Paloalto Networks PSE Strata Palo Alto Networks System Engineer Professional – Strata Online Training
Paloalto Networks PSE Strata Online Training
The questions for PSE Strata were last updated at Nov 19,2024.
- Exam Code: PSE Strata
- Exam Name: Palo Alto Networks System Engineer Professional - Strata
- Certification Provider: Paloalto Networks
- Latest update: Nov 19,2024
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
- A . Vulnerability Protection profile
- B . Antivirus profile
- C . URL Filtering profile
- D . Anti-Spyware profile
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides auto remediation for anomalous user behavior and malicious activity while maintaining user visibility?
- A . Dynamic user groups (DUGS)
- B . tagging groups
- C . remote device User-ID groups
- D . dynamic address groups (DAGs)
Which three mechanisms are valid for enabling user mapping? (Choose three.)
- A . Captive Portal
- B . Domain server monitoring
- C . Reverse DNS lookup
- D . User behaviour recognition
- E . Client probing
Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?
- A . It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server.
- B . When it is in place, it removes the need for an onsite firewall
- C . When the service is purchased, Palo Alto Networks sends an engineer to physically deploy the firewall to the customer environment
- D . It allows a firewall to be automatically connected to the local network wirelessly
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
- A . Add the user to an external dynamic list (EDL).
- B . Tag the user using Panorama or the Web Ul of the firewall.
- C . Tag the user through the firewalls XML API.
- D . Tag the user through Active Directory
A packet that is already associated with a current session arrives at the firewall.
What is the flow of the packet after the firewall determines that it is matched with an existing session?
- A . it is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through a single stream-based content inspection engine before egress.
- B . It is sent through the slow path for further inspection. If subject to content inspection, it will pass through a single stream-based content inspection engines before egress
- C . It is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through multiple content inspection engines before egress
- D . It is sent through the slow path for further inspection. If subject to content inspection, it will pass through multiple content inspection engines before egress
The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?
- A . Directory Sync and Cloud Authentication Service that support IdP ung SAML 2.0 and OAuth2
- B . Cloud Authentication Service that supports IdP using SAML 2.0 and OAuth2
- C . Directory Sync and Cloud Authentication Service that support IdP ng SAML 2.0
- D . Directory Sync that supports IdP using SAML 2.0
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
- A . Validate user identities through authentication
- B . Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
- C . Categorize data and applications by levels of sensitivity
- D . Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.
Which command returns a valid result to verify the ML is working from the command line.
- A . show wfml cloud-status
- B . show mlav cloud-status
- C . show ml cloud-status
- D . show av cloud-status
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
- A . Enable User Credential Detection
- B . Enable User-ID
- C . Define a Secure Sockets Layer (SSL) decryption rule base
- D . Enable App-ID
- E . Define a uniform resource locator (URL) Filtering profile