-->

whaust

2020年11月10日 星期二

[PSE-Strata] Palo Alto Networks System Engineer Professional – Strata Exam

 NO.1 Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)

A. Policy match is based on application

B. Traffic is separated by zones

C. Traffic control is based on IP port, and protocol

D. Identification of application is possible on any port 


Answer: A,D


NO.2 When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?

A. 18 bytes

B. 8MB

C. 1500 bytes

D. depends on the Cortex Data Lake tier purchased


Answer: C

Explanation:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVMCA0


NO.3 Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?

A. URL Filtering on the firewall, and MineMeld on Panorama

B. WildFire on the firewall, and AutoFocus on Panorama

C. GlobalProtect on the firewall, and Threat Prevention on Panorama

D. Threat Prevention on the firewall, and Support on Panorama 


Answer: D


NO.4 An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address Which mechanism prevents this connection from succeeding?

A. DNS Proxy

B. Anti-Spyware Signatures

C. Wildfire Analysis

D. DNS Sinkholing 


Answer: D


NO.5 A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions.

Which Network Processing Card should be recommended in the Bill of Materials?

A. PA-7000-40G-NPC

B. PA-7000-20GQ-NPC

C. PA-7000-20GQXM-NPC

D. PA-7000-20G-NPC

Answer: C


NO.6 Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

A. eDirectory monitoring

B. Active Directory monitoring

C. TACACS

D. Lotus Domino

E. SNMP server

F. RADIUS

G. Client Probing


Answer: C,F,G

Explanation:

https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping


沒有留言:

張貼留言

Popular