Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Foundation Accreditation Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Test - Palo Alto Networks Accredited

Systems Engineer (PSE): Foundation


Accreditation Exam

PSE: Foundation

Question 1 of 20.

Which statement is true about how WildFire® scans files for viruses, malware, and spyware?

 A WildFire Analysis Profile needs to be set to define which files to forward to the WildFire cloud to trigger
inspection for zero-day malware.

 The firewall must have policy rules in place before it can forward a questionable file to WildFire, where the file is
analyzed for zero-day malware.

 For WildFire to be most effective, you need to deploy a WF-500 appliance to get the full benefits of WildFire
threat intelligence scanning.

 The firewall must have a WildFire Analysis Profile rule attached to a Security policy rule that will scan files for
viruses, malware, and spyware.

Mark for follow up

Question 2 of 20.

How does the Log Collector differ from the Logging Service?

 The Log Collector ensures redundancy by having multiple copies of your log database, and the Logging Service
is regionalized based on your location.

 The Log Collector provides a centralized repository for your on-premises and virtual firewalls, and the Logging
Service provides only data isolation to avoid cross-contamination of logs.

 The Log Collector has built-in log redundancy, and the Logging Service has no cloud compliance requirements.

 The Log Collector is hardware-based, and the Logging Service is scalable on demand.

Mark for follow up


Question 3 of 20.

Which factor does not impact sizing decisions?

 performance

 decryption

 number of applications

 redundancy

 sessions

 number of policy rules

Mark for follow up

Question 4 of 20.

The VM-Series firewalls support which five environments? (Choose five.)

 Citrix XenServer

 AWS

 VMware NSX

 Google Cloud Platform

 VMware ESXi

 Azure

 Linux VServer

Mark for follow up

Question 5 of 20.

Which option describes Panorama?

 the name of the web interface for the next-generation firewall

 a tab on the firewall's web interface that provides management functionality beyond that provided by other tabs

 provides centralized management for multiple firewalls

 provides early visibility into new features of the firewall's operating system, PAN-OS®

Mark for follow up

Question 6 of 20.
How frequently are WildFire® updates about previously unknown files delivered from the cloud to customers with a
WildFire subscription?

 every 60 minutes

 every day

 every 5 minutes

 every 15 minutes

 every 30 minutes

Mark for follow up

Question 7 of 20.

What are three subscriptions for the next-generation firewall? (Choose three.)

 Content-ID

 Threat Prevention

 WildFire®

 SSL Decryption

 URL Filtering

 App-ID

 User-ID

Mark for follow up

Question 8 of 20.

Which option describes WildFire®?

 It provides an Analysis Summary that summarizes a firewall’s ability to reduce the attack surface of an
environment.

 It is a controlling firewall that provides configuration rules that controlled firewalls must submit to.

 It provides cloud-delivered malware analysis on files submitted to it.

 It is a general-purpose hash-generation and match process used in firewalls as an early step in their session
processing.

Mark for follow up

Question 9 of 20.

What is the function of the Decryption Broker on the next-generation firewall?


 function as centralized communication between firewalls for decoding traffic content

 consolidate all the information from scans for unknown malware, system status, and system health alerts of the
firewall into one central broker interface

 eliminate the need for a third-party SSL decryption solution and reduce the number of thirdparty devices
performing traffic analysis and enforcement

 decode applications and URL traffic coming through the firewall and assign priority to specific traffic patterns
according to geographical location

Mark for follow up

Question 10 of 20.

The second evolution of the cybersecurity industry results in consistent security across multiple places in the data
center and cloud computing environments. How is Palo Alto Networks driving the next evolution in the industry?

 by building security into the operating systems that run on hypervisors and into the applications that run on
containers

 by integrating all cybersecurity functions onto a single board or chip

 by providing visibility and enforcement to facilitate ease of consumption of new innovative technologies

 by providing its own cloud infrastructure complete with cybersecurity for organizations to migrate to

Mark for follow up

Question 11 of 20.

Palo Alto Networks platform products commonly are deployed in which four critical places in the network to solve
many of today's enterprise security problems? (Choose four.)

 branch office

 data center perimeter

 mobile or endpoint device

 video game console

 internet perimeter

 vehicle-mounted hotspot

Mark for follow up

Question 12 of 20.

Which trend involves cyberattackers and technology advancement?


 The ever-increasing number, power, and sophistication of cyberattacks makes cyberprevention technology
increasingly futile.

 The ever-increasing power of cybersecurity prevention platforms makes cyberattacks and their attackers less
and less relevant.

 The ever-decreasing cost of computing power enables cybercriminals to launch automated, sophisticated
attacks at ever-decreasing costs.

 The ever-increasing sophistication of computing technology brings an ever-increasing hurdle for would-be
attackers.

Mark for follow up

Question 13 of 20.

How does a partner access the Foundation Platform demo environment?

 by running it from a purchased and configured firewall

 The demo is available only to Palo Alto Networks employees.

 by using its AWS account with a VM-Series license provided by Palo Alto Networks

 by using the Partner Portal

Mark for follow up

Question 14 of 20.

True or false: Antivirus inspection is proxy-based.


True False
   

Mark for follow up

Question 15 of 20.

True or false: PAN-¬DB is a service that aligns URLs with category types defined by Palo Alto Networks in which
websites are classified through various means, including data provided by the Threat Intelligence Cloud.
True False
   

Mark for follow up

Question 16 of 20.
Which three platform components does WildFire® automatically update after finding malicious activity in previously
unknown files, URLs, and APKs? (Choose three.)

 decrypt

 host information profiles

 command-and-control signatures

 malware signatures

 management

 URL filtering

Mark for follow up

Question 17 of 20.

Which four options are paramount to a prevention-oriented platform? (Choose four.)

 unknown threat prevention

 response plans for ransomware and denial-of-service attacks

 visibility of users, applications, and traffic

 cloud-computing protection

 automatic counterattacks to security breaches

 known threat prevention

Mark for follow up

Question 18 of 20.

Which three statements represent the relationship between Palo Alto Networks product quality and partner growth
opportunity? (Choose three.)

 Palo Alto Networks product quality and service is high, so partner engineering time need not be allocated to
achieving basic functionality.

 The Palo Alto Networks Security Operating Platform is future-oriented, so a land-and-expand strategy with
customers often is rewarding.

 Customer product revenue over time tends to become high multiples of initial product purchases, thus making
new customer acquisition cost-effective.

 Palo Alto Networks product quality and usability is low, so partners can grow revenue, thus providing significant
service and assistance to customers.

Mark for follow up


Question 19 of 20.

What was the cost of reported cybercrime in 2018 (in U.S. dollars)?

 500 million to 1.5 billion

 5 trillion to 10 trillion

 5 billion to 10 billion

 500 billion to 1.5 trillion

 5 million to 15 million

Mark for follow up

Question 20 of 20.

What is the mission of Palo Alto Networks?

 to productize and monetize the best big data and AI approaches to providing digital security

 to maintain the highest revenue growth rate among the top five vendors in the cybersecurity industry

 to teach corporate and governmental organizations worldwide about their exposure to cybersecurity risks

 to protect our way of life in the digital age by preventing successful cyberattacks

Mark for follow up

Save / Return LaterSummary

Test results are summarized below. Change the view to see only Correct or Incorrect questions.

Review Test Questions


(20 Results)   

View:  All Questions      Correct Questions      Incorrect Questions       
ID Question Correct

Which three platform components does


3096 WildFire® automatically update after finding
Correct
9 malicious activity in previously unknown
files, URLs, and APKs? (Choose three.)

3096 What are three subscriptions for the next-


Correct
1 generation firewall? (Choose three.)
ID Question Correct

How frequently are WildFire® updates about


3095 previously unknown files delivered from the
Correct
5 cloud to customers with a WildFire
subscription?

3094 The VM-Series firewalls support which five


Correct
7 environments? (Choose five.)

Which three statements represent the


3094 relationship between Palo Alto Networks
Correct
2 product quality and partner growth
opportunity? (Choose three.)

3092 How does the Log Collector differ from the


Correct
4 Logging Service?

Which statement is true about how WildFire®


3091
scans files for viruses, malware, and Incorrect
9
spyware?

3090 What is the function of the Decryption Broker


Correct
1 on the next-generation firewall?

Palo Alto Networks platform products


commonly are deployed in which four critical
3087
places in the network to solve many of Correct
7
today's enterprise security problems?
(Choose four.)

3087
Which option describes Panorama? Correct
2

3086
Which option describes WildFire®? Correct
7

3085 Which factor does not impact sizing


Correct
5 decisions?

3084 How does a partner access the Foundation


Correct
4 Platform demo environment?

The second evolution of the cybersecurity


industry results in consistent security across
3083 multiple places in the data center and cloud
Incorrect
4 computing environments. How is Palo Alto
Networks driving the next evolution in the
industry?

3082 Which four options are paramount to a


Incorrect
7 prevention-oriented platform? (Choose four.)

3081 What was the cost of reported cybercrime in


Correct
6 2018 (in U.S. dollars)?

3081 Which trend involves cyberattackers and


Incorrect
1 technology advancement?

3080
What is the mission of Palo Alto Networks? Correct
0
ID Question Correct

True or false: PAN-¬DB is a service that


aligns URLs with category types defined by
2702 Palo Alto Networks in which websites are
Correct
2 classified through various means, including
data provided by the Threat Intelligence
Cloud.

2698 True or false: Antivirus inspection is proxy-


Correct
9 based.

Close  
  

You might also like