Palo Alto Networks PSE Strata Exam Practice Questions (P. 2)
- Full Access (136 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
What two types of certificates are used to configure SSL Forward Proxy? (׀¡hoose two.)
- AEnterprise CA-signed certificates
- BSelf-Signed certificates
- CIntermediate certificates
- DPrivate key certificates
Correct Answer:
AB
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/configure-ssl-forward-proxy#:~:text=You%20can%20use%20an%
20enterprise,as%20the%20forward%20trust%20certificate.&text=Certificate%20Name-,.,unique%20name%20for%20each%20firewall
AB
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/configure-ssl-forward-proxy#:~:text=You%20can%20use%20an%
20enterprise,as%20the%20forward%20trust%20certificate.&text=Certificate%20Name-,.,unique%20name%20for%20each%20firewall
send
light_mode
delete
Question #7
Which two of the following does decryption broker provide on a NGFW? (Choose two.)
- ADecryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only onceMost Voted
- BEliminates the need for a third party SSL decryption option which allows you to reduce the total number of third party devices performing analysis and enforcementMost Voted
- CProvides a third party SSL decryption option which allows you to increase the total number of third party devices performing analysis and enforcement
- DDecryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic multiple times
Correct Answer:
AB
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-broker.html
AB
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-broker.html
send
light_mode
delete
Question #8
There are different Master Keys on Panorama and managed firewalls.
What is the result if a Panorama Administrator pushes configuration to managed firewalls?
What is the result if a Panorama Administrator pushes configuration to managed firewalls?
- AThe push operation will fail regardless of an error or not within the configuration itself
- BProvided there's no error within the configuration to be pushed, the push will succeed
- CThe Master Key from the managed firewalls will be overwritten with the Master Key from Panorama
- DThere will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls
Correct Answer:
A
Reference:
https://www.reddit.com/r/paloaltonetworks/comments/onz15y/what_is_the_result_if_a_panorama_administrator/
A
Reference:
https://www.reddit.com/r/paloaltonetworks/comments/onz15y/what_is_the_result_if_a_panorama_administrator/
send
light_mode
delete
Question #9
Which task would be identified in Best Practice Assessment tool?
- Aidentify the visibility and presence of command-and-control sessions
- Bidentify sanctioned and unsanctioned SaaS applications
- Cidentify the threats associated with each application
- Didentify and provide recommendations for device management accessMost Voted
Correct Answer:
B
B

Option D, which focuses on identifying and providing recommendations for device management access, might be more aligned with the main functions of the Best Practice Assessment (BPA) tool. BPA primarily examines existing configurations against ideal configuration practices recommended by Palo Alto Networks and suggests enhancements. The tool does not directly engage with the identification of applications, whether sanctioned or unsanctioned, which seems to be more in the realm of the Application Identification (App-ID) technology. Therefore, understanding and improving configurations to align with best practices is central to the utility of the BPA.
send
light_mode
delete
Question #10
A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.
How is this goal accomplished?
How is this goal accomplished?
- ACreate a custom spyware signature matching the known signature with the time attribute
- BAdd a correlation object that tracks the occurrences and triggers above the desired threshold
- CSubmit a request to Palo Alto Networks to change the behavior at the next update
- DConfigure the Anti-Spyware profile with the number of rule counts to match the occurrence frequency
Correct Answer:
A
A

To handle a customer's request to trigger a known spyware threat signature based on a specific occurrence rate, such as 10 hits in 5 seconds, you should create a custom spyware signature that matches the known signature and includes a time attribute. This method allows the system to track the occurrence and rate, triggering alerts when the conditions meet the specified criteria. This approach effectively customizes the monitoring to be alert to specific behavioral patterns, thus enhancing threat detection based on temporal characteristics.
send
light_mode
delete
All Pages