Pass the Paloalto Networks PSE-Strata Professional PSE-Strata-Pro-24 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two files are used to deploy CN-Series firewalls in Kubernetes clusters? (Choose two.)

Options:

A.

PAN-CN-NGFW-CONFIG


B.

PAN-CN-MGMT-CONFIGMAP


C.

PAN-CN-MGMT


D.

PAN-CNI-MULTUS


Questions # 2:

What is used to stop a DNS-based threat?

Options:

A.

DNS proxy


B.

Buffer overflow protection


C.

DNS tunneling


D.

DNS sinkholing


Questions # 3:

Which statement applies to the default configuration of a Palo Alto Networks NGFW?

Options:

A.

Security profiles are applied to all policies by default, eliminating implicit trust of any data traversing the firewall.


B.

The default policy action for intrazone traffic is deny, eliminating implicit trust within a security zone.


C.

The default policy action allows all traffic unless explicitly denied.


D.

The default policy action for interzone traffic is deny, eliminating implicit trust between security zones.


Questions # 4:

Which three tools can a prospective customer use to evaluate Palo Alto Networks products to assess where they will fit in the existing architecture? (Choose three)

Options:

A.

Proof of Concept (POC)


B.

Policy Optimizer


C.

Security Lifecycle Review (SLR)


D.

Ultimate Test Drive


E.

Expedition


Questions # 5:

When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?

Options:

A.

Advanced URL Filtering uses machine learning (ML) to learn which malicious URLs are being utilized by the attackers, then block the resulting traffic.


B.

Advanced Threat Prevention's command injection and SQL injection functions use inline deep learning against zero-day threats.


C.

Single Pass Architecture and parallel processing ensure traffic is efficiently scanned against any enabled Cloud-Delivered Security Services (CDSS) subscription.


D.

WildFire loads custom OS images to ensure that the sandboxing catches any activity that would affect the customer's environment.


Questions # 6:

Regarding APIs, a customer RFP states: "The vendor’s firewall solution must provide an API with an enforcement mechanism to deactivate API keys after two hours." How should the response address this clause?

Options:

A.

Yes - This is the default setting for API keys.


B.

No - The PAN-OS XML API does not support keys.


C.

No - The API keys can be made, but there is no method to deactivate them based on time.


D.

Yes - The default setting must be changed from no limit to 120 minutes.


Questions # 7:

A company with a large Active Directory (AD) of over 20,000 groups has user roles based on group membership in the directory. Up to 1,000 groups may be used in Security policies. The company has limited operations personnel and wants to reduce the administrative overhead of managing the synchronization of the groups with their firewalls.

What is the recommended architecture to synchronize the company's AD with Palo Alto Networks firewalls?

Options:

A.

Configure a group mapping profile with custom filters for LDAP attributes that are mapped to the user roles.


B.

Configure a group mapping profile, without a filter, to synchronize all groups.


C.

Configure a group mapping profile with an include group list.


D.

Configure NGFWs to synchronize with the AD after deploying the Cloud Identity Engine (CIE) and agents.


Questions # 8:

A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.

Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?

Options:

A.

GlobalProtect with multiple authentication profiles for each SAML IdP


B.

Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways


C.

Authentication sequence that has multiple authentication profiles using different authentication methods


D.

Multiple Cloud Identity Engine tenants for each business unit


Questions # 9:

A systems engineer (SE) is working with a customer that is fully cloud-deployed for all applications. The customer is interested in Palo Alto Networks NGFWs but describes the following challenges:

"Our apps are in AWS and Azure, with whom we have contracts and minimum-revenue guarantees. We would use the built-in firewall on the cloud service providers (CSPs), but the need for centralized policy management to reduce human error is more important."

Which recommendations should the SE make?

Options:

A.

Cloud NGFWs at both CSPs; provide the customer a license for a Panorama virtual appliance from their CSP's marketplace of choice to centrally manage the systems.


B.

Cloud NGFWs in AWS and VM-Series firewall in Azure; the customer selects a PAYG licensing Panorama deployment in their CSP of choice.


C.

VM-Series firewalls in both CSPs; manually built Panorama in the CSP of choice on a host of either type: Palo Alto Networks provides a license.


D.

VM-Series firewall and CN-Series firewall in both CSPs; provide the customer a private-offer Panorama virtual appliance from their CSP’s marketplace of choice to centrally manage the systems.


Questions # 10:

In addition to DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions are minimum recommendations for all NGFWs that handle north-south traffic? (Choose three)

Options:

A.

SaaS Security


B.

Advanced WildFire


C.

Enterprise DLP


D.

Advanced Threat Prevention


E.

Advanced URL Filtering


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions