Paloalto Networks PSE Strata Palo Alto Networks System Engineer Professional - Strata 1. How frequently do WildFire signatures move into the antivirus database? A. every 24 hours B. every 12 hours C. once a week D. every 1 hour Answer: A Explanation: https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/wildfire- overview/wildfire-concepts/wildfire-signatures 2. What are two advantages of the DNS Sinkholing feature? (Choose two.) A. It forges DNS replies to known malicious domains. B. It monitors DNS requests passively for malware domains. 2] 02 C. It can be deployed independently of an Anti-Spyware Profile. [2 D. It can work upstream from the internal DNS server. ps um Answer: A,D D m Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan- xa E os/threat-prevention/dns-sinkholing a at tr S E S P ks 3. DRAG DROP or w et Match the functions to the appropriate processing engine within the dataplane. N o lt A o al P h it W m xa E a at tr S E S P s as P ly nt ie ic ff E Answer: 4. Which CLI command will allow you to view latency, jitter and packet loss on a 2] virtual SD-WAN interface? 02 [2 A) ps um D m xa E a at tr B) S E S P ks or w et N o lt C) A o al P h it W m xa E D) a at tr S E S P s as P ly A. Option nt ie B. Option ic ff E C. Option D. Option Answer: A Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan- admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html 5. Which security profile on the NGFW includes signatures to protect you from brute force attacks? A. Zone Protection Profile B. URL Filtering Profile C. Vulnerability Protection Profile D. Anti-Spyware Profile Answer: C 6. Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls? A. M-200 B. M-600 C. M-100 D. Panorama VM-Series Answer: D 2] 02 Explanation: [2 Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0 ps um 00000boF1CAI D m xa E a at tr 7. XYZ Corporation has a legacy environment with asymmetric routing. The customer S E S understands that Palo Alto Networks firewalls can support asymmetric routing with P ks redundancy. or w et Which two features must be enabled to meet the customer’s requirements? (Choose N o two.) lt A o A. Virtual systems al P B. HA active/active h it W C. HA active/passive m xa D. Policy-based forwarding E a at Answer: B,D tr S E S P s as P 8. Which two tabs in Panorama can be used to identify templates to define a common ly nt base configuration? (Choose two.) ie ic ff A. Network Tab E B. Policies Tab C. Device Tab D. Objects Tab Answer: A,C Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/web- interface-help/panorama-web-interface/panorama-templates/template-stacks 9. Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.) A. Quarantine B. Allow C. Reset D. Redirect E. Drop F. Alert Answer: B,C,E,F Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan- os/policy/anti-spyware-profiles.html Test PSE Strata 10.1.Which two of the following does decryption broker provide on a NGFW? (Choose two.) A. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once B. Eliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcement C. Provides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and enforcement D. Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times Answer: A,B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os- admin/decryption/decryption-broker.html 11. When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user? A. 1500 to 2500 bytes B. 10MB to 30 MB C. 1MB to 5 MB D. 100MB to 200 MB Answer: D
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-