Free PSE-Strata Exam Braindumps (page: 3)

Page 2 of 36

Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)

  1. User Mapping
  2. Proxy Authentication
  3. Group Mapping
  4. 802.1X Authentication

Answer(s): A,C

Explanation:

https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id



Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

  1. breach the perimeter
  2. weaponize vulnerabilities
  3. lateral movement
  4. exfiltrate data
  5. recon the target
  6. deliver the malware

Answer(s): A,C,D,F



Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

  1. define an SSL decryption rulebase
  2. enable User-ID
  3. validate credential submission detection
  4. enable App-ID
  5. define URL Filtering Profile

Answer(s): B,C,E

Explanation:

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/prevent- credential-phishing.html



An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

  1. Create a footnote within the SLR generation tool
  2. Edit the Key-Findings text to list the other types of categories that may be of interest
  3. Remove unwanted categories listed under 'High Risk' and use relevant information
  4. Produce the report and edit the PDF manually

Answer(s): C






Post your Comments and Discuss Palo Alto Networks PSE-Strata exam with other Community members:

PSE-Strata Discussions & Posts