Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Paloalto Networks Palo Alto Networks System Engineer Professional - Strata PSE-Strata Questions and answers with ValidTests

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

Options:

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Expert Solution
Questions # 2:

Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)

Options:

A.

Traffic is separated by zones

B.

Policy match is based on application

C.

Identification of application is possible on any port

D.

Traffic control is based on IP port, and protocol

Expert Solution
Questions # 3:

WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.

Which command returns a valid result to verify the ML is working from the command line.

Options:

A.

show wfml cloud-status

B.

show mlav cloud-status

C.

show ml cloud-status

D.

show av cloud-status

Expert Solution
Questions # 4:

Question # 4

What action would address the sub-optimal traffic path shown in the figure?

Key:

RN - Remote Network

SC - Service Connection

MU GW - Mobile User Gateway

Options:

A.

Onboard a Service Connection in the Americas region

B.

Remove the Service Connection in the EMEA region

C.

Onboard a Service Connection in the APAC region

D.

Onboard a Remote Network location in the EMEA region

Expert Solution
Questions # 5:

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

Options:

A.

VM-200

B.

VM-100

C.

VM-50

D.

VM-300

Expert Solution
Questions # 6:

Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?

Options:

A.

It processes each feature in a separate single pass with additional performance impact for each enabled feature.

B.

Its processing applies only to security features and does not include any networking features.

C.

It processes all traffic in a single pass with no additional performance impact for each enabled feature.

D.

It splits the traffic and processes all security features in a single pass and all network features in a separate pass

Expert Solution
Questions # 7:

Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?

Options:

A.

Prisma SaaS API

B.

Threat intelligence Cloud

C.

GlobalProtect

D.

Cortex XDR

Expert Solution
Questions # 8:

Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?

Options:

A.

Security policy rule

B.

Tag

C.

Login ID

D.

IP address

Expert Solution
Questions # 9:

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)

Options:

A.

Add the user to an external dynamic list (EDL).

B.

Tag the user using Panorama or the Web Ul of the firewall.

C.

Tag the user through the firewalls XML API.

D.

Tag the user through Active Directory

Expert Solution
Questions # 10:

A customer requires protections and verdicts for portable executable (PE) and executable and linkable format (ELF), as well as the ability to integrate with existing security tools.

Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?

Options:

A.

Dynamic Unpacking

B.

WildFire

C.

DNS Security

D.

File Blocking profile

Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions