PSE STRATA Questions 1-15 with Answers
QUESTION 1
What is the key benefit of Palo Alto Networks Single Pass Parallel Processing design?
A. There are no benefits other than slight performance upgrades
B. It allows Palo Alto Networks to add new functions to existing hardware
C. Only one processor is needed to complete all the functions within the box
D. It allows Palo Alto Networks to add new devices to existing hardware
QUESTION 2
Which security profile on the NGFW includes signatures to protect you from brute force attacks?
A. Zone Protection Profile
B. URL Filtering Profile
C. Vulnerability Protection Profile
D. Anti-Spyware Profile
QUESTION 3
The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which
component in the NGFW?
A. First Packet Processor
B. Stream-based Signature Engine
C. SIA (Scan It All) Processing Engine
D. Security Processing Engine
Reference: https://media.paloaltonetworks.com/documents/Single_Pass_Parallel_Processing_Architecture.pdfn (page 6)
QUESTION 4
A customer requires an analytics tool with the following attributes:
Uses the logs on the firewall to detect actionable events on the network
Automatically processes a series of related threat events that, when combined indicate a likely comprised host on the network
Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources
Which feature of PAN-OS will address these requirements?
A. Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs
B. Cortex XDR and Cortex Data Lake
C. Automated correlation engine
D. WildFire with application program interface (API) calls for automation
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/use-the-automated-correlation-engine.html
QUESTION 5
Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)
A. FTP
B. HTTPS
C. RTP
D. HTTP
QUESTION 6
What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)
A. Enterprise CA-signed certificates
B. Self-Signed certificates
C. Intermediate certificates
D. Private key certificates
QUESTION 7
Which two of the following does decryption broker provide on a NGFW? (Choose two.)
A. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once
B. Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis
and enforcement
C. Provides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and
enforcement
D. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-broker.html
QUESTION 8
There are different Master Keys on Panorama and managed firewalls.
What is the result if a Panorama Administrator pushes configuration to managed firewalls?
A. The push operation will fail regardless of an error or not within the configuration itself
B. Provided there’s no error within the configuration to be pushed, the push will succeed
C. The Master Key from the managed firewalls will be overwritten with the Master Key from Panorama
D. There will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls
Reference: https://www.reddit.com/r/paloaltonetworks/comments/onz15y/what_is_the_result_if_a_panorama_administrator/
QUESTION 9
Which task would be identified in Best Practice Assessment tool?
A. identify the visibility and presence of command-and-control sessions
B. identify sanctioned and unsanctioned SaaS applications
C. identify the threats associated with each application
D. identify and provide recommendations for device management access
QUESTION 10
A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.
How is this goal accomplished?
A. Create a custom spyware signature matching the known signature with the time attribute
B. Add a correlation object that tracks the occurrences and triggers above the desired threshold
C. Submit a request to Palo Alto Networks to change the behavior at the next update
D. Configure the Anti-Spyware profile with the number of rule counts to match the occurrence frequency
QUESTION 11
Which two features are found in Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
A. Policy match is based on application
B. Traffic control is based on IP, port, and protocol
C. Traffic is separated by zones
D. Identification of application is possible on any port
QUESTION 12
For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to
the same Prisma Access location servicing a single Datacenter? (Choose two.)
A. Network segments in the Datacenter need to be advertised to only one Service Connection
B. The customer edge device needs to support policy-based routing with symmetric return functionality
C. The resources in the Datacenter will only be able to reach remote network resources that share the same region
D. A maximum of four service connections per Datacenter are supported with this topology
QUESTION 13
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
A. use of device management access and settings
B. identify sanctioned and unsanctioned SaaS applications
C. expose the visibility and presence of command-and-control sessions
D. measure the adoption of URL filters, App-ID, User-ID
E. use of decryption policies
QUESTION 14
You have a prospective customer that is looking for a way to provide secure temporary access to contractors for a designated period of time. They
currently add contractors to existing user groups and create ad hoc policies to provide network access. They admit that once the contractor no longer
needs access to the network, administrators are usually too busy to manually delete policies that provided access to the contractor. This has resulted in
over-provisioned access that has allowed unauthorized access to their systems.
They are looking for a solution to automatically remove access for contractors once access is no longer required.
You address their concern by describing which feature in the NGFW?
A. Dynamic User Groups
B. Dynamic Address Groups
C. Multi-factor Authentication
D. External Dynamic Lists
QUESTION 15
Which methods are used to check for Corporate Credential Submissions? (Choose three.)
A. Group Mapping
B. IP User Mapping
C. LDAP query
D. Domain Credential Filter
E. User ID Credential Check
Browse PSE STRATA Questions : | |||
---|---|---|---|
Q&A 1-15 | |||
Order Your PMI Premium PDF Today! Click here to make your purchase. Apply the discount code EDU50R at checkout to receive 50% off! |