Discount Offer
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

PSE-Strata-Associate Practice Test

Whether you're a beginner or brushing up on skills, our PSE-Strata-Associate practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 1 out of 7 Pages

Which architecture allows a Palo Alto Networks Next-Generation Firewall (NGFW) to achieve high performance with all security features enabled?


A. single-pass parallel processing


B. dual-pass processing


C. multi-core processing


D. parallel-pass single processing





A.
  single-pass parallel processing

Which two of the following are benefits of the Palo Alto Networks Zero Trust architecture? (Choose two.)
Select 2 Correct Responses


A. tighter access control


B. increased detection of threats and infiltration


C. more network segments


D. cloud-based virtual private network (VPN)





A.
  tighter access control

B.
  increased detection of threats and infiltration

A customer has enabled the Threat Prevention subscription on their Palo Alto Networks Next-Generation Firewall.
How will the performance of the firewall be affected if the customer also enables both WildFire and User-ID?


A. The maximum throughput performance will be reduced, but the impact will vary based on the firewall model being used.


B. Enabling User-ID will have no additional performance impact, but enabling WildFire will reduce throughput.


C. There will be no additional performance impact to the firewall, and throughput will remain the same, regardless of firewall model.


D. Enabling WildFire will have no additional performance impact, but enabling User-ID will reduce throughput.





C.
  There will be no additional performance impact to the firewall, and throughput will remain the same, regardless of firewall model.

A firewall enabled as a decryption broker will take which of the following actions?


A. forward clear text traffic to security chains for additional enforcement


B. monitor the state of active connections to determine which network packets to allow through


C. correlate a series of related threat events that indicate a likely compromised host on the network


D. identify potential denial-of-service (DoS) attacks and take protective action





C.
  correlate a series of related threat events that indicate a likely compromised host on the network

Which traffic will be blocked when application-default service is set on a Security policy?


A. SSH traffic on TCP/22


B. HTTPS traffic on TCP/443


C. HTTP traffic on TCP/81


D. DNS traffic on UDP/53





C.
  HTTP traffic on TCP/81


Page 1 out of 7 Pages