Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PSE-Strata Exam Dumps - Palo Alto Networks System Engineer Professional - Strata

Question # 4

Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?

A.

Generate a Stats Dump File and upload it to the Palo Alto Networks support portal

B.

Select Panorama > Licenses and click Activate feature using authorization code

C.

Generate a Tech Support File and call PANTAC

D.

Select Device > Licenses and click Activate feature using authorization code

Full Access
Question # 5

Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)

A.

use of decryption policies

B.

measure the adoption of URL filters. App-ID. User-ID

C.

use of device management access and settings

D.

expose the visibility and presence of command-and-control sessions

E.

identify sanctioned and unsanctioned SaaS applications

Full Access
Question # 6

When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?

A.

X-Forwarded-For

B.

HTTP method

C.

HTTP response status code

D.

Content type

Full Access
Question # 7

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)

A.

Quarantine

B.

Allow

C.

Reset

D.

Redirect

E.

Drop

F.

Alert

Full Access
Question # 8

A company has deployed the following

• VM-300 firewalls in AWS

• endpoint protection with the Traps Management Service

• a Panorama M-200 for managing its VM-Series firewalls

• PA-5220s for its internet perimeter,

• Prisma SaaS for SaaS security.

Which two products can send logs to the Cortex Data Lake? (Choose two).

A.

Prisma SaaS

B.

Traps Management Service

C.

VM-300 firewalls

D.

Panorama M-200 appliance

Full Access
Question # 9

Which two steps are required to configure the Decryption Broker? (Choose two.)

A.

reboot the firewall to activate the license

B.

activate the Decryption Broker license

C.

enable SSL Forward Proxy decryption

D.

enable a pair of virtual wire interfaces to forward decrypted traffic

Full Access
Question # 10

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

A.

Create a footnote within the SLR generation tool

B.

Edit the Key-Findings text to list the other types of categories that may be of interest

C.

Remove unwanted categories listed under 'High Risk' and use relevant information

D.

Produce the report and edit the PDF manually

Full Access
Question # 11

Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)

A.

Request that the customer make part 3978 available to allow the evaluation unit to communicate with Panorama

B.

Inform the customer that a SPAN port must be provided for the evaluation unit, assuming a TAP mode deployment.

C.

Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned.

D.

Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible

E.

Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed

Full Access
Question # 12

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)

A.

User Mapping

B.

Proxy Authentication

C.

Group Mapping

D.

802.1X Authentication

Full Access
Question # 13

The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security.

The firewall provides which three types of reports? (Choose three.)

A.

SNMP Reports

B.

PDF Summary Reports

C.

Netflow Reports

D.

Botnet Reports

E.

User or Group Activity Reports

Full Access
Question # 14

Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?

A.

Vulnerability Protection profile

B.

Antivirus profile

C.

URL Filtering profile

D.

Anti-Spyware profile

Full Access
Question # 15

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

A.

WildFire

B.

DNS Security

C.

Threat Prevention

D.

loT Security

Full Access
Question # 16

Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

A.

Connector

B.

Database

C.

Recipient

D.

Operator

E.

Attribute

F.

Schedule

Full Access
Question # 17

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

A.

VM-200

B.

VM-100

C.

VM-50

D.

VM-300

Full Access
Question # 18

Which statement is true about Deviating Devices and metrics?

A.

A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation

B.

Deviating Device Tab is only available with a SD-WAN Subscription

C.

An Administrator can set the metric health baseline along with a valid standard deviation

D.

Deviating Device Tab is only available for hardware-based firewalls

Full Access
Question # 19

WildFire subscription supports analysis of which three types? (Choose three.)

A.

GIF

B.

7-Zip

C.

Flash

D.

RPM

E.

ISO

F.

DMG

Full Access