Pass the Paloalto Networks PSE-Strata Professional PSE-Strata Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

Options:

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)


B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)


C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)


D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)


Expert Solution
Questions # 12:

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

Options:

A.

Include all traffic types in decryption policy


B.

Inability to access websites


C.

Exclude certain types of traffic in decryption policy


D.

Deploy decryption setting all at one time


E.

Ensure throughput is not an issue


Expert Solution
Questions # 13:

Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?

Options:

A.

Step 3: Architect a Zero Trust Network


B.

Step 5. Monitor and Maintain the Network


C.

Step 4: Create the Zero Trust Policy


D.

Step 1: Define the Protect Surface


E.

Step 2 Map the Protect Surface Transaction Flows


Expert Solution
Questions # 14:

Match the functions to the appropriate processing engine within the dataplane.

Question # 14


Expert Solution
Questions # 15:

WildFire can discover zero-day malware in which three types of traffic? (Choose three)

Options:

A.

SMTP


B.

HTTPS


C.

FTP


D.

DNS


E.

TFTP


Expert Solution
Questions # 16:

WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.

Which command returns a valid result to verify the ML is working from the command line.

Options:

A.

show wfml cloud-status


B.

show mlav cloud-status


C.

show ml cloud-status


D.

show av cloud-status


Expert Solution
Questions # 17:

in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

Options:

A.

Step 4. Create the Zero Trust policy.


B.

Step 2: Map the transaction flows.


C.

Step 3. Architect a Zero Trust network.


D.

Step 1: Define the protect surface


Expert Solution
Questions # 18:

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?

Options:

A.

M-600 appliance


B.

Panorama Interconnect plugin


C.

Panorama Large Scale VPN (LSVPN) plugin


D.

Palo Alto Networks Cluster license


Expert Solution
Questions # 19:

Question # 19

What action would address the sub-optimal traffic path shown in the figure?

Key:

RN - Remote Network

SC - Service Connection

MU GW - Mobile User Gateway

Options:

A.

Onboard a Service Connection in the Americas region


B.

Remove the Service Connection in the EMEA region


C.

Onboard a Service Connection in the APAC region


D.

Onboard a Remote Network location in the EMEA region


Expert Solution
Questions # 20:

Which profile or policy should be applied to protect against port scans from the internet?

Options:

A.

Interface management profile on the zone of the ingress interface


B.

Zone protection profile on the zone of the ingress interface


C.

An App-ID security policy rule to block traffic sourcing from the untrust zone


D.

Security profiles to security policy rules for traffic sourcing from the untrust zone


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions