Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PSE-Strata - Palo Alto Networks System Engineer Professional - Strata

Page: 1 / 4
Total 137 questions

What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)

A.

when you're delivering a security strategy

B.

when client's want to see the power of the platform

C.

provide users visibility into the applications currently allowed on the network

D.

help streamline the deployment and migration of NGFWs

E.

assess the state of NGFW feature adoption

What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)

A.

Errors

B.

Environments

C.

Interfaces

D.

Mounts

E.

Throughput

F.

Sessions

G.

Status

Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)

A.

Domain Administrators

B.

Enterprise Administrators

C.

Distributed COM Users

D.

Event Log Readers

E.

Server Operator

Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?

A.

Once a day

B.

Once a week

C.

Once every minute

D.

Once an hour

Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?

A.

Prisma SaaS API

B.

Threat intelligence Cloud

C.

GlobalProtect

D.

Cortex XDR

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer's requirements? (Choose two.)

A.

Policy-based forwarding

B.

HA active/active

C.

Virtual systems

D.

HA active/passive

Which three new script types can be analyzed in WildFire? (Choose three.)

A.

VBScript

B.

JScript

C.

MonoScript

D.

PythonScript

E.

PowerShell Script

The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?

A.

Directory Sync and Cloud Authentication Service that support IdP ung SAML 2.0 and OAuth2

B.

Cloud Authentication Service that supports IdP using SAML 2.0 and OAuth2

C.

Directory Sync and Cloud Authentication Service that support IdP ng SAML 2.0

D.

Directory Sync that supports IdP using SAML 2.0

Which two network events are highlighted through correlation objects as potential security risks? (Choose two.)

A.

Identified vulnerability exploits

B.

Launch of an identified malware executable file

C.

Endpoints access files from a removable drive

D.

Suspicious host behavior

A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.

The customer uses a firewall with User-ID enabled

Which feature must also be enabled to prevent these attacks?

A.

Content Filtering

B.

WildFire

C.

Custom App-ID rules

D.

App-ID