Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PSE-Strata Exam Dumps - Palo Alto Networks System Engineer Professional - Strata

Go to page:
Question # 33

A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.

Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)

A.

Informs WildFire and sends up a signature to the Cloud

B.

Collects forensic information about the event

C.

Communicates the status of the endpoint to the ESM

D.

Notifies the user about the event

E.

Remediates the event by deleting the malicious file

Full Access
Question # 34

What are two benefits of using Panorama for a customer who is deploying virtual firewalls to secure data center traffic? (Choose two.)

A.

It can provide the Automated Correlation Engine functionality, which the virtual firewalls do not support.

B.

It can monitor the virtual firewalls' physical hosts and Vmotion them as necessary

C.

It can automatically create address groups for use with KVM.

D.

It can bootstrap the virtual firewalls for dynamic deployment scenarios.

Full Access
Question # 35

Which two products can send logs to the Cortex Data Lake? (Choose two.)

A.

AutoFocus

B.

PA-3260 firewall

C.

Prisma Access

D.

Prisma Public Cloud

Full Access
Question # 36

Which are the three mandatory components needed to run Cortex XDR? (Choose three.)

A.

Panorama

B.

NGFW with PANOS 8 0.5 or later

C.

Cortex Data Lake

D.

Traps

E.

Pathfinder

F.

Directory Syn Service

Full Access
Question # 37

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)

A.

Add the user to an external dynamic list (EDL).

B.

Tag the user using Panorama or the Web Ul of the firewall.

C.

Tag the user through the firewalls XML API.

D.

Tag the user through Active Directory

Full Access
Question # 38

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

A.

it requires the Vulnerability Protection profile to be enabled

B.

DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates

C.

infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs

D.

It requires a Sinkhole license in order to activate

Full Access
Question # 39

Match the WildFire Inline Machine Learning Model to the correct description for that model.

Full Access
Question # 40

In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)

A.

TXT

B.

API

C.

CSV

D.

EDL

Full Access
Go to page: