PSE-Strata Practice Test Questions

139 Questions


Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?


A. BPA


B. PPA


C. Expedition


D. SLR





D.
  SLR

Explanation:

The Security Lifecycle Review (SLR) is a pre-sales tool used by Palo Alto Networks that involves an in-depth interview, typically lasting around 4 hours, to assess a customer's current security posture. The SLR provides a comprehensive review of the security measures in place, identifies potential gaps, and offers recommendations for improvements. This tool helps organizations understand their security environment and make informed decisions about enhancing their security infrastructure.

References: Palo Alto Networks SLR documentation.

Which two steps are required to configure the Decryption Broker? (Choose two.)


A. reboot the firewall to activate the license


B. activate the Decryption Broker license


C. enable SSL Forward Proxy decryption


D. enable a pair of virtual wire interfaces to forward decrypted traffic





B.
  activate the Decryption Broker license

C.
  enable SSL Forward Proxy decryption

Explanation:

To configure the Decryption Broker, the following two steps are required:

Activate the Decryption Broker license: Ensure that the appropriate license is activated to enable the decryption broker feature.

Enable SSL Forward Proxy decryption: Configure SSL Forward Proxy decryption on the firewall to intercept, decrypt, and inspect SSL/TLS traffic. This setup allows the decrypted traffic to be forwarded to other security devices for further analysis.

These steps are essential to leverage the Decryption Broker functionality, which facilitates deeper inspection and security analysis of encrypted traffic.

References:

Palo Alto Networks Decryption Broker Configuration Guide
Palo Alto Networks SSL Decryption Documentation

Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?


A. Generate a Stats Dump File and upload it to the Palo Alto Networks support portal


B. Select Panorama > Licenses and click Activate feature using authorization code


C. Generate a Tech Support File and call PANTAC


D. Select Device > Licenses and click Activate feature using authorization code





B.
  Select Panorama > Licenses and click Activate feature using authorization code

Explanation:

To activate or retrieve a Device Management License on the M-100 Appliance after the authorization codes have been activated on the Palo Alto Networks Support Site, you need to navigate to Panorama > Licenses. From there, you can click on "Activate feature using authorization code". This option allows you to input the necessary authorization code to activate the desired license feature directly through the Panorama interface. This process is designed to streamline license management and ensure that all activated features are correctly applied to your device.

References:

Palo Alto Networks Administrator's Guide
Palo Alto Networks Licensing Documentation

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)


A. Include all traffic types in decryption policy


B. Inability to access websites


C. Exclude certain types of traffic in decryption policy


D. Deploy decryption setting all at one time


E. Ensure throughput is not an issue





A.
  Include all traffic types in decryption policy

B.
  Inability to access websites

E.
  Ensure throughput is not an issue

Explanation:

Before implementing a decryption policy on Next-Generation Firewalls (NGFW), it is essential to consider the potential inability to access some websites due to issues like certificate pinning or incompatibility. Excluding certain types of traffic (e.g., financial or healthcare) from decryption can avoid legal and privacy issues. Ensuring that the firewall's throughput can handle the additional load from decrypting traffic is critical to maintain network performance and avoid bottlenecks.

References:

Palo Alto Networks' SSL Decryption Best Practices
GDPR (General Data Protection Regulation) considerations for traffic inspection
Network performance guidelines from various cybersecurity standards bodies

Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)


A. use of decryption policies


B. measure the adoption of URL filters. App-ID. User-ID


C. use of device management access and settings


D. expose the visibility and presence of command-and-control sessions


E. identify sanctioned and unsanctioned SaaS applications





A.
  use of decryption policies

B.
  measure the adoption of URL filters. App-ID. User-ID

E.
  identify sanctioned and unsanctioned SaaS applications

Explanation:

The Best Practice Assessment (BPA) tool provided by Palo Alto Networks helps organizations to assess and improve their security posture. The tool identifies several best practices, including:

Use of Decryption Policies: Implementing decryption policies ensures that encrypted traffic can be inspected for threats. This is crucial for identifying and mitigating risks hidden within SSL/TLS encrypted traffic​ (Marks4Sure)​.

Measure the Adoption of URL Filters, App-ID, User-ID: The BPA tool evaluates how effectively the organization is utilizing URL filtering, application identification (App-ID), and user identification (User-ID) to enforce security policies. These technologies are essential for granular control and visibility over network traffic​ (Marks4Sure)​.

Identify Sanctioned and Unsanctioned SaaS Applications: The tool helps in identifying which SaaS applications are being used within the network, distinguishing between those that are sanctioned by IT and those that are not. This visibility is crucial for managing shadow IT and ensuring that only approved applications are used, reducing security risks​ (Marks4Sure)​.

Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)


A. Domain Administrators


B. Enterprise Administrators


C. Distributed COM Users


D. Event Log Readers





A.
  Domain Administrators

C.
  Distributed COM Users

D.
  Event Log Readers

Explanation:

For the User-ID Agent to perform WMI (Windows Management Instrumentation) Authentication on a Windows Server, the following domain permissions are required:

Domain Administrators: This group has the highest level of privileges in the domain and can perform any action within the Active Directory domain.

Distributed COM Users: This group allows members to launch, activate, and use Distributed COM objects on the server.

Event Log Readers: This group provides read access to the event logs, which is crucial for the User-ID Agent to collect security events necessary for user identification​ (Palo Alto Networks)​​ (Palo Alto Networks)​.

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?


A. It eliminates of the necessity for dynamic analysis in the cloud


B. It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity


C. It is always able to give more accurate verdicts than the cloud ML analysis reducing false positives and false negatives


D. It improves the CPU performance of content inspection





B.
  It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity

Explanation:

Having WildFire machine learning (ML) capability inline on the firewall provides significant advantages in real-time threat prevention.

Inline ML Capability:

The firewall can analyze and block unknown malicious files in real-time, preventing the first instance of infection (patient zero).

This enhances security without disrupting business productivity, as threats are mitigated immediately.

[Reference: Palo Alto Networks WildFire ML documentation., ]

Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)


A. Request that the customer make part 3978 available to allow the evaluation unit to communicate with Panorama


B. Inform the customer that a SPAN port must be provided for the evaluation unit, assuming a TAP mode deployment.


C. Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned.


D. Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible


E. Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed





C.
  Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned.

D.
  Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible

E.
  Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed

Explanation:

Before deploying a firewall evaluation unit in a customer environment, it is essential to take certain preparatory actions to ensure a smooth evaluation process and accurate results.

Upgrade the evaluation unit to the most current recommended firmware, unless a demo of the upgrade process is planned (Option C):

Ensures that the evaluation unit is running the latest and most secure firmware, providing the best performance and security features available.

[Reference: Palo Alto Networks documentation on firmware upgrades., Set expectations for information being presented in the Security Lifecycle Review (SLR) because personal user information will be made visible (Option D):, It is crucial to inform the customer about the types of data that will be visible in the SLR to avoid any privacy concerns., Reference: Palo Alto Networks SLR guide., Reset the evaluation unit to factory default to ensure that data from any previous customer evaluation is removed (Option E):, This ensures that any residual data from previous evaluations does not affect the current evaluation results., Reference: Palo Alto Networks documentation on resetting devices to factory defaults., , , ]

A client chooses to not block uncategorized websites. Which two additions should be made to help provide some protection? (Choose two.)


A. A URL filtering profile with the action set to continue for unknown URL categories to security policy rules that allow web access


B. A data filtering profile with a custom data pattern to security policy rules that deny uncategorized websites


C. A file blocking profile attached to security policy rules that allow uncategorized websites to help reduce the risk of drive by downloads


D. A security policy rule using only known URL categories with the action set to allow





A.
  A URL filtering profile with the action set to continue for unknown URL categories to security policy rules that allow web access

C.
  A file blocking profile attached to security policy rules that allow uncategorized websites to help reduce the risk of drive by downloads

Explanation:

When a client chooses not to block uncategorized websites, additional measures are necessary to maintain a level of protection.

A URL filtering profile with the action set to continue for unknown URL categories: By setting the action to continue, users will be prompted before accessing uncategorized websites, which provides an extra layer of caution and awareness, helping to mitigate risks associated with unknown sites.

A file blocking profile attached to security policy rules: This helps to reduce the risk of drive-by downloads by blocking potentially harmful file types from being downloaded when users visit uncategorized websites. This additional layer of security ensures that even if users access risky sites, the likelihood of malicious file downloads is minimized.

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)


A. Threat logs


B. WildFire analysis reports


C. Botnet reports


D. Data filtering logs


E. SaaS reports





B.
  WildFire analysis reports

C.
  Botnet reports

D.
  Data filtering logs

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)


A. retention requirements


B. Traps agent forensic data


C. the number of Traps agents


D. agent size and OS





B.
  Traps agent forensic data

D.
  agent size and OS

There are different Master Keys on Panorama and managed firewalls. What is the result if a Panorama Administrator pushes configuration to managed firewalls?


A. The push operation will fail regardless of an error or not within the configuration itself


B. Provided there’s no error within the configuration to be pushed, the push will succeed


C. The Master Key from the managed firewalls will be overwritten with the Master Key from Panorama


D. There will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls





A.
  The push operation will fail regardless of an error or not within the configuration itself


Page 2 out of 12 Pages
Previous