Questions for the PSE-STRATA were updated on : Sep 05 ,2024
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
abd
Reference:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/prevent-credential-phishing.html
In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?
c
Reference:
https://docs.paloaltonetworks.com/vm-series/8-1/vm-series-deployment/set-up-the-vm-series-firewall-on-aws/high-availability-for-vm-series-firewall-on- aws/configure-activepassive-ha-on-aws.html
Palo Alto Networks publishes updated Command-and-Control signatures.
How frequently should the related signatures schedule be set?
c
Which three features are used to prevent abuse of stolen credentials? (Choose three.)
ace
Reference:
https://www.paloaltonetworks.com/company/press/2017/palo-alto-networks-delivers-industry-first-capabilities-to-prevent-credential-theft-and-abuse
What aspect of PAN-OS allows for the NGFW admin to create a policy that provides auto-remediation for anomalous user behavior and malicious activity while maintaining user visibility?
c
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-user-groups
In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data applications assets, and services (DAAS) be identified?
c
A customer is designing a private data center to host their new web application along with a separate headquarters for users.
Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?
a
Which two of the following does decryption broker provide on a NGFW? (Choose two.)
ab
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/decryption-broker.html
Which two features are key in preventing unknown targeted attacks? (Choose two.)
bd
A customer is concerned about zero-day targeted attacks against its intellectual property.
Which solution informs a customer whether an attack is specifically targeted at them?
a