palo alto networks pse-strata practice test

Exam Title: Palo Alto Networks System Engineer Professional - Strata

Last update: Dec 07 ,2025
Question 1

A customer has business-critical applications that rely on the general web-browsing application. Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?

  • A. File Blocking Profile
  • B. DoS Protection Profile
  • C. URL Filtering Profile
  • D. Vulnerability Protection Profile
Answer:

a


Reference:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjaw53CvdHyAhUPy4UKHXT5D-MQFnoECAMQAQ&url=https%
3A%2F%2Fknowledgebase.paloaltonetworks.com%2Fservlet%2FfileField%3FentityId%3Dka10g000000U0roAAC%26field%
3DAttachment_1__Body__s&usg=AOvVaw3DCBM7-FwWInkWYANLrzUt
(32)

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

  • A. Enable App-ID.
  • B. Define a uniform resource locator (URL) Filtering profile.
  • C. Enable User-ID.
  • D. Enable User Credential Detection.
  • E. Define a Secure Sockets Layer (SSL) decryption rule base.
Answer:

bce

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 3

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

  • A. Include all traffic types in decryption policy
  • B. Inability to access websites
  • C. Exclude certain types of traffic in decryption policy
  • D. Deploy decryption setting all at one time
  • E. Ensure throughput is not an issue
Answer:

abc

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 4

In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

  • A. Step 1: Define the protect surface.
  • B. Step 4: Create the Zero Trust policy.
  • C. Step 3: Architect a Zero Trust network.
  • D. Step 2: Map the transaction flows.
Answer:

a


Reference:
https://www.paloaltonetworks.com/cyberpedia/zero-trust-5-step-methodology

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which methods are used to check for Corporate Credential Submissions? (Choose three.)

  • A. Group Mapping
  • B. IP User Mapping
  • C. LDAP query
  • D. Domain Credential Filter
  • E. User ID Credential Check
Answer:

abd


Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/methods-to-check-for-corporate-credential- submissions.html#id29eff481-13de-45b9-b73c-83e2e932ba20

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 6

What component is needed if there is a large scale deployment of Next Generation Firewalls with multiple Panorama Management Servers?

  • A. M-600 Appliance
  • B. Panorama Large Scale VPN Plugin
  • C. Panorama Interconnect Plugin
  • D. Palo Alto Networks Cluster License
Answer:

c


Reference:
https://savantsolutions.net/wp-content/uploads/woocommerce_uploads/2019/05/pcnse-study-guide-v9.pdf
(27)

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the
NGFW?

  • A. First Packet Processor
  • B. Stream-based Signature Engine
  • C. SIA (Scan It All) Processing Engine
  • D. Security Processing Engine
Answer:

b


Reference:
https://media.paloaltonetworks.com/documents/Single_Pass_Parallel_Processing_Architecture.pdfn
(page 6)

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

You have a prospective customer that is looking for a way to provide secure temporary access to contractors for a designated period of time. They currently add contractors to existing user groups and create ad hoc policies to provide network access. They admit that once the contractor no longer needs access to the network, administrators are usually too busy to manually delete policies that provided access to the contractor. This has resulted in over-provisioned access that has allowed unauthorized access to their systems.
They are looking for a solution to automatically remove access for contractors once access is no longer required.
You address their concern by describing which feature in the NGFW?

  • A. Dynamic User Groups
  • B. Dynamic Address Groups
  • C. Multi-factor Authentication
  • D. External Dynamic Lists
Answer:

a

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

  • A. benign
  • B. government
  • C. command and control (C2)
  • D. malware
  • E. grayware
Answer:

cde


Reference:
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/threat-prevention/dns-security/enable-dns-security

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 10

What is the key benefit of Palo Alto Networks single-pass architecture (SPA) design?

  • A. It requires only one processor to complete all the functions within the box.
  • B. It allows the addition of new functions to existing hardware without affecting performance.
  • C. It allows the addition of new devices to existing hardware without affecting performance.
  • D. It decodes each network flow multiple times, therefore reducing throughput.
Answer:

b

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 9
Viewing questions 1-10 out of 91
Go To
page 2