Palo Alto Networks PSE Strata Exam Practice Questions (P. 3)
- Full Access (136 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which two features are found in Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
- APolicy match is based on application
- BTraffic control is based on IP, port, and protocol
- CTraffic is separated by zones
- DIdentification of application is possible on any port
Correct Answer:
AD
AD

Absolutely, both A and D define the capabilities that set Palo Alto Networks NGFW apart. These firewalls break the traditional boundary by focusing on app identification regardless of the port used, rather than just blocking or allowing traffic based on protocol, port, or IP address. This advanced approach enables more robust and flexible network security management compared to the legacy systems.
send
light_mode
delete
Question #12
For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same
Prisma Access location servicing a single Datacenter? (Choose two.)
Prisma Access location servicing a single Datacenter? (Choose two.)
- ANetwork segments in the Datacenter need to be advertised to only one Service ConnectionMost Voted
- BThe customer edge device needs to support policy-based routing with symmetric return functionalityMost Voted
- CThe resources in the Datacenter will only be able to reach remote network resources that share the same region
- DA maximum of four service connections per Datacenter are supported with this topology
Correct Answer:
AD
AD

The correct limitations when onboarding multiple Service Connections to the same Prisma Access location for a single Datacenter include the need for network segments in the Datacenter to be advertised to only one Service Connection and a cap of four service connections per Datacenter. These constraints ensure optimized routing and manageability within high bandwidth scenarios. This information aligns broadly with the stated guidelines and prerequisites in the Prisma Access documentation for setting up high bandwidth connections, confirming the limitation on the number of service connections and the advertisement requirement.
send
light_mode
delete
Question #13
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
- Ause of device management access and settingsMost Voted
- Bidentify sanctioned and unsanctioned SaaS applications
- Cexpose the visibility and presence of command-and-control sessions
- Dmeasure the adoption of URL filters, App-ID, User-IDMost Voted
- Euse of decryption policiesMost Voted
Correct Answer:
BDE
BDE

The correct answers to the question centered on identifying best practices in the Best Practice Assessment tool are B, D, and E. These options specifically cover evaluating sanctioned and unsanctioned SaaS applications, measuring the adoption of URL filters, App-ID, User-ID, and the use of decryption policies. These areas are crucial for enhancing network security and ensuring efficient traffic monitoring and management, aligning well with Palo Alto Networks' emphasis on comprehensive, aspect-oriented security approach.
send
light_mode
delete
Question #14
You have a prospective customer that is looking for a way to provide secure temporary access to contractors for a designated period of time. They currently add contractors to existing user groups and create ad hoc policies to provide network access. They admit that once the contractor no longer needs access to the network, administrators are usually too busy to manually delete policies that provided access to the contractor. This has resulted in over-provisioned access that has allowed unauthorized access to their systems.
They are looking for a solution to automatically remove access for contractors once access is no longer required.
You address their concern by describing which feature in the NGFW?
They are looking for a solution to automatically remove access for contractors once access is no longer required.
You address their concern by describing which feature in the NGFW?
- ADynamic User Groups
- BDynamic Address Groups
- CMulti-factor Authentication
- DExternal Dynamic Lists
Correct Answer:
A
A

Dynamic User Groups in NGFW are ideal for situations where user access needs to be automatically managed and adjusted based on certain criteria, such as the duration of a contractor’s engagement. This feature streamlines the process, reducing manual intervention and thereby securing the network from over-provisioned access that could lead to unauthorized entry once the access is no longer required. Essentially, this feature ensures that when conditions change, such as at the end of a contract period, the access permissions update accordingly with no manual oversight needed.
send
light_mode
delete
Question #15
Which methods are used to check for Corporate Credential Submissions? (Choose three.)
- AGroup Mapping
- BIP User Mapping
- CLDAP query
- DDomain Credential Filter
- EUser ID Credential Check
Correct Answer:
ABD
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/methods-to-check-for-corporate-credential- submissions.html#id29eff481-13de-45b9-b73c-83e2e932ba20
ABD
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/methods-to-check-for-corporate-credential- submissions.html#id29eff481-13de-45b9-b73c-83e2e932ba20
send
light_mode
delete
All Pages