Free PSE-Strata Exam Braindumps (page: 12)

Page 11 of 36

A company has deployed the following
· VM-300 firewalls in AWS
· endpoint protection with the Traps Management Service · a Panorama M-200 for managing its VM-Series firewalls · PA-5220s for its internet perimeter,
· Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).

  1. Prisma SaaS
  2. Traps Management Service
  3. VM-300 firewalls
  4. Panorama M-200 appliance

Answer(s): C,D



Which profile or policy should be applied to protect against port scans from the internet?

  1. Interface management profile on the zone of the ingress interface
  2. Zone protection profile on the zone of the ingress interface
  3. An App-ID security policy rule to block traffic sourcing from the untrust zone
  4. Security profiles to security policy rules for traffic sourcing from the untrust zone

Answer(s): B



When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?

  1. 8MB
  2. depends on the Cortex Data Lake tier purchased
  3. 18 bytes
  4. 1500 bytes

Answer(s): D

Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVMCA0



What can be applied to prevent users from unknowingly downloading malicious file types from the internet?

  1. A vulnerability profile to security policy rules that deny general web access
  2. An antivirus profile to security policy rules that deny general web access
  3. A zone protection profile to the untrust zone
  4. A file blocking profile to security policy rules that allow general web access

Answer(s): D

Explanation:

https://docs.paloaltonetworks.com/best-practices/8-1/internet-gateway-best-practices/best- practice-internet-gateway-security-policy/create-best-practice-security-profiles.html






Post your Comments and Discuss Palo Alto Networks PSE-Strata exam with other Community members:

PSE-Strata Discussions & Posts