Free PSE-PLATFORM Exam Braindumps (page: 4)

Page 4 of 16

DNS sinkholing helps identify infected hosts on the protected network using DNS traffic in situations where the firewall cannot see the infected client's DNS query (that is, the firewall cannot see the originator of DNS query)
Which of the following Statements is true?

  1. DNS Sinkholing requires the Vulnerability Protection Profile be enabled.
  2. Sinkholing malware DNS queries solves this visibilty problem by forging responses to the client host queries directed at fake domains created in a controlled "Fake Internet" called Zanadu which designed for testing and honeypots.
  3. Infected hosts can then be easily identified in the traffic logs because any host that attempts to connect the sinkhole IP address are most likely infected with malware.
  4. DNS Sinkholing requires a license SinkHole license in order to activate.

Answer(s): C



Given the following network diagram, an administrator is considering the use of Windows Log Forwarding and Global Catalog servers for User-ID implementation. What are two potential bandwidth and processing bottlenecks to consider? (Choose two.)

  1. Member Servers
  2. Firewall
  3. Domain Controllers
  4. Windows Server

Answer(s): A,C



What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)

  1. Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance
  2. Palo Alto Networks AutoFocus generated Correlation Objects
  3. Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security Profiles
  4. WF-500 configured as private clouds for privacy concerns
  5. Palo Alto Networks non-firewall products, like Traps and Aperture

Answer(s): A,B,E

Explanation:

https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus



How do Highly Suspicious artifacts in-AutoFocus help identify when an unknown, potential zero-day, targeted attack occur to allow one to adjust the security posture?

  1. Highly Suspicious artifacts are associated with High-Risk payloads that are inflicting massive amounts
    of damage to end customers.
  2. All High Risk artifacts are automatically classified as Highly Suspicious.
  3. Highly Suspicious artifacts are High Risk artifacts that have been seen in very few samples.
  4. Highly Suspicious artifacts have been seen infecting a broad, significant range of companies.

Answer(s): C



Page 4 of 16



Post your Comments and Discuss Palo Alto Networks PSE-PLATFORM exam with other Community members:

Ajit Kumar Vishwakarma commented on December 06, 2024
I want to attend PSE certification; please guide me
Anonymous
upvote