Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PSE-Strata-Associate Exam Dumps - Palo Alto Networks Systems Engineer (PSE) - Strata Associate

Question # 4

What are three unique benefits of the Palo Alto Networks Content-ID? (Choose three.) Select 3 Correct Responses

A.

micro-segmenting network traffic based on the unique identification number of the content

B.

increasing latency as new threat prevention features are enabled

C.

detecting and preventing known and unknown threats in a single pass

D.

enforcing policy control over unapproved web surfing

E.

proactively identifying and defending against unknown, new, or custom malware and exploits

Full Access
Question # 5

An administrator wants to deploy a pair of firewalls in an active/active high availability (HA) architecture.

Which two deployment types are supported in this circumstance? (Choose two.) Select 2 Correct Responses

A.

Layer 3

B.

TAP mode

C.

Virtual Wire

D.

Layer 2

Full Access
Question # 6

Which subscription should be activated when a predefined, known malicious IP address is updated?

A.

WildFire

B.

Cortex Data Lake

C.

Threat Prevention

D.

URL Filtering

Full Access
Question # 7

What file is needed from a firewall to generate a Security Lifecycle Review (SLR) report when creating the SLR?

A.

tech support file

B.

Panorama plugin registration file

C.

stats dump file

D.

system process core file

Full Access
Question # 8

Which deployment method is used to integrate a firewall to be inline in an existing network but does not support additional routing or switching?

A.

virtual wire

B.

TAP mode

C.

Layer 3

D.

Layer 2

Full Access
Question # 9

How does Cloud Identity Engine (CIE) simplify deployment of cloudbased services to provide user authentication?

A.

It allows configuration of an authentication source once instead of for each authentication method.

B.

It expands the capability to filter and forward decrypted and non-decrypted Transport Layer Security (TLS) traffic.

C.

It ensures that a compromised master key does not compromise the configuration encryption for an entire deployment.

D.

It authenticates users via a cloud-based service and refers to the hub for mappings for group identification.

Full Access
Question # 10

To use App-ID effectively in Security policies, which three best practices should be followed? (Choose three.)

Select 3 Correct Responses

A.

Use Expedition to migrate a port-based policy to PAN-OS.

B.

Whenever possible, enable App-ID override.

C.

Use phased transition to safely enable applications.

D.

Use Policy Optimizer to migrate to an application-based policy.

E.

After the application is specified in policy, set the 7 service to "any".

Full Access