Paloalto Networks PSE Strata Palo Alto Networks System Engineer Professional – Strata Online Training
Paloalto Networks PSE Strata Online Training
The questions for PSE Strata were last updated at Nov 19,2024.
- Exam Code: PSE Strata
- Exam Name: Palo Alto Networks System Engineer Professional - Strata
- Certification Provider: Paloalto Networks
- Latest update: Nov 19,2024
A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).
Which Security profile is used to configure Domain Name Security (DNS) to Identity and block previously unknown DGA-based threats in real time?
- A . URL Filtering profile
- B . WildFire Analysis profile
- C . Vulnerability Protection profile
- D . Anti-Spyware profile
Which two features are key in preventing unknown targeted attacks? (Choose two)
- A . nighty botnet report
- B . App-ID with the Zero Trust model
- C . WildFire Cloud threat analysis
- D . Single Pass Parallel Processing (SP3)
What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?
- A . Run a Perl script to regularly check for updates and alert when one is released
- B . Monitor update announcements and manually push updates to Crewall
- C . Store updates on an intermediary server and point all the firewalls to it
- D . Use dynamic updates with the most aggressive schedule required by business needs
Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)
- A . Request that the customer make part 3978 available to allow the evaluation unit to communicate with Panorama
- B . Inform the customer that a SPAN port must be provided for the evaluation unit, assuming a TAP mode deployment.
- C . Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned.
- D . Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible
- E . Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
- A . X-Forwarded-For
- B . HTTP method
- C . HTTP response status code
- D . Content type
Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?
- A . Security policy rule
- B . Tag
- C . Login ID
- D . IP address
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
- A . SaaS reports
- B . data filtering logs
- C . WildFire analysis reports
- D . threat logs
- E . botnet reports
The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?
- A . WildFire
- B . DNS Security
- C . Threat Prevention
- D . loT Security
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization’s critical data, applications, assets, and services (DAAS) be identified?
- A . Step 4. Create the Zero Trust policy.
- B . Step 2: Map the transaction flows.
- C . Step 3. Architect a Zero Trust network.
- D . Step 1: Define the protect surface
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
- A . it requires the Vulnerability Protection profile to be enabled
- B . DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates
- C . infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs
- D . It requires a Sinkhole license in order to activate