Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks PSE-Strata-Associate Palo Alto Networks Systems Engineer (PSE) - Strata Associate Exam Practice Test

Page: 1 / 4
Total 35 questions

Palo Alto Networks Systems Engineer (PSE) - Strata Associate Questions and Answers

Question 1

Which deployment method is used to integrate a firewall to be inline in an existing network but does not support additional routing or switching?

Options:

A.

virtual wire

B.

TAP mode

C.

Layer 3

D.

Layer 2

Question 2

Which two of the following are ways that Palo Alto Networks CloudDelivered Security Services (CDSS) use confidential information collected from users? (Choose two.)

Select 2 Correct Responses

Options:

A.

legal compliance

B.

attack retaliation attribution

C.

verification of entitlements

D.

verification of applicant statements

Question 3

Which of the following is an appropriate first step for a customer interested in moving to Zero Trust?

Options:

A.

Ask administrators to switch on the Zero Trust options and features of their current products.

B.

Secure the funding required to incorporate the new architecture into their existing networks.

C.

Set priorities by identifying the most valuable and critical assets and data on their networks.

D.

Request a statement of compliance from their IT vendors against the Zero Trust standard.

Question 4

Implementation of which PAN-OS feature improves visibility and prevention of malware?

Options:

A.

Anti-Spyware profiles

B.

Data Filtering profiles

C.

Decryption profiles

D.

Antivirus profiles

Question 5

A customer has enabled the Threat Prevention subscription on their Palo Alto Networks Next-Generation Firewall.

How will the performance of the firewall be affected if the customer also enables both WildFire and User-ID?

Options:

A.

The maximum throughput performance will be reduced, but the impact will vary based on the firewall model being used.

B.

Enabling User-ID will have no additional performance impact, but enabling WildFire will reduce throughput.

C.

There will be no additional performance impact to the firewall, and throughput will remain the same, regardless of firewall model.

D.

Enabling WildFire will have no additional performance impact, but enabling User-ID will reduce throughput.

Question 6

Which two Cloud-Delivered Security Services (CDSS) would be appropriate for an organization that wants to secure internet traffic on a perimeter firewall? (Choose two.)

Select 2 Correct Responses

Options:

A.

WildFire

B.

Advanced URL Filtering (AURLF)

C.

Autonomous Digital Experience Management (ADEM)

D.

SD-WAN

Question 7

Using a comprehensive range of natively-integrated subscriptions and inline machine learning (ML), what does a Next-Generation Firewall (NGFW) use to prevent known and unknown threats in real time?

Options:

A.

Cloud Delivered Security Services (CDSS)

B.

Cloud Security Posture Management (CSPM)

C.

Cloud Native Security Platform (CNSP)

D.

Cloud Identity Access Management (CIAM)

Question 8

The ability of a Next-Generation Firewall (NGFW) to logically group physical and virtual interfaces and then control traffic based on that grouping is known as what?

Options:

A.

LLDP profiles

B.

security zones

C.

DHCP groups

D.

security profile groups

Question 9

To use App-ID effectively in Security policies, which three best practices should be followed? (Choose three.)

Select 3 Correct Responses

Options:

A.

Use Expedition to migrate a port-based policy to PAN-OS.

B.

Whenever possible, enable App-ID override.

C.

Use phased transition to safely enable applications.

D.

Use Policy Optimizer to migrate to an application-based policy.

E.

After the application is specified in policy, set the 7 service to "any".

Question 10

In which two of the following scenarios is personal data excluded from protection under the General Data Protection Regulation (GDPR)?

Select 2 Correct Responses

Options:

A.

The data was automated as part of an information filing system.

B.

The data was generated in the course of a purely personal or household activity.

C.

The data will be used for the prevention of criminal offenses.

D.

The data is related to a person's economic or cultural identity.

Page: 1 / 4
Total 35 questions