Exam Code : PSE-Strata
Exam Name : Palo Alto Networks System Engineer Professional Strata
Vendor Name :
"Palo-Alto"
PSE-Strata Dumps PSE-Strata Braindumps
PSE-Strata Real Questions PSE-Strata Practice Test PSE-Strata Actual Questions
Palo Alto Networks System Engineer Professional Strata
https://killexams.com/pass4sure/exam-detail/PSE-Strata
Question: 39
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
access key ID
secret access key
administrative Password
AWS account ID
https://docs.paloaltonetworks.com/prisma/prisma-saas/prisma-saas-admin/secure-cloud-apps/add-cloud-apps-to-prisma-saas/begin-scanning-an-amazon-s3-app.html
Question: 40
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy . Which two features must be enabled to meet the customer’s requirements? (Choose two.)
Policy-based forwarding
HA active/active
Virtual systems
HA active/passive
Question: 41
A service provider has acquired a pair of PA-7080s for its data center to secure its customer base’s traffic. The server provider’s traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions.
Which Network Processing Card should be recommended in the Bill of Materials?
A. PA-7000-20GQ-NPC B. PA-7000-40G-NPC
C. PA-7000-20GQXM-NPC D. PA-7000-20G-NPC
Question: 42
Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer’s current security posture?
BPA
PPA
Expedition
SLR
Question: 43
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
define an SSL decryption rulebase
enable User-ID
validate credential submission detection
enable App-ID
define URL Filtering Profile
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/prevent-credential-phishing.html
Question: 44
Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?
Generate a Stats Dump File and upload it to the Palo Alto Networks support portal
Select Panorama > Licenses and click Activate feature using authorization code
Generate a Tech Support File and call PANTAC
Select Device > Licenses and click Activate feature using authorization code
Question: 45
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface? A)
B)
C)
D)
Option
Option
Option
Option
Explanation:
https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html
Question: 46
Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?
WildFire on the firewall, and AutoFocus on Panorama
Threat Prevention on the firewall, and Support on Panorama
GlobalProtect on the firewall, and Threat Prevention on Panorama
URL Filtering on the firewall, and MineMeld on Panorama
Question: 47
A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.
Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
Informs WildFire and sends up a signature to the Cloud
Collects forensic information about the event
Communicates the status of the endpoint to the ESM
Notifies the user about the event
Remediates the event by deleting the malicious file
https://investors.paloaltonetworks.com/node/11156/html
Question: 48
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer. The customer already has multiple M-100s set up as a log collector group .
What are two valid reasons for deploying Panorama in High Availability? (Choose two.)
Control of post rules
Control local firewall rules
Ensure management continuity
Improve log collection redundancy
Question: 49
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
Threat logs
WildFire analysis reports
Botnet reports
Data filtering logs
SaaS reports
Question: 50
How do you configure the rate of file submissions to WildFire in the NGFW?
based on the purchased license uploaded
QoS tagging
maximum number of files per minute
maximum number of files per day