Leads4pass > Palo Alto Networks > PSE Platform > PSE-PLATFORM > PSE-PLATFORM Online Practice Questions and Answers

PSE-PLATFORM Online Practice Questions and Answers

Questions 4

What is the HA limitation specific to the PA-200 appliance?

A. Can be deployed in either an active/passive or active/active HA pair

B. Can only synchronize configurations and does not support session synchronization

C. Has a dedicated HA1 and HA2 ports, but no HA3

D. Is the only Palo Alto Networks firewall that does not have any HA capabilities

Buy Now
Questions 5

What are three considerations when deploying User-ID. (Choose three.)

A. Enable WMI probing in high security networks

B. User-ID can support a maximum hops.

C. Specify included and excluded networks when configuring User-ID

D. Use a dedicated service account for User-ID services with the minimal permissions necessary.

E. Only enable User-ID on trusted zones

Buy Now
Questions 6

Which four steps of the cyberattack lifecycle dose the Palo Alto Networks platform present? (Choose four)

A. Breach the perimeter

B. Exfiltrate data

C. Weaponries vulnerabilities

D. Deliver the malware

E. Recon the target

F. Lateral movement

Buy Now
Questions 7

Because of regulatory compliance a customer cannot decrypt specific types of traffic.

Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?

A. App-ID, to use applications as match criteria in the decryption policy rules

B. SSL Decryption, for inbound inspection and granular Forward Proxy SSL decryption

C. Support, to request custom categories as match criteria in decryption policy rules

D. URL Filtering, to use predefined URL categories as match criteria in the decryption policy rules

Buy Now
Questions 8

An administrator needs a PDF summary report that contains information compiled from existing reports

based on data for the top 5 in each category.

How often will the Administrator receive the report?

A. Bi-weekly

B. Daily

C. Weekly

D. Monthly

Buy Now
Questions 9

Which three policies or certificates must be configured for SSL Forward Proxy decryption? (Choose three.)

A. Forward trust certificate

B. Forward untrust certificate

C. A decrypt port mirror policy

D. Internal server certificate

E. A decryption policy

Buy Now
Questions 10

What are two core values of the Palo Alto Network Security Platform? (Choose two)

A. Sale enablement of all applications

B. Deployment of multiple point-based solutions to provide full security coverage

C. Prevention of cyberattacks

D. Threat remediation

E. Defense against threats with static security solution

Buy Now
Questions 11

An endpoint, inside an organization, is infected with known malware. The malware attempts to make a command and control connection to a CandC server via the destination IP address.

Which mechanism prevent this connection from succeeding?

A. DNS Sinkholing

B. DNS Proxy

C. Anti-Spyware Signatures

D. Wildfire Analysis

Buy Now
Questions 12

A network covers three geographical areas: Americas, Europe (EMEA), and Asia (APAC). The APAC

segment of the network consists of nine HA pairs of PA-3060 firewalls, generating a combined log output K

logs per second.

Only 14 days of traffic log retention is required.

Which management and logging solution will be effective and cost-efficient for this segment of the network?

A. Two M-500s in HA management at the global level, with one M-100 with 4 TB of storage for APAC

B. Two M-500s in HA management at the global level, and one log collector-mode M-500 with 8 TB of storage for APAC

C. Two M-500s in HA management at the global level, and two log collector-mode M-500s in a log collector group with 16 TB of storage for APAC

D. Two Dual-mode M-500s in HA for both global management and storage. Each M-500 has 8 TB of storage

Buy Now
Questions 13

Which two features are found in a next-generation firewall but are absent in a legacy firewall product? (Choose two)

A. Identification of application is possible on any port

B. Traffic is separated by zones

C. Traffic control is based on IP, port, and protocol

D. Policy match is a based on application

E. Onboard SSL decryption capability is used

Buy Now
Exam Code: PSE-PLATFORM
Exam Name: PSE-Platform Professional
Last Update: Nov 30, 2024
Questions: 60
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99