Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Paloalto Networks PSE-Strata-Associate Dumps Questions Answers

Palo Alto Networks Systems Engineer (PSE) - Strata Associate Questions and Answers

Question 1

In which two of the following scenarios is personal data excluded from protection under the General Data Protection Regulation (GDPR)?

Select 2 Correct Responses

Options:

A.

The data was automated as part of an information filing system.

B.

The data was generated in the course of a purely personal or household activity.

C.

The data will be used for the prevention of criminal offenses.

D.

The data is related to a person's economic or cultural identity.

Buy Now
Question 2

Which traffic will be blocked when application-default service is set on a Security policy?

Options:

A.

SSH traffic on TCP/22

B.

HTTPS traffic on TCP/443

C.

HTTP traffic on TCP/81

D.

DNS traffic on UDP/53

Question 3

A customer has enabled the Threat Prevention subscription on their Palo Alto Networks Next-Generation Firewall.

How will the performance of the firewall be affected if the customer also enables both WildFire and User-ID?

Options:

A.

The maximum throughput performance will be reduced, but the impact will vary based on the firewall model being used.

B.

Enabling User-ID will have no additional performance impact, but enabling WildFire will reduce throughput.

C.

There will be no additional performance impact to the firewall, and throughput will remain the same, regardless of firewall model.

D.

Enabling WildFire will have no additional performance impact, but enabling User-ID will reduce throughput.

Question 4

Which Next-Generation Firewall (NGFW) deployment model allows an organization to monitor traffic during evaluations without interruption to network traffic?

Options:

A.

Layer 2

B.

TAP mode

C.

virtual wire

D.

Layer 3

Question 5

What are three unique benefits of the Palo Alto Networks Content-ID? (Choose three.) Select 3 Correct Responses

Options:

A.

micro-segmenting network traffic based on the unique identification number of the content

B.

increasing latency as new threat prevention features are enabled

C.

detecting and preventing known and unknown threats in a single pass

D.

enforcing policy control over unapproved web surfing

E.

proactively identifying and defending against unknown, new, or custom malware and exploits

Question 6

Which three of the following are features of the Palo Alto Networks Next-Generation Firewall (NGFW) that differentiate it from a stateful inspection firewall? (Choose three.)

Select 3 Correct Responses

Options:

A.

Login-ID

B.

User-ID

C.

App-ID

D.

Network-ID

E.

SSL/SSH Decrypt

Question 7

Implementation of which PAN-OS feature improves visibility and prevention of malware?

Options:

A.

Anti-Spyware profiles

B.

Data Filtering profiles

C.

Decryption profiles

D.

Antivirus profiles

Question 8

A customer interested in Panorama is concerned about managing multiple firewalls they are putting in place globally. Each location has its own IP addresses, zones, and VPN configurations.

Which element of Panorama will assist the customer in pushing this unique configuration information to the individual firewalls?

Options:

A.

device profile

B.

GlobalProtect

C.

templates

D.

device groups

Question 9

Which two Cloud-Delivered Security Services (CDSS) would be appropriate for an organization that wants to secure internet traffic on a perimeter firewall? (Choose two.)

Select 2 Correct Responses

Options:

A.

WildFire

B.

Advanced URL Filtering (AURLF)

C.

Autonomous Digital Experience Management (ADEM)

D.

SD-WAN

Question 10

What is a technical benefit of User-ID in relation to policy control?

Options:

A.

It matches traffic against policy to check whether it is allowed on the network.

B.

It allows all users to designate view-only access to itinerant personnel.

C.

It improves safe enablement of applications traversing the network.

D.

It encrypts all private keys and passwords in the configuration.