Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PSE-Strata - Palo Alto Networks System Engineer Professional - Strata

Page: 3 / 4
Total 137 questions

Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)

A.

Connector

B.

Database

C.

Recipient

D.

Operator

E.

Attribute

F.

Schedule

What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)

A.

operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)

B.

improved revenue due to more efficient network traffic throughput

C.

Increased security due to scalable cloud delivered security Services (CDSS)

D.

Cost savings due to reduction in IT management effort and device

Access to a business site is blocked by URL Filtering inline machine learning (ML) and

considered as a false-positive.

How should the site be made available?

A.

Disable URL Filtering inline ML

B.

Create a custom URL category and add it to the Security policy

C.

Create a custom URL category and add it on exception of the inline ML profile

D.

Change the action of real-time detection category on URL filtering profile

What action would address the sub-optimal traffic path shown in the figure?

Key:

RN - Remote Network

SC - Service Connection

MU GW - Mobile User Gateway

A.

Onboard a Service Connection in the Americas region

B.

Remove the Service Connection in the EMEA region

C.

Onboard a Service Connection in the APAC region

D.

Onboard a Remote Network location in the EMEA region

What is the default behavior in PAN-OS when a 12 MB portable executable (PE) fe is forwarded to the WildFire cloud service?

A.

PE File is not forwarded.

B.

Flash file is not forwarded.

C.

PE File is forwarded

D.

Flash file is forwarded

Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)

A.

use of decryption policies

B.

measure the adoption of URL filters. App-ID. User-ID

C.

use of device management access and settings

D.

expose the visibility and presence of command-and-control sessions

E.

identify sanctioned and unsanctioned SaaS applications

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

A.

Include all traffic types in decryption policy

B.

Inability to access websites

C.

Exclude certain types of traffic in decryption policy

D.

Deploy decryption setting all at one time

E.

Ensure throughput is not an issue

A customer is concerned about zero-day targeted attacks against its intellectual property.

Which solution informs a customer whether an attack is specifically targeted at them?

A.

Traps TMS

B.

AutoFocus

C.

Panorama Correlation Report

D.

Firewall Botnet Report

Which two features are key in preventing unknown targeted attacks? (Choose two)

A.

nighty botnet report

B.

App-ID with the Zero Trust model

C.

WildFire Cloud threat analysis

D.

Single Pass Parallel Processing (SP3)

How do you configure the rate of file submissions to WildFire in the NGFW?

A.

based on the purchased license uploaded

B.

QoS tagging

C.

maximum number of files per minute

D.

maximum number of files per day