent responses

B.  

temporarily disable the DNS Security function

C.  

block the query

D.  

discard the request and all subsequent responses

Discussion 0
Questions 18

What are the three possible verdicts in WildFire Submissions log entries for a submitted sample? (Choose four.)

Options:

A.  

Benign

B.  

Spyware

C.  

Malicious

D.  

Phishing

E.  

Grayware

Discussion 0
Questions 19

Access to a business site is blocked by URL Filtering inline machine learning (ML) and

considered as a false-positive.

How should the site be made available?

Options:

A.  

Disable URL Filtering inline ML

B.  

Create a custom URL category and add it to the Security policy

C.  

Create a custom URL category and add it on exception of the inline ML profile

D.  

Change the action of real-time detection category on URL filtering profile

Discussion 0
Questions 20

WildFire subscription supports analysis of which three types? (Choose three.)

Options:

A.  

GIF

B.  

7-Zip

C.  

Flash

D.  

RPM

E.  

ISO

F.  

DMG

Discussion 0
Questions 21

Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?

Options:

A.  

BPA

B.  

PPA

C.  

Expedition

D.  

SLR

Discussion 0
Questions 22

An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address

Which mechanism prevents this connection from succeeding?

Options:

A.  

DNS Sinkholing

B.  

DNS Proxy

C.  

Anti-Spyware Signatures

D.  

Wildfire Analysis

Discussion 0
Questions 23

Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?

A)

B)

C)

D)

Options:

A.  

Option

B.  

Option

C.  

Option

D.  

Option

Discussion 0
Questions 24

A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources.

Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?

Options:

A.  

The Automated Correlation Engine

B.  

Cortex XDR and Cortex Data Lake

C.  

WildFire with API calls for automation

D.  

3rd Party SIEM which can ingest NGFW logs and perform event correlation

Discussion 0
Questions 25

Which three platform components can identify and protect against malicious email links? (Choose three.)

Options:

A.  

WildFire hybrid cloud solution

B.  

WildFire public cloud

C.  

WF-500

D.  

M-200

E.  

M-600

Discussion 0
Questions 26

A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).

Which Security profile is used to configure Domain Name Security (DNS) to Identity and block

previously unknown DGA-based threats in real time?

Options:

A.  

URL Filtering profile

B.  

WildFire Analysis profile

C.  

Vulnerability Protection profile

D.  

Anti-Spyware profile

Discussion 0
Questions 27

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

Options:

A.  

SaaS reports

B.  

data filtering logs

C.  

WildFire analysis reports

D.  

threat logs

E.  

botnet reports

Discussion 0
Questions 28

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

Options:

A.  

it requires the Vulnerability Protection profile to be enabled

B.  

DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates

C.  

infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs

D.  

It requires a Sinkhole license in order to activate

Discussion 0
Questions 29

Which three script types can be analyzed in WildFire? (Choose three)

Options:

A.  

PythonScript

B.  

MonoSenpt

C.  

JScript

D.  

PowerShell Script

E.  

VBScript

Discussion 0
Questions 30

Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)

Options:

A.  

Domain Administrators

B.  

Enterprise Administrators

C.  

Distributed COM Users

D.  

Event Log Readers

E.  

Server Operator

Discussion 0
Questions 31

Which two types of security chains are supported by the Decryption Broker? (Choose two.)

Options:

A.  

virtual wire

B.  

transparent bridge

C.  

Layer 3

D.  

Layer 2

Discussion 0
Questions 32

Which two products can send logs to the Cortex Data Lake? (Choose two.)

Options:

A.  

AutoFocus

B.  

PA-3260 firewall

C.  

Prisma Access

D.  

Prisma Public Cloud

Discussion 0
Questions 33

A client chooses to not block uncategorized websites.

Which two additions should be made to help provide some protection? (Choose two.)

Options:

A.  

A URL filtering profile with the action set to continue for unknown URL categories to security policy rules that allow web access

B.  

A data filtering profile with a custom data pattern to security policy rules that deny uncategorized websites

C.  

A file blocking profile attached to security policy rules that allow uncategorized websites to help reduce the risk of drive by downloads

D.  

A security policy rule using only known URL categories with the action set to allow

Discussion 0
Questions 34

WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.

Which command returns a valid result to verify the ML is working from the command line.

Options:

A.  

show wfml cloud-status

B.  

show mlav cloud-status

C.  

show ml cloud-status

D.  

show av cloud-status

Discussion 0
Questions 35

Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)

Options:

A.  

Request that the customer make part 3978 available to allow the evaluation unit to communicate with Panorama

B.  

Inform the customer that a SPAN port must be provided for the evaluation unit, assuming a TAP mode deployment.

C.  

Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned.

D.  

Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible

E.  

Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed

Discussion 0
Questions 36

Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?

Options:

A.  

Vulnerability Protection profile

B.  

Antivirus profile

C.  

URL Filtering profile

D.  

Anti-Spyware profile

Discussion 0
Questions 37

What are two presales selling advantages of using Expedition? (Choose two.)

Options:

A.  

map migration gaps to professional services statement of Works (SOWs)

B.  

streamline & migrate to Layer7 policies using Policy Optimizer

C.  

reduce effort to implement policies based on App-ID and User-ID

D.  

easy migration process to move to Palo Alto Networks NGFWs

Discussion 0
Questions 38

Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?

Options:

A.  

User ID and Device-ID

B.  

Source-D and Network.ID

C.  

Source ID and Device-ID

D.  

User-ID and Source-ID

Discussion 0
Questions 39

Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?

Options:

A.  

Generate a Stats Dump File and upload it to the Palo Alto Networks support portal

B.  

Select Panorama > Licenses and click Activate feature using authorization code

C.  

Generate a Tech Support File and call PANTAC

D.  

Select Device > Licenses and click Activate feature using authorization code

Discussion 0
Questions 40

What are three considerations when deploying User-ID? (Choose three.)

Options:

A.  

Specify included and excluded networks when configuring User-ID

B.  

Only enable User-ID on trusted zones

C.  

Use a dedicated service account for User-ID services with the minimal permissions necessary

D.  

User-ID can support a maximum of 15 hops

E.  

Enable WMI probing in high security networks

Discussion 0
Questions 41

For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same Prisma Access location servicing a single

Datacenter? (Choose two.)

Options:

A.  

Network segments in the Datacenter need to be advertised to only one Service Connection

B.  

The customer edge device needs to support policy-based routing with symmetric return functionality

C.  

The resources in the Datacenter will only be able to reach remote network resources that share the same region

D.  

A maximum of four service connections per Datacenter are supported with this topology

Discussion 0