Download Palo Alto Networks System Engineer -Strata.PSE-Strata.VCEplus.2022-12-21.30q.vcex

Vendor: Palo Alto Networks
Exam Code: PSE-Strata
Exam Name: Palo Alto Networks System Engineer -Strata
Date: Dec 21, 2022
File Size: 73 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)
  1. Next-generation firewalls deployed with WildFire Analysis Security Profiles
  2. WF-500 configured as private clouds for privacy concerns
  3. Correlation Objects generated by AutoFocus
  4. Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance
  5. Palo Alto Networks non-firewall products such as Traps and Prisma SaaS
Correct answer: CDE
Explanation:
Reference:https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus
Reference:
https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus
Question 2
What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}
  1. prevention of cyber attacks
  2. safe enablement of all applications
  3. threat remediation
  4. defense against threats with static security solution
Correct answer: AC
Question 3
What are two advantages of the DNS Sinkholing feature? (Choose two.)
  1. It forges DNS replies to known malicious domains.
  2. It monitors DNS requests passively for malware domains.
  3. It can be deployed independently of an Anti-Spyware Profile.
  4. It can work upstream from the internal DNS server.
Correct answer: AD
Explanation:
Reference:https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing
Reference:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/dnssinkholing
Question 4
Which two products can send logs to the Cortex Data Lake? (Choose two.)
  1. AutoFocus
  2. PA-3260 firewall
  3. Prisma Access
  4. Prisma Public Cloud
Correct answer: BC
Explanation:
Reference:https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake
Reference:
https://docs.paloaltonetworks.com/cortex/cortex-data-lake/cortex-data-lake-getting-started/getstarted-with-cortex-data-lake/forward-logs-to-cortex-data-lake
Question 5
Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)
  1. User Mapping
  2. Proxy Authentication
  3. Group Mapping
  4. 802.1X Authentication
Correct answer: AC
Explanation:
Reference:https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id
Reference:
https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id
Question 6
Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)
  1. breach the perimeter
  2. weaponize vulnerabilities
  3. lateral movement 
  4. exfiltrate data
  5. recon the target
  6. deliver the malware
Correct answer: ACDF
Question 7
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
  1. define an SSL decryption rulebase
  2. enable User-ID
  3. validate credential submission detection
  4. enable App-ID
  5. define URL Filtering Profile
Correct answer: BCE
Explanation:
Reference:https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/preventcredential-phishing.html
Question 8
An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. 
How should the SE show the customer the firewall can detect that these websites are being accessed?
  1. Create a footnote within the SLR generation tool
  2. Edit the Key-Findings text to list the other types of categories that may be of interest
  3. Remove unwanted categories listed under 'High Risk' and use relevant information
  4. Produce the report and edit the PDF manually
Correct answer: C
Question 9
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
  1. eDirectory monitoring
  2. Client Probing
  3. SNMP server
  4. TACACS
  5. Active Directory monitoring
  6. Lotus Domino
  7. RADIUS
Correct answer: BDG
Explanation:
Reference:https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping
Reference:
https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-idconcepts/user-mapping
Question 10
When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)
  1. retention requirements
  2. Traps agent forensic data
  3. the number of Traps agents
  4. agent size and OS
Correct answer: BD
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!