Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Foundation Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Foundation Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Foundation Accreditation Exam
PSE: Foundation
Question 1 of 20.
Which statement is true about how WildFire® scans files for viruses, malware, and spyware?
A WildFire Analysis Profile needs to be set to define which files to forward to the WildFire cloud to trigger
inspection for zero-day malware.
The firewall must have policy rules in place before it can forward a questionable file to WildFire, where the file is
analyzed for zero-day malware.
For WildFire to be most effective, you need to deploy a WF-500 appliance to get the full benefits of WildFire
threat intelligence scanning.
The firewall must have a WildFire Analysis Profile rule attached to a Security policy rule that will scan files for
viruses, malware, and spyware.
Question 2 of 20.
How does the Log Collector differ from the Logging Service?
The Log Collector ensures redundancy by having multiple copies of your log database, and the Logging Service
is regionalized based on your location.
The Log Collector provides a centralized repository for your on-premises and virtual firewalls, and the Logging
Service provides only data isolation to avoid cross-contamination of logs.
The Log Collector has built-in log redundancy, and the Logging Service has no cloud compliance requirements.
The Log Collector is hardware-based, and the Logging Service is scalable on demand.
performance
decryption
number of applications
redundancy
sessions
Question 4 of 20.
Citrix XenServer
AWS
VMware NSX
VMware ESXi
Azure
Linux VServer
Question 5 of 20.
a tab on the firewall's web interface that provides management functionality beyond that provided by other tabs
provides early visibility into new features of the firewall's operating system, PAN-OS®
Question 6 of 20.
How frequently are WildFire® updates about previously unknown files delivered from the cloud to customers with a
WildFire subscription?
every 60 minutes
every day
every 5 minutes
every 15 minutes
every 30 minutes
Question 7 of 20.
What are three subscriptions for the next-generation firewall? (Choose three.)
Content-ID
Threat Prevention
WildFire®
SSL Decryption
URL Filtering
App-ID
User-ID
Question 8 of 20.
It provides an Analysis Summary that summarizes a firewall’s ability to reduce the attack surface of an
environment.
It is a controlling firewall that provides configuration rules that controlled firewalls must submit to.
It is a general-purpose hash-generation and match process used in firewalls as an early step in their session
processing.
Question 9 of 20.
consolidate all the information from scans for unknown malware, system status, and system health alerts of the
firewall into one central broker interface
eliminate the need for a third-party SSL decryption solution and reduce the number of thirdparty devices
performing traffic analysis and enforcement
decode applications and URL traffic coming through the firewall and assign priority to specific traffic patterns
according to geographical location
Question 10 of 20.
The second evolution of the cybersecurity industry results in consistent security across multiple places in the data
center and cloud computing environments. How is Palo Alto Networks driving the next evolution in the industry?
by building security into the operating systems that run on hypervisors and into the applications that run on
containers
by providing visibility and enforcement to facilitate ease of consumption of new innovative technologies
by providing its own cloud infrastructure complete with cybersecurity for organizations to migrate to
Question 11 of 20.
Palo Alto Networks platform products commonly are deployed in which four critical places in the network to solve
many of today's enterprise security problems? (Choose four.)
branch office
internet perimeter
vehicle-mounted hotspot
Question 12 of 20.
The ever-increasing power of cybersecurity prevention platforms makes cyberattacks and their attackers less
and less relevant.
The ever-decreasing cost of computing power enables cybercriminals to launch automated, sophisticated
attacks at ever-decreasing costs.
The ever-increasing sophistication of computing technology brings an ever-increasing hurdle for would-be
attackers.
Question 13 of 20.
by using its AWS account with a VM-Series license provided by Palo Alto Networks
Question 14 of 20.
Question 15 of 20.
True or false: PAN-¬DB is a service that aligns URLs with category types defined by Palo Alto Networks in which
websites are classified through various means, including data provided by the Threat Intelligence Cloud.
True False
Question 16 of 20.
Which three platform components does WildFire® automatically update after finding malicious activity in previously
unknown files, URLs, and APKs? (Choose three.)
decrypt
command-and-control signatures
malware signatures
management
URL filtering
Question 17 of 20.
cloud-computing protection
Question 18 of 20.
Which three statements represent the relationship between Palo Alto Networks product quality and partner growth
opportunity? (Choose three.)
Palo Alto Networks product quality and service is high, so partner engineering time need not be allocated to
achieving basic functionality.
The Palo Alto Networks Security Operating Platform is future-oriented, so a land-and-expand strategy with
customers often is rewarding.
Customer product revenue over time tends to become high multiples of initial product purchases, thus making
new customer acquisition cost-effective.
Palo Alto Networks product quality and usability is low, so partners can grow revenue, thus providing significant
service and assistance to customers.
What was the cost of reported cybercrime in 2018 (in U.S. dollars)?
5 trillion to 10 trillion
5 billion to 10 billion
5 million to 15 million
Question 20 of 20.
to productize and monetize the best big data and AI approaches to providing digital security
to maintain the highest revenue growth rate among the top five vendors in the cybersecurity industry
to teach corporate and governmental organizations worldwide about their exposure to cybersecurity risks
to protect our way of life in the digital age by preventing successful cyberattacks
Test results are summarized below. Change the view to see only Correct or Incorrect questions.
View: All Questions Correct Questions Incorrect Questions
ID Question Correct
3087
Which option describes Panorama? Correct
2
3086
Which option describes WildFire®? Correct
7
3080
What is the mission of Palo Alto Networks? Correct
0
ID Question Correct
Close