New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PSE-Strata Questions and Answers

Question # 6

A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).

Which Security profile is used to configure Domain Name Security (DNS) to Identity and block

previously unknown DGA-based threats in real time?

A.

URL Filtering profile

B.

WildFire Analysis profile

C.

Vulnerability Protection profile

D.

Anti-Spyware profile

Full Access
Question # 7

What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)

A.

operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)

B.

improved revenue due to more efficient network traffic throughput

C.

Increased security due to scalable cloud delivered security Services (CDSS)

D.

Cost savings due to reduction in IT management effort and device

Full Access
Question # 8

A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.

The customer uses a firewall with User-ID enabled

Which feature must also be enabled to prevent these attacks?

A.

Content Filtering

B.

WildFire

C.

Custom App-ID rules

D.

App-ID

Full Access
Question # 9

Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.

A.

5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YR

B.

5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-SVC-BAS-PRA-25. 1x PAN-PRA-25

C.

5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YRr 1x PAN-LGS-1TB-1YR, 1x PAN-PRA-25, 1x PAN-SVC-BAS-PRA-25

D.

1x PAN-GPCS-USER-C-BAS-1YR, 1x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YR

Full Access
Question # 10

A customer requires protections and verdicts for portable executable (PE) and executable and linkable format (ELF), as well as the ability to integrate with existing security tools.

Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?

A.

Dynamic Unpacking

B.

WildFire

C.

DNS Security

D.

File Blocking profile

Full Access
Question # 11

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

A.

VM-200

B.

VM-100

C.

VM-50

D.

VM-300

Full Access
Question # 12

Which task would be identified in Best Practice Assessment tool?

A.

identify the visibility and presence of command-and-control sessions

B.

identify sanctioned and unsanctioned SaaS applications

C.

identify the threats associated with each application

D.

identify and provide recommendations for device management access

Full Access
Question # 13

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

A.

retention requirements

B.

Traps agent forensic data

C.

the number of Traps agents

D.

agent size and OS

Full Access
Question # 14

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

A.

WildFire

B.

DNS Security

C.

Threat Prevention

D.

loT Security

Full Access
Question # 15

A customer worried about unknown attacks is hesitant to enable SSL decryption due to privacy

and regulatory issues. How does the platform address the customer’s concern?

A.

It overcomes reservations about SSL decrypt by offloading to a higher-capacity firewall to help with the decrypt throughput

B.

It shows how AutoFocus can provide visibility into targeted attacks at the industry sector

C.

It allows a list of websites or URL categories to be defined for exclusion from decryption

D.

It bypasses the need to decrypt SSL traffic by analyzing the file while still encrypted

Full Access
Question # 16

Which are the three mandatory components needed to run Cortex XDR? (Choose three.)

A.

Panorama

B.

NGFW with PANOS 8 0.5 or later

C.

Cortex Data Lake

D.

Traps

E.

Pathfinder

F.

Directory Syn Service

Full Access
Question # 17

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

A.

breach the perimeter

B.

weaponize vulnerabilities

C.

lateral movement

D.

exfiltrate data

E.

recon the target

F.

deliver the malware

Full Access
Question # 18

Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)

A.

Domain Administrators

B.

Enterprise Administrators

C.

Distributed COM Users

D.

Event Log Readers

E.

Server Operator

Full Access
Question # 19

Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)

A.

ELF

B.

7-Zip

C.

Zip

D.

RAR

Full Access
Question # 20

Which three features are used to prevent abuse of stolen credentials? (Choose three.)

A.

multi-factor authentication

B.

URL Filtering Profiles

C.

WildFire Profiles

D.

Prisma Access

E.

SSL decryption rules

Full Access
Question # 21

Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?

A.

Vulnerability Protection profile

B.

Antivirus profile

C.

URL Filtering profile

D.

Anti-Spyware profile

Full Access
Question # 22

What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)

A.

Enterprise CA-signed certificates

B.

Self-Signed certificates

C.

Intermediate certificates

D.

Private key certificates

Full Access
Question # 23

A customer requires an analytics tool with the following attributes:

- Uses the logs on the firewall to detect actionable events on the network

- Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network

- Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources

Which feature of PAN-OS will address these requirements?

A.

WildFire with application program interface (API) calls for automation

B.

Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs

C.

Automated correlation engine (ACE)

D.

Cortex XDR and Cortex Data Lake

Full Access
Question # 24

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

A.

it requires the Vulnerability Protection profile to be enabled

B.

DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates

C.

infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs

D.

It requires a Sinkhole license in order to activate

Full Access
Question # 25

A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.

Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)

A.

Informs WildFire and sends up a signature to the Cloud

B.

Collects forensic information about the event

C.

Communicates the status of the endpoint to the ESM

D.

Notifies the user about the event

E.

Remediates the event by deleting the malicious file

Full Access
Question # 26

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)

A.

Add the user to an external dynamic list (EDL).

B.

Tag the user using Panorama or the Web Ul of the firewall.

C.

Tag the user through the firewalls XML API.

D.

Tag the user through Active Directory

Full Access
Question # 27

Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?

A.

It processes each feature in a separate single pass with additional performance impact for each enabled feature.

B.

Its processing applies only to security features and does not include any networking features.

C.

It processes all traffic in a single pass with no additional performance impact for each enabled feature.

D.

It splits the traffic and processes all security features in a single pass and all network features in a separate pass

Full Access
Question # 28

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

A.

WildFire analysis

B.

Dynamic user groups (DUGs)

C.

Multi-factor authentication (MFA)

D.

URL Filtering Profiles

Full Access
Question # 29

The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the NGFW?

A.

First Packet Processor

B.

Stream-based Signature Engine

C.

SIA (Scan It All) Processing Engine

D.

Security Processing Engine

Full Access
Question # 30

Which three new script types can be analyzed in WildFire? (Choose three.)

A.

VBScript

B.

JScript

C.

MonoScript

D.

PythonScript

E.

PowerShell Script

Full Access
Question # 31

What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)

A.

Next-generation firewalls deployed with WildFire Analysis Security Profiles

B.

WF-500 configured as private clouds for privacy concerns

C.

Correlation Objects generated by AutoFocus

D.

Third-party data feeds such as partnership with ProofPomt and the Cyber Threat Alliance

E.

Palo Alto Networks non-firewall products such as Traps and Prisma SaaS

Full Access
Question # 32

What are two presales selling advantages of using Expedition? (Choose two.)

A.

map migration gaps to professional services statement of Works (SOWs)

B.

streamline & migrate to Layer7 policies using Policy Optimizer

C.

reduce effort to implement policies based on App-ID and User-ID

D.

easy migration process to move to Palo Alto Networks NGFWs

Full Access
Question # 33

Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)

A.

dedicated pair of decryption forwarding interfaces required per security chain

B.

a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule

C.

a unique Decryption policy rule is required per security chain

D.

a single pair of decryption forwarding interfaces

Full Access
Question # 34

Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?

A.

Prototype

B.

Inputs

C.

Class

D.

Feed Base URL

Full Access
Question # 35

A customer has business-critical applications that rely on the general web-browsing application. Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?

A.

File Blocking Profile

B.

DoS Protection Profile

C.

URL Filtering Profile

D.

Vulnerability Protection Profile

Full Access
Question # 36

Which two steps are required to configure the Decryption Broker? (Choose two.)

A.

reboot the firewall to activate the license

B.

activate the Decryption Broker license

C.

enable SSL Forward Proxy decryption

D.

enable a pair of virtual wire interfaces to forward decrypted traffic

Full Access
Question # 37

Match the functions to the appropriate processing engine within the dataplane.

Full Access
Question # 38

Which statement is true about Deviating Devices and metrics?

A.

A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation

B.

Deviating Device Tab is only available with a SD-WAN Subscription

C.

An Administrator can set the metric health baseline along with a valid standard deviation

D.

Deviating Device Tab is only available for hardware-based firewalls

Full Access
Question # 39

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

A.

M-200

B.

M-600

C.

M-100

D.

Panorama VM-Series

Full Access
Question # 40

Which two features are key in preventing unknown targeted attacks? (Choose two)

A.

nighty botnet report

B.

App-ID with the Zero Trust model

C.

WildFire Cloud threat analysis

D.

Single Pass Parallel Processing (SP3)

Full Access
Question # 41

A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.

Which version of WildFire will meet this customer’s requirements?

A.

WildFire Private Cloud

B.

WildFire Government Cloud

C.

WildFire Secure Cloud

D.

WildFire Public Cloud

Full Access