Exam Details

  • Exam Code
    :PSE-PLATFORM
  • Exam Name
    :PSE-Platform Professional
  • Certification
    :PSE Platform
  • Vendor
    :Palo Alto Networks
  • Total Questions
    :60 Q&As
  • Last Updated
    :

Palo Alto Networks PSE Platform PSE-PLATFORM Questions & Answers

  • Question 1:

    Which two features are found in a next-generation firewall but are absent in a legacy firewall product? (Choose two)

    A. Identification of application is possible on any port

    B. Traffic is separated by zones

    C. Traffic control is based on IP, port, and protocol

    D. Policy match is a based on application

    E. Onboard SSL decryption capability is used

  • Question 2:

    The botnet report displays a confidence score of 1 to 5 indicating the likelihood of a botnet infection.

    Which three sources are used by the firewall as the basis of this score? (Choose three.)

    A. Bad Certificate Reports

    B. Traffic Type

    C. Botnet Reports

    D. Number of Events

    E. Executable Downloads

    F. Threat Landscape

  • Question 3:

    A network covers three geographical areas: Americas, Europe (EMEA), and Asia (APAC). The APAC

    segment of the network consists of nine HA pairs of PA-3060 firewalls, generating a combined log output K

    logs per second.

    Only 14 days of traffic log retention is required.

    Which management and logging solution will be effective and cost-efficient for this segment of the network?

    A. Two M-500s in HA management at the global level, with one M-100 with 4 TB of storage for APAC

    B. Two M-500s in HA management at the global level, and one log collector-mode M-500 with 8 TB of storage for APAC

    C. Two M-500s in HA management at the global level, and two log collector-mode M-500s in a log collector group with 16 TB of storage for APAC

    D. Two Dual-mode M-500s in HA for both global management and storage. Each M-500 has 8 TB of storage

  • Question 4:

    Which three application options can be selected in the security policy rule? (Choose three.)

    A. Application Group

    B. Individual Application

    C. Application Risk

    D. Application Filter

    E. Application Category

  • Question 5:

    Which profile or policy should be applied to protect against port scans from the internet?

    A. An App-ID security policy rule to block traffic sourcing from the untrust zone

    B. Security profiles to security policy rules for traffic sourcing from the untrust zone

    C. Interface management profile on the zone of the ingress interface

    D. Zone protection profile on the zone of the ingress interface

  • Question 6:

    A prospective customer was the victim of a zero-day attack that compromised specific employees, who then became unwitting attack vectors. The customer does not want that to happen again.

    Which two Palo Alto Networks platform components will help this customer? (Choose two.)

    A. Traps

    B. Correlation Objects

    C. Wildfire

    D. Autofocus

  • Question 7:

    Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two)

    A. Monitor Tab

    B. Network Tab

    C. Device Tab

    D. Objects Tab

    E. Policies Tab

  • Question 8:

    An endpoint, inside an organization, is infected with known malware. The malware attempts to make a command and control connection to a CandC server via the destination IP address.

    Which mechanism prevent this connection from succeeding?

    A. DNS Sinkholing

    B. DNS Proxy

    C. Anti-Spyware Signatures

    D. Wildfire Analysis

  • Question 9:

    What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)

    A. It should be used to create pipeline and customer interest.

    B. It should be used to demonstrate the power of the platform.

    C. The lab documentation should be reviewed and tested.

    D. It should be led by Palo Alto Network employees.

    E. The required equipment should be shipped to lab site in advance.

  • Question 10:

    What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)

    A. Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance

    B. Palo Alto Networks AutoFocus generated Correlation Objects

    C. Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security Profiles

    D. WF-500 configured as private clouds for privacy concerns

    E. Palo Alto Networks non-firewall products, like Traps and Aperture

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Palo Alto Networks exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PSE-PLATFORM exam preparations and Palo Alto Networks certification application, do not hesitate to visit our Vcedump.com to find your solutions here.