PSE-Strata Practice Test Questions

139 Questions


Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?


A. Prisma SaaS API


B. Threat intelligence Cloud


C. GlobalProtect


D. Cortex XDR





C.
  GlobalProtect


Explanation:

GlobalProtect is the Palo Alto Networks security component designed to extend next-generation firewall (NGFW) policies to remote users. It provides comprehensive security by ensuring that all network traffic from remote devices is inspected and secured, just as if the users were on the corporate network. This helps maintain consistent security policies and protections regardless of user location.

[Reference:, Palo Alto Networks GlobalProtect, , ]

Which are the three mandatory components needed to run Cortex XDR? (Choose three.)


A. Panorama


B. NGFW with PANOS 8 0.5 or later


C. Cortex Data Lake


D. Traps


E. Pathfinder


F. Directory Syn Service





B.
  NGFW with PANOS 8 0.5 or later


C.
  Cortex Data Lake


D.
  Traps


Explanation:

To run Cortex XDR effectively, the following three mandatory components are required:

NGFW with PANOS 8.0.5 or Later: The Next-Generation Firewall (NGFW) running PANOS 8.0.5 or later is necessary to provide advanced security features and integration with Cortex XDR. Cortex Data Lake: This component is essential for storing and analyzing large volumes of data, providing the necessary infrastructure for Cortex XDR to perform threat detection and response. Traps: Traps (now part of Cortex XDR Endpoint Protection) is essential for endpoint protection, helping to prevent, detect, and respond to threats on endpoints.

These components work together to provide comprehensive threat detection and response capabilities within the Cortex XDR framework.

Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)


A. dedicated pair of decryption forwarding interfaces required per security chain


B. a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule


C. a unique Decryption policy rule is required per security chain


D. a single pair of decryption forwarding interfaces





B.
  a unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule


C.
  a unique Decryption policy rule is required per security chain


Explanation:

When configuring the NGFW to act as a decryption broker for multiple transparent bridge security chains, the following items are required:

A unique Transparent Bridge Decryption Forwarding Profile to a single Decryption policy rule

(B): Each decryption policy rule must be associated with a unique Transparent Bridge Decryption Forwarding Profile. This ensures that decrypted traffic is forwarded appropriately to the specific security chain. A unique Decryption policy rule is required per security chain

(C): You need to create a separate decryption policy rule for each security chain. This allows you to distribute the decrypted traffic among multiple security chains based on policy criteria.

These configurations enable the firewall to effectively manage and distribute the load across multiple security chains, ensuring optimal performance and security (Palo Alto Networks) (Palo Alto Networks)

Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?


A. Once a day


B. Once a week


C. Once every minute


D. Once an hour





A.
  Once a day


Explanation:
Palo Alto Networks updates Command-and-Control (C2) signatures frequently to ensure the latest threats are detected and blocked. The recommended schedule for updating C2 signatures is once a day. This daily update ensures that the firewall has the most current threat intelligence, providing robust protection against C2 traffic.

What helps avoid split brain in active / passive high availability (HA) pair deployment?


A. Enable preemption on both firewalls in the HA pair.


B. Use a standard traffic interface as the HA3 link.


C. Use the management interface as the HA1 backup link


D. Use a standard traffic interface as the HA2 backup





C.
  Use the management interface as the HA1 backup link


Explanation:

To avoid split-brain scenarios in an active/passive high availability (HA) pair deployment, it is essential to ensure reliable communication between the HA peers. Using the management interface as the HA1 backup link provides an additional communication path between the firewalls, ensuring they can synchronize state information and avoid scenarios where both units assume the active role due to a communication failure.

[Reference:, Palo Alto Networks High Availability, ]

Prisma SaaS provides which two SaaS threat prevention capabilities? (Choose two)


A. shellcode protection


B. file quarantine


C. SaaS AppID signatures


D. WildFire analysis





B.
  file quarantine


D.
  WildFire analysis


Explanation:

Prisma SaaS offers several threat prevention capabilities, including:

File Quarantine:

This feature isolates suspicious files detected in SaaS applications, preventing them from spreading or causing harm until they can be further analyzed and remediated.

WildFire Analysis:

Prisma SaaS leverages WildFire, Palo Alto Networks' advanced malware analysis service, to examine suspicious files and links in SaaS applications, providing thorough threat detection and prevention (LIVEcommunity | Palo Alto Networks) (Palo Alto Networks).

Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?


A. Dynamic user groups (DUGS)


B. tagging groups


C. remote device User-ID groups


D. dynamic address groups (DAGs)





A.
  Dynamic user groups (DUGS)


Explaination:

Dynamic User Groups (DUGs) is a built-in feature of PAN-OS that allows NGFW administrators to create policies that provide auto-remediation for anomalous user behavior and malicious activity while maintaining user visibility. DUGs dynamically update group membership based on user attributes and behavior, enabling real-time policy enforcement and automatic response to security incidents.

[Reference:, Palo Alto Networks Dynamic User Groups, ]

How do you configure the rate of file submissions to WildFire in the NGFW?


A. based on the purchased license uploaded


B. QoS tagging


C. maximum number of files per minute


D. maximum number of files per day





D.
  maximum number of files per day


Explanation:

To configure the rate of file submissions to WildFire in a Palo Alto Networks NGFW, you set a limit on the maximum number of files submitted per day. This configuration allows administrators to control and manage the volume of files sent to WildFire for analysis, ensuring that it fits within the limits of their license and operational requirements.

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?


A. M-600 appliance


B. Panorama Interconnect plugin


C. Panorama Large Scale VPN (LSVPN) plugin


D. Palo Alto Networks Cluster license





B.
  Panorama Interconnect plugin

Explanation:

For large-scale deployments of Next-Generation Firewalls (NGFWs) with multiple Panorama Management Servers, the Panorama Interconnect plugin is essential. This plugin enables the interconnection and management of multiple Panorama instances, allowing for centralized policy management and configuration across a distributed network environment. It ensures scalability and efficient management in large deployments.

[Reference:, Palo Alto Networks Panorama, ]

What will best enhance security of a production online system while minimizing the impact for the existing network?


A. Layer 2 interfaces


B. active / active high availability (HA)


C. Virtual wire


D. virtual systems





C.
  Virtual wire

Explanation:

Using a virtual wire (vWire) interface configuration can enhance the security of a production online system while minimizing the impact on the existing network.

Virtual Wire:

A vWire interface operates transparently at Layer 2, allowing the firewall to inspect traffic without making changes to the existing network topology.
This mode is ideal for inline deployments where minimal changes to the network configuration are desired.

[Reference: Palo Alto Networks vWire documentation., , ]

Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?


A. User ID and Device-ID


B. Source-D and Network.ID


C. Source ID and Device-ID


D. User-ID and Source-ID





A.
  User ID and Device-ID

Explanation:

Palo Alto Networks uses proprietary technologies to identify and control traffic sources regardless of IP address or network segment. These technologies include:

User-ID (A): This technology maps IP addresses to user identities, allowing policies to be enforced based on user or group identity rather than just IP addresses. This is especially useful in dynamic environments where IP addresses can change frequently.

Device-ID (A): This technology helps to identify and control devices accessing the network. It provides visibility into which devices are on the network and ensures that policies can be applied based on device type and identity.

References:

Palo Alto Networks, User-ID and Device-ID Documentation.
Palo Alto Networks, Technology Whitepapers.

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)


A. WildFire analysis


B. Dynamic user groups (DUGs)


C. Multi-factor authentication (MFA)


D. URL Filtering Profiles





C.
  Multi-factor authentication (MFA)

D.
  URL Filtering Profiles

Explanation:

To prevent the abuse of stolen credentials, two effective configuration elements are:

Multi-Factor Authentication (MFA) (C): Implementing MFA adds an additional layer of security by requiring users to provide two or more verification factors to gain access to a resource such as an application or online account. This significantly reduces the risk of credential abuse because even if the credentials are stolen, the attacker would still need the second factor to gain access.

URL Filtering Profiles (D): URL Filtering Profiles help prevent access to malicious or inappropriate websites. By restricting access to known phishing and malicious sites, URL filtering can prevent users from inadvertently entering their credentials on fraudulent websites, thereby reducing the chances of credential theft and misuse.

References:

Palo Alto Networks, Multi-Factor Authentication Setup and URL Filtering Profiles documentation.


Page 1 out of 12 Pages