This page was exported from Latest Exam Prep [ http://certify.vceprep.com ] Export date:Sat Sep 21 12:53:56 2024 / +0000 GMT ___________________________________________________ Title: Free Palo Alto Networks Systems Engineer PSE-Strata Ultimate Study Guide (Updated 90 Questions) [Q31-Q51] --------------------------------------------------- Free Palo Alto Networks Systems Engineer PSE-Strata Ultimate Study Guide (Updated 90 Questions) Get to the Top with PSE-Strata Practice Exam Questions NEW QUESTION 31Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)  Domain Administrators  Enterprise Administrators  Distributed COM Users  Event Log Readers  Server Operator https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/user-identification/device-user-identification-user-mapping/user-id-agent-setup/user-id-agent-setup-wmi-authenticationNEW QUESTION 32In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)  TXT  API  CSV  EDL NEW QUESTION 33Which two types of security chains are supported by the Decryption Broker? (Choose two.)  virtual wire  transparent bridge  Layer 3  Layer 2 NEW QUESTION 34The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security.The firewall provides which three types of reports? (Choose three.)  SNMP Reports  PDF Summary Reports  Netflow Reports  Botnet Reports  User or Group Activity Reports NEW QUESTION 35A company has deployed the following* VM-300 firewalls in AWS* endpoint protection with the Traps Management Service* a Panorama M-200 for managing its VM-Series firewalls* PA-5220s for its internet perimeter,* Prisma SaaS for SaaS security.Which two products can send logs to the Cortex Data Lake? (Choose two).  Prisma SaaS  Traps Management Service  VM-300 firewalls  Panorama M-200 appliance NEW QUESTION 36An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)  Control of post rules  Control local firewall rules  Ensure management continuity  Improve log collection redundancy NEW QUESTION 37Which statement is true about Deviating Devices and metrics?  A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation  Deviating Device Tab is only available with a SD-WAN Subscription  An Administrator can set the metric health baseline along with a valid standard deviation  Deviating Device Tab is only available for hardware-based firewalls NEW QUESTION 38Decryption port mirroring is now supported on which platform?  all hardware-based and VM-Series firewalls with the exception of VMware NSX. Citrix SDX, or public cloud hypervisors  in hardware only  only one the PA-5000 Series and higher  all hardware-based and VM-Series firewalls regardless of where installed NEW QUESTION 39When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?  8MB  depends on the Cortex Data Lake tier purchased  18 bytes  1500 bytes NEW QUESTION 40Which three features are used to prevent abuse of stolen credentials? (Choose three.)  multi-factor authentication  URL Filtering Profiles  WildFire Profiles  Prisma Access  SSL decryption rules NEW QUESTION 41The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the NGFW?  First Packet Processor  Stream-based Signature Engine  SIA (Scan It All) Processing Engine  Security Processing Engine NEW QUESTION 42Which task would be identified in Best Practice Assessment tool?  identify the visibility and presence of command-and-control sessions  identify sanctioned and unsanctioned SaaS applications  identify the threats associated with each application  identify and provide recommendations for device management access NEW QUESTION 43Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)  define an SSL decryption rulebase  enable User-ID  validate credential submission detection  enable App-ID  define URL Filtering Profile NEW QUESTION 44An Administrator needs a PDF summary report that contains information compiled from existing reports based on data for the Top five(5) in each category Which two timeframe options are available to send this report?(Choose two.)  Daily  Monthly  Weekly  Bi-weekly NEW QUESTION 45Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer’s current security posture?  BPA  PPA  Expedition  SLR NEW QUESTION 46As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?  access key ID  secret access key  administrative Password  AWS account ID NEW QUESTION 47When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?  1500 to 2500 bytes  10MB to 30 MB  1MB to 5 MB  100MB to 200 MB NEW QUESTION 48An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address Which mechanism prevents this connection from succeeding?  DNS Sinkholing  DNS Proxy  Anti-Spyware Signatures  Wildfire Analysis NEW QUESTION 49What action would address the sub-optimal traffic path shown in the figure?Key:RN – Remote NetworkSC – Service ConnectionMU GW – Mobile User Gateway  Onboard a Service Connection in the Americas region  Remove the Service Connection in the EMEA region  Onboard a Service Connection in the APAC region  Onboard a Remote Network location in the EMEA region NEW QUESTION 50Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.  5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1xPAN-LGS-1TB-1YR  5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1xPAN-SVC-BAS-PRA-25. 1x PAN-PRA-25  5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YRr 1xPAN-LGS-1TB-1YR, 1x PAN-PRA-25, 1x PAN-SVC-BAS-PRA-25  1x PAN-GPCS-USER-C-BAS-1YR, 1x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YR NEW QUESTION 51When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?  8MB  depends on the Cortex Data Lake tier purchased  18 bytes  1500 bytes Explanationhttps://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVMCA0 Loading … Pass Palo Alto Networks PSE-Strata exam - questions - convert Tets Engine to PDF: https://www.vceprep.com/PSE-Strata-latest-vce-prep.html --------------------------------------------------- Images: https://certify.vceprep.com/wp-content/plugins/watu/loading.gif https://certify.vceprep.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-04-14 09:25:49 Post date GMT: 2022-04-14 09:25:49 Post modified date: 2022-04-14 09:25:49 Post modified date GMT: 2022-04-14 09:25:49