Go Back on PSE-Platform Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

PSE-Platform Practice Test


Page 2 out of 12 Pages

When a customer creates a new SLR report, what is the first step in generating a proper SLR report once
logged in to the Partner Portal?


A.

Click the Track my deals button to view your open Opportunities.


B.

Scroll down and click the New Security Lifecycle Review button.


C.

Click the Select files… button and find the relevant statsdump file on your local machine and click
Upload.


D.

Select the appropriate Opportunity.





A.
  

Click the Track my deals button to view your open Opportunities.



A prospective customer was the victim of a zero-day attack that compromised specific employees, who then
became unwitting attack vectors. The customer does not want that to happen again.
Which two Palo Alto Networks platform components will help this customer? (Choose two.)


A.

Traps


B.

Correlation Objects


C.

Wildfire


D.

Autofocus





A.
  

Traps



C.
  

Wildfire



What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud?
(Choose three.)


A.

Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance


B.

Palo Alto Networks AutoFocus generated Correlation Objects


C.

Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security Profiles


D.

WF-500 configured as private clouds for privacy concerns


E.

Palo Alto Networks non-firewall products, like Traps and Aperture





A.
  

Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance



B.
  

Palo Alto Networks AutoFocus generated Correlation Objects



E.
  

Palo Alto Networks non-firewall products, like Traps and Aperture



A customer is targeted by a true zero-day, targeted attack. However, the customer is protected by the Palo Alto
Networks security platform.
The attack leverages a previously unknown vulnerability in IE but utilizes existing hacking techniques on the
endpoint. It is transported over standard HTTP traffic and conforms to the HTML standards. It then attempts to
download from a website, compromised specifically for this attack, a custom piece of malware to run on the
endpoints.
Which element of the platform will stop this attack?


A.

App-ID


B.

PAN-DB


C.

Traps


D.

WildFire





D.
  

WildFire



Which three items contain information about Command and Control (C&C) hosts? (Choose three.)


A.

Threat logs


B.

Data filtering logs


C.

Botnet reports


D.

SaaS reports


E.

WildFire analysts reports





B.
  

Data filtering logs



C.
  

Botnet reports



E.
  

WildFire analysts reports




Page 2 out of 12 Pages
Previous