Pass the Paloalto Networks PSE-Strata Professional PSE-Strata Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)

Options:

A.

Add the user to an external dynamic list (EDL).


B.

Tag the user using Panorama or the Web Ul of the firewall.


C.

Tag the user through the firewalls XML API.


D.

Tag the user through Active Directory


Expert Solution
Questions # 22:

Which three mechanisms are valid for enabling user mapping? (Choose three.)

Options:

A.

Captive Portal


B.

Domain server monitoring


C.

Reverse DNS lookup


D.

User behaviour recognition


E.

Client probing


Expert Solution
Questions # 23:

Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?

Options:

A.

Prisma SaaS API


B.

Threat intelligence Cloud


C.

GlobalProtect


D.

Cortex XDR


Expert Solution
Questions # 24:

What are three considerations when deploying User-ID? (Choose three.)

Options:

A.

Specify included and excluded networks when configuring User-ID


B.

Only enable User-ID on trusted zones


C.

Use a dedicated service account for User-ID services with the minimal permissions necessary


D.

User-ID can support a maximum of 15 hops


E.

Enable WMI probing in high security networks


Expert Solution
Questions # 25:

A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.

How is this goal accomplished?

Options:

A.

Create a custom spyware signature matching the known signature with the time attribute


B.

Add a correlation object that tracks the occurrences and triggers above the desired threshold


C.

Submit a request to Palo Alto Networks to change the behavior at the next update


D.

Configure the Anti-Spyware profile with the number of rule counts to match the occurrence frequency


Expert Solution
Questions # 26:

Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?

Options:

A.

Prototype


B.

Inputs


C.

Class


D.

Feed Base URL


Expert Solution
Questions # 27:

Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)

Options:

A.

use of decryption policies


B.

measure the adoption of URL filters. App-ID. User-ID


C.

use of device management access and settings


D.

expose the visibility and presence of command-and-control sessions


E.

identify sanctioned and unsanctioned SaaS applications


Expert Solution
Questions # 28:

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)

Options:

A.

User Mapping


B.

Proxy Authentication


C.

Group Mapping


D.

802.1X Authentication


Expert Solution
Questions # 29:

An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address

Which mechanism prevents this connection from succeeding?

Options:

A.

DNS Sinkholing


B.

DNS Proxy


C.

Anti-Spyware Signatures


D.

Wildfire Analysis


Expert Solution
Questions # 30:

Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)

Options:

A.

dedicated pair of decryption forwarding interfaces required per security chain


B.

a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule


C.

a unique Decryption policy rule is required per security chain


D.

a single pair of decryption forwarding interfaces


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions