Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PSE-Strata-Pro-24 Questions and Answers

Question # 6

A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.

Which subscription(s) should the systems engineer recommend?

A.

Threat Prevention

B.

App-ID and Data Loss Prevention

C.

DNS Security

D.

Advanced Threat Prevention and Advanced URL Filtering

Full Access
Question # 7

Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?

A.

Best Practice Assessment (BPA)

B.

Security Lifecycle Review (SLR)

C.

Firewall Sizing Guide

D.

Golden Images

Full Access
Question # 8

Which two methods are valid ways to populate user-to-IP mappings? (Choose two.)

A.

XML API

B.

Captive portal

C.

User-ID

D.

SCP log ingestion

Full Access
Question # 9

Which three tools can a prospective customer use to evaluate Palo Alto Networks products to assess where they will fit in the existing architecture? (Choose three)

A.

Proof of Concept (POC)

B.

Policy Optimizer

C.

Security Lifecycle Review (SLR)

D.

Ultimate Test Drive

E.

Expedition

Full Access
Question # 10

What would make a customer choose an on-premises solution over a cloud-based SASE solution for their network?

A.

High growth phase with existing and planned mergers, and with acquisitions being integrated.

B.

Most employees and applications in close physical proximity in a geographic region.

C.

Hybrid work and cloud adoption at various locations that have different requirements per site.

D.

The need to enable business to securely expand its geographical footprint.

Full Access
Question # 11

There are no Advanced Threat Prevention log events in a company's SIEM instance. However, the systems administrator has confirmed that the Advanced Threat Prevention subscription is licensed and that threat events are visible in the threat logs on the firewall.

Which action should the systems administrator take next?

A.

Enable the company's Threat Prevention license.

B.

Check with the SIEM vendor to verify that Advanced Threat Prevention logs are reaching the company's SIEM instance.

C.

Have the SIEM vendor troubleshoot its software.

D.

Ensure the Security policy rules that use Advanced Threat Prevention are set for log forwarding to the correct SIEM.

Full Access
Question # 12

A security engineer has been tasked with protecting a company's on-premises web servers but is not authorized to purchase a web application firewall (WAF).

Which Palo Alto Networks solution will protect the company from SQL injection zero-day, command injection zero-day, Cross-Site Scripting (XSS) attacks, and IIS exploits?

A.

Threat Prevention and PAN-OS 11.x

B.

Advanced Threat Prevention and PAN-OS 11.x

C.

Threat Prevention, Advanced URL Filtering, and PAN-OS 10.2 (and higher)

D.

Advanced WildFire and PAN-OS 10.0 (and higher)

Full Access
Question # 13

As a team plans for a meeting with a new customer in one week, the account manager prepares to pitch Zero Trust. The notes provided to the systems engineer (SE) in preparation for the meeting read: "Customer is struggling with security as they move to cloud apps and remote users." What should the SE recommend to the team in preparation for the meeting?

A.

Lead with the account manager pitching Zero Trust with the aim of convincing the customer that the team's approach meets their needs.

B.

Design discovery questions to validate customer challenges with identity, devices, data, and access for applications and remote users.

C.

Lead with a product demonstration of GlobalProtect connecting to an NGFW and Prisma Access, and have SaaS security enabled.

D.

Guide the account manager into recommending Prisma SASE at the customer meeting to solve the issues raised.

Full Access
Question # 14

A customer has acquired 10 new branch offices, each with fewer than 50 users and no existing firewall. The systems engineer wants to recommend a PA-Series NGFW with Advanced Threat Prevention at each branch location. Which NGFW series is the most cost-efficient at securing internet traffic?

A.

PA-200

B.

PA-400

C.

PA-500

D.

PA-600

Full Access
Question # 15

The efforts of a systems engineer (SE) with an industrial mining company account have yielded interest in Palo Alto Networks as part of its effort to incorporate innovative design into operations using robots and remote-controlled vehicles in dangerous situations. A discovery call confirms that the company will receive control signals to its machines over a private mobile network using radio towers that connect to cloud-based applications that run the control programs.

Which two sets of solutions should the SE recommend?

A.

That 5G Security be enabled and architected to ensure the cloud computing is not compromised in the commands it is sending to the onsite machines.

B.

That Cloud NGFW be included to protect the cloud-based applications from external access into the cloud service provider hosting them.

C.

That IoT Security be included for visibility into the machines and to ensure that other devices connected to the network are identified and given risk and behavior profiles.

D.

That an Advanced CDSS bundle (Advanced Threat Prevention, Advanced WildFire, and Advanced URL Filtering) be procured to ensure the design receives advanced protection.

Full Access
Question # 16

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?

A.

Configure Cloud Identity Engine to learn the users' IP address-user mappings from the AD authentication logs.

B.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect Windows SSO to gather user information.

C.

Configure data redistribution to redistribute IP address-user mappings from a hub NGFW to the other spoke NGFWs.

D.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect agents to gather user information.

Full Access
Question # 17

Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?

A.

High entropy DNS domains

B.

Polymorphic DNS

C.

CNAME cloaking

D.

DNS domain rebranding

Full Access
Question # 18

Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?

A.

Code-embedded NGFWs provide enhanced internet of things (IoT) security by allowing PAN-OS code to be run on devices that do not support embedded virtual machine (VM) images.

B.

Serverless NGFW code security provides public cloud security for code-only deployments that do not leverage virtual machine (VM) instances or containerized services.

C.

IT/OT segmentation firewalls allow operational technology resources in plant networks to securely interface with IT resources in the corporate network.

D.

PAN-OS GlobalProtect gateways allow companies to run malware and exploit prevention modules on their endpoints without installing endpoint agents.

Full Access