Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PSE-Strata Questions and Answers

Question # 6

Which three features are used to prevent abuse of stolen credentials? (Choose three.)

A.

multi-factor authentication

B.

URL Filtering Profiles

C.

WildFire Profiles

D.

Prisma Access

E.

SSL decryption rules

Full Access
Question # 7

Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?

A.

Dynamic user groups (DUGS)

B.

tagging groups

C.

remote device User-ID groups

D.

dynamic address groups (DAGs)

Full Access
Question # 8

Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)

A.

FTP

B.

HTTPS

C.

RTP

D.

HTTP

Full Access
Question # 9

Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?

A.

Security policy rule

B.

Tag

C.

Login ID

D.

IP address

Full Access
Question # 10

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

A.

it requires the Vulnerability Protection profile to be enabled

B.

DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates

C.

infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs

D.

It requires a Sinkhole license in order to activate

Full Access
Question # 11

What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)

A.

Errors

B.

Environments

C.

Interfaces

D.

Mounts

E.

Throughput

F.

Sessions

G.

Status

Full Access
Question # 12

Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 13

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

A.

WildFire analysis

B.

Dynamic user groups (DUGs)

C.

Multi-factor authentication (MFA)

D.

URL Filtering Profiles

Full Access
Question # 14

Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?

A.

User ID and Device-ID

B.

Source-D and Network.ID

C.

Source ID and Device-ID

D.

User-ID and Source-ID

Full Access
Question # 15

Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)

A.

Vulnerability protection

B.

Anti-Spyware

C.

Anti-Virus

D.

Botnet detection

E.

App-ID protection

Full Access
Question # 16

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 17

In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)

A.

Dedicated Logger Mode is required

B.

Logs per second exceed 10,000

C.

Appliance needs to be moved into data center

D.

Device count is under 100

Full Access
Question # 18

Which two methods are used to check for Corporate Credential Submissions? (Choose two.)

A.

doman credentialiter

B.

User-ID credential check

C.

LDAP query

D.

IP user mapping

Full Access
Question # 19

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

A.

SaaS reports

B.

data filtering logs

C.

WildFire analysis reports

D.

threat logs

E.

botnet reports

Full Access
Question # 20

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

A.

Validate user identities through authentication

B.

Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall

C.

Categorize data and applications by levels of sensitivity

D.

Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls

Full Access